Actually this fellow is shit dipped.
-- Original message --
From: yiri [EMAIL PROTECTED]
i can't believe that you posted that to full-disclosure.
dipshit.
On 9/10/07, worried security [EMAIL PROTECTED] wrote:
this person has been sharing login information to the
Nice, that and an unchanged default password...
-- Original message --
From: StaticRez [EMAIL PROTECTED]
Hey...
Some of the PolyCom devices have manageable web interfaces. (Web Commander)
Some of these interfaces might be exploitable.
here's one:
Mr. T is back on his soap-box,
Why does not he just GTFO of the BIG BAD EVIL US if it is so restrictive to his
vocal sensibilities. I would be happy to purchase a one way ticket First Class
back to his beloved IRAN.
BTW AL GORE is responsible for the INTERNET ( Free Pornography for all) and
Engineer: GPS Shoes Make People Findable
By KELLI KENNEDY, Associated Press Writer
MIAMI - Isaac Daniel calls the tiny Global Positioning System chip he's
embedded into a line of sneakers peace of mind. He wishes his 8-year-old son
had been wearing them when he got a call from his school in 2002
Unless you feel it would be more beneficial to have the authorities know your
whereabouts to prove your were not at the scene of the crime, much like the
easy pass scam a few years back.
-- Original message --
From: Michael Holstein [EMAIL PROTECTED]
Kidnappers will
Defense Workers Warned About Spy Coins
By TED BRIDIS, Associated Press Writer
Wed Jan 10, 11:46 PMUPDATED 2 HOURS 58 MINUTES AGO
WASHINGTON - Can the coins jingling in your pocket trace your movements? The
Defense Department is warning its American contractor employees about a new
espionage
the fuck is about every few months j a and some other asswipes go at it on
politics and world events j a taking the muslim view with a very liberal slant
and the other asswipes don't. at least n3td3v is not posting.
bob
-- Original message --
From: [EMAIL PROTECTED]
I don't think I shall forget, as I watched my coworkers jump to theirgod from the 110 floor.
Anders B Jansson wrote:
And on this day when we remember the 3000 unarmed civilians who died inthe US I just hope that we don't forget the 3 unarmed civilians whodied in Afghanistan shortly after.
JEB08
-- Original message -- From: "Jeb Bush" [EMAIL PROTECTED] People think if something is mentioned on a list then its happening. People think if its not hot on the agenda on a mailing list then its not the hacker agenda. Hackers post things to lists that are
I see nothing wrong with a market share aquisition.
-- Original message -- From: "Randal T. Rioux" [EMAIL PROTECTED] Mike Owen wrote: Sounds like IBM is going to buy out ISS. Having too much experience in dealing with IBM contractors and support, I don't think this
What a maroon
http://www.google.com/search?hl=enq=%22Alif+Terranson%22btnG=Google+Search
-- Original message -- From: evilrabbi [EMAIL PROTECTED] We should build a shrine for Joe Lieberman and bask in it's glory. He is probably the best politician of our generation.
On
Just spam filter. I have been deleting any mail referenced to/fr this n3td3v creature for about 6 months. Cuts the noise out.
Bob
-- Original message -- From: "John Dietz" [EMAIL PROTECTED]
Guys,
Relax...
Y'all are letting him get to you too much. That's just what he
You are correct, Terrorist have invaded the US...
http://archives.cnn.com/2001/US/09/11/chronology.attack/index.html
and now you see they must be mitigated, with extreme prejudice.
---BeginMessage---
___
Full-Disclosure - We believe in it.
-advisory- + [Thu Mar 16 02:48:22 EST 2006] + DoS Vulnerability in ISC OpenReg
==
8===D BACKGROUND
==
This issue had no background.
==
8===D DESCRIPTION
==
Sending a specially crafted malformed packet to the services communication
socket can create a loss of service.
==
8===D VENDOR
http://www.oregonlive.com/news/oregonian/index.ssf?/base/business/113824771311150.xmlcoll=7
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Gadi,
Is this the same worm?
http://news.com.com/Kama+Sutra+worm+seduces+PC+users/2100-7349_3-6030129.html?tag=nefd.top
b
-- Original message -- From: Gadi Evron [EMAIL PROTECTED] The CME entry should appear on their site shortly: http://cme.mitre.org Gadi.
On a similair topic,
Wireless home networks; on any given day I can see/break into and use networks that are not my ssid, barring the free internet access, I have stumbled onto the fact that if a user is subscribed to a flat rate service say Vonage and they happen to use wireless for their
In case any one is interested.
b
-- Forwarded Message: -- From: "Richard Piedrahita" [EMAIL PROTECTED] To: security-basics@securityfocus.com Subject: Security and Contingency Planning Date: Thu, 22 Dec 2005 03:10:11 + Hi Everyone: I have a hypothetical situation and
Espen,
Take a look at the hardening guides at http://www.cisecurity.org/. I also believe there is a setting in the Security policy manager for just this item runas. By removing runas capabilties, and then controling file access via file privilages should correct this.
b
-- Original
OK, you should win some sort of award for this work, lurking quietly and enjoyingthis insanity. This post should have come with a disclaimer: "Warning, urinate before opening"
b
-- Original message -- From: Xyberpix [EMAIL PROTECTED] I couldn't resist, it's too damn
Or maybe volunteer work for the local LAPD Computer forensics, great place to
keep your mind active. It is good to have something current to talk about when
and if you get an interview, credibility counts.
Bob
-- Original message --
From: Harry Hoffman [EMAIL
21 matches
Mail list logo