> >What ARE the real risks (or lack of them) for Win9X/ME systems ?
I think the risk he is that they are running Win9x/ME.
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secu
> I have 2 win98 machines here, my own and a customer's, both are unpatched,
> (one runs IE6 sp1 the other IE 5.5) I cannot find shimgvw.dll on either.
is GDI32.dll on either of those systems?
ref: http://www.viruslist.com/en/weblog?discuss=176892530&return=1
_
> burst your bubble buddy, but I am a dyed in the wool republican freak who
> has never, - EVER - , voted for a Dem. Of course, I've never voted for
> Shrub either...
Two questions for y'all:
1 - shouldn't you pick the most qualified candidate instead of the one
that happened to pick the same pa
> Calling me a moron without telling me why is STUPID :)
You are all morons for insisting on furthering a political debate on
an information security forum with people who know neither tact,
restraint, nor empathy.
___
Full-Disclosure - We believe in it.
should we all call his cell phone?
On 12/30/05, Dave Horsfall <[EMAIL PROTECTED]> wrote:
> Another out-of-orifice reply...
>
> -- Dave
>
> -- Forwarded message --
> Date: Fri, 30 Dec 2005 04:20:28 -0500
> From: "Preston, Ian" <[EMAIL PROTECTED]>
> To: Dave Horsfall <[EMAIL PROTECT
> Or have you already forgetten that terrorists have been killing us (and
> many others around the world) since the 1970's without pause?
It's been going on for A LOT longer than that.
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.or
> what ever happened to FPGA/hardware based NIDS classifiers? There
> seemed to be a number of papers and even some open source (open cores)
> code to do 10GigE with ease.
>
> still in the research labs?
http://www.cloudshield.com
and have your pocketbook ready, 'cause it ain't cheap.
___
, than SANS's 'class' will cover ;-)
(you're welcome, Stephen)
On 12/5/05, c0ntex <[EMAIL PROTECTED]> wrote:
> On 05/12/05, Technica Forensis <[EMAIL PROTECTED]> wrote:
> > what are floppies formatted with, again? as bad as FAT is, it's
> > hardl
what are floppies formatted with, again? as bad as FAT is, it's
hardly outdated.
most people focus on the big picture and never learn the guts of the
file system, so a class like this is extremely useful - especially in
the forensics arena.
On 12/5/05, c0ntex <[EMAIL PROTECTED]> wrote:
> On 05/1
On 11/14/05, Samuel Beckett <[EMAIL PROTECTED]> wrote:
> > http://forum.crime-research.org/teech-me-how-to-hack-vt6.html?highlight=
>
> "I'm I want to become a hacker. By the way, whats "netbus"?"
> Posted: Sun Mar 27, 2005 7:30 pm
>
> http://www.geocities.com/n3td3v/home/about.html
>
> "Extensive
> > And my dick is longer than yours.
>
> Unless that's what you do your code analysis with, it's immaterial. And if it
> *is* what you do your code analysis with, all I can say is:
>
> Eww. That's just... wrong. Get professional help, fast.
>
Full-disclosure is taking on a whole new meaning...
On 8/24/05, winsoc <[EMAIL PROTECTED]> wrote:
> I seriously cannot believe that someone would be so mundane in
> thinking that people would reply to this.
I have heard of several cases of people giving up hundreds of
thousands of dollars and even flying to Nigeria to personally meet the
'prince'.
> I don't understand the big fuss over google talk.
I think the fuss has to do with the 'Privacy' paragraph in the terms of service:
"You agree that Google may access or disclose your personal
information, including the content of your communications" and
"Personal information collected by Google
On 8/22/05, Ill will <[EMAIL PROTECTED]> wrote:
> thinking security-minded people always backed up their hdds daily :D
>
Real men don't do backups, they just put their work on an FTP site and
let the world mirror it.
--Linus Torvalds
___
Full-Disclosure
It is rather humourous to see:
> > -snip- To see these self proclaimed hackers
> > goto Blackhat and Defcon is a complete joke.
and
> > The best security team is http://groups-beta.google.com/group/n3td3v
in the same message. Sounds like self-proclaimation to me.
__
On 8/17/05, Jason Coombs <[EMAIL PROTECTED]> wrote:
> What about attacks that took place with the worms as cover? How many high-
> value systems just got compromised, and will remain so, by something other
> than the worms' code -- where the victim won't even bother to investigate
> that
> possi
Jason Coombs wrote:
> "responsible disclosure" causes serious harm to people. It is no
> different than being an accessory to the intentional destruction of
> innocent lives.
But then when an alert was posted to full-disclosure that didn't
include the details about how to actually exploit the vuln
> From:
>
> http://en.wikipedia.org/wiki/Trojan_horse_%28computing%29
>
> In practice, Trojan Horses in the wild do contain spying functions (such
> as a Packet sniffer) or backdoor functions that allow a computer,
> unbeknownst to the owner, to be remotely controlled remotely from the
> network,
> After a trivial Google search, the following was found:
After all, any experienced computer forensics person should know how
to use Google.
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted an
> Interesting. What dictionary are you reading this definition from?
Industry standard
> Whether or not the malware does other things as well, everyone I know
> considers a Trojan to be a type of malware that allows an intruder to
> gain entry to a system through the front door once the malware
> CAUTION:
> Internet and e-mail communications are Kohl's property and Kohl's reserves
> the
> right to retrieve and read any message created, sent and received.
Kohl's owns the Internet?
Kohl's reserves the right to read my email I send my mom just because
it's on the Internet?
maybe you
21 matches
Mail list logo