does perl run in your browser?
On 2/20/07, Gaurang Pandya <[EMAIL PROTECTED]> wrote:
> just wondering why cant simple perl script be used
> instead??
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
On 12/3/06, Dude VanWinkle <[EMAIL PROTECTED]> wrote:
> On 12/3/06, Matthew Flaschen <[EMAIL PROTECTED]> wrote:
> > Or, realize that no one lost money in 9/11, even those who had banks in
> > the World Trade Center. Why? Every bank has multiple redundant
> > backups, including offsite storage.
>
I lost money.
On 12/3/06, Matthew Flaschen <[EMAIL PROTECTED]> wrote:
> Or, realize that no one lost money in 9/11, even those who had banks in
> the World Trade Center. Why? Every bank has multiple redundant
> backups, including offsite storage.
>
> Matthew Flaschen
>
> TheGesus wrote:
> > Conc
On 10/13/06, Louis Wang <[EMAIL PROTECTED]> wrote:
> Hi Guys:
> I'm doing research on AntiSpam personally, I need a lot of spam
> samples. I have try a lot to incur spam, but to now, I can only get
> about 300 spam per day.
> Could anybody kind to help me with spam collection? I use
> [EMAI
this raises a good question though. why _aren't_ i learning spanish. i
don't have a good answer to this.
my recommendation would be to commence the learning of spanish
immediately. i know i will.
-- mic
___
Full-Disclosure - We believe in it.
Charter:
i discovered this first!
well, maybe. but the site where i talked about it is now gone :)
anyway, it really doesn't need to be so complicated with creating a
new 'style' section; just use the a:visited selector.
a { margin-left: 1px; }
a:visited { margin-left: 2px; }
then check for the margi
On 8/15/06, Matt Burnett <[EMAIL PROTECTED]> wrote:
What the fuck is my problem? I had to dl ~1MB of shitty porn, which
prevents me from having 1.5 seconds more of decent high quality porn.
Thats my fucking problem.
Now the real question is what the fuck is your problem? If its so
easy to not re
you just can't grasp the idea of fd can you matt.
it is _so_ easy not to read these messages. what the fuck is your problem?
don't you remember the simpsons?
*just don't look, just don't look*
-- mic
___
Full-Disclosure - We believe in it.
Charter:
On 8/11/06, KT <[EMAIL PROTECTED]> wrote:
what are they? I am tasked with keeping up on application security news.
Here are few I can think of, but I am sure there are more
securityfocus.com
owasp.org
rootsecure/osvdb/cert/etc..
-- mic
___
Full-Di
On 8/10/06, NTR <[EMAIL PROTECTED]> wrote:
Hi All,
I am trying analyze NNTP traffic and i have created a profile for NNTP
protocol. It's a kind of NNTP protocol anomaly detection.
I have also observed some time Yahoo Instant Messenger uses NNTP
port. Though it is using NNTP port the format is
On 8/3/06, Josh L. Perrymon <[EMAIL PROTECTED]> wrote:
http://groups.google.com/group/hackingRFID
I have started a private google group for discussing hacking RFID if
anyone is interested.
why is it private?
kind of ironic that you'd send a request for members in a private list via fd.
-- mi
On 8/1/06, Charlie Harvey <[EMAIL PROTECTED]> wrote:
Gxi estis 2006-07-31 08:47 kaj tiele skribis n3td3v v3dt3n
--8<
> I am the real n3td3v as i own n3td3v.com So there you little twerp.
--8<
No, I'm n3td3v.
No, I'm n3d
On 7/19/06, Josh L. Perrymon <[EMAIL PROTECTED]> wrote:
This email gateway is blocking email messages spoofed from my RH3 box...
The error message:
X-NAI-Spam-Level: **
X-NAI-Spam-Score: 2.3
X-NAI-Spam-Report: 2 Rules triggered * 1.8 -- MIME_MISSING_BOUNDARY --
RAW: MIME section missing bo
On 7/14/06, Bill Stout <[EMAIL PROTECTED]> spammed:
Hi guys,
I'm looking for vulnerabilities or other weaknesses in our GreenBorder Pro
(application virtualization and isolation) product. I invite you to
download and hammer it. Please tell me of any vulnerability you may find.
how about
On 7/12/06, Josh L. Perrymon <[EMAIL PROTECTED]> wrote:
Ok,
I'm having a discussion with a buddy about secure cookies. I'm looking
at a Java application that used several cookies after logging in;
SessionID
CookieIDtype
FailMSGID
so on...
Obviously the application is using some code tha
On 7/11/06, Joel R. Helgeson <[EMAIL PROTECTED]> wrote:
Joel Helgesoncool; someone followed my advice then.
http://archives.neohapsis.com/archives/fulldisclosure/2006-07/0030.html
-- mic
___
Full-Disclosure - We believe in it.
Charter: http:/
On 7/11/06, n3td3v <[EMAIL PROTECTED]> wrote:
What (I and) the underground call it:
"Vhoning"
vhoning looks alot like whoring ... to me anyway.
..
my proposal for the name is "mikeiscool'ing". it will help my brand
(of me). thanks.
i'd also like to propose another term. "netdev'ing". you
On 7/6/06, [EMAIL PROTECTED] <[EMAIL PROTECTED]> wrote:
http://www.theregister.co.uk/2005/04/04/fingerprint_merc_chop/
Carjackers swipe biometric Merc, plus owner's finger
honestly, this guy should sue mercedes. this absoutely had to forsee
this possibility and they did not care. something lik
On 7/5/06, [EMAIL PROTECTED] <[EMAIL PROTECTED]> wrote:
Did you even bother to email them and let them know? Being that
they're still vulnerable probably not
the irony of your whinge being posted to fd is too much for me to handle.
-- mic
___
Fu
On 7/5/06, Q-Ball <[EMAIL PROTECTED]> wrote:
Security is simply a cost/benefit excercise at the end of the day. No one
implements security just to feel better about themselves.
i do
it makes me feel cool
-- mic
___
Full-Disclosure - We believe in i
On 7/4/06, r r <[EMAIL PROTECTED]> wrote:
Need some advise here.
I would like to know what to do if I --hypothetically speaking-- I
were to retrieve _complete_ databases of a MAJOR us hospital. My
hypothetical model is not brute force, but rather an 'accidental'
discovery by trying to retrieve u
because that would be good.
the way it would operate is like so:
1. stop reading my email. even with a robot.
2. stop linking my google accounts
3. stop remembering which google groups i visit
4. stop linking the google services i use
5. don't share subdomain specific information with your other
On 6/29/06, n3td3v <[EMAIL PROTECTED]> wrote:
I believe the industry coined up "phishing" to make more money out of
social engineering. Its obvious now that both are over lapping. Only
the other day Gadi Evron was trying to coin up a phrase for "voice
phishing". Why can't we cut to the chase and
On 6/27/06, Josh L. Perrymon <[EMAIL PROTECTED]> wrote:
http://lists.grok.org.uk/pipermail/full-disclosure/2004-January/015690.html
Anyone heard anything else on the Sanctum INC patent for pentesting???
WTF?
A friend told me about this one and Watchfire patents on application
scanners..
wtf
On 6/27/06, Josh L. Perrymon <[EMAIL PROTECTED]> wrote:
My post was based more on *existing* RFID implementations used for physical
security access cards.
I know that non-contact cards such as RFID Credit Cards use encryption so
on... But are still vulnerable to non-authorized transactions.. I'
On 6/27/06, [EMAIL PROTECTED] <[EMAIL PROTECTED]> wrote:
On Tue, 27 Jun 2006 14:24:35 +1000, mikeiscool said:
> eh?
>
> surely a RFID would only communicate it's private token with a trusted
> (i.e. keyed) source.
>
> like a smartcard ...
Well.. Yeah. That *woul
On 6/27/06, Josh L. Perrymon <[EMAIL PROTECTED]> wrote:
I was contacted by Eweek recently about previous posts about RFID and how it
is being used at the World Cup and Olympics. This got me thinking a little
more about some previous ideas I have had. I think the real risk is in RFID
access cards.
On 6/16/06, John Bond <[EMAIL PROTECTED]> wrote:
could some one tell me why/how this happens.
unicode
-- mic (fd tech support)
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsore
On 6/15/06, Geo. <[EMAIL PROTECTED]> wrote:
I would appreciate hearing a little feedback on this idea.
It strikes me that phishers and spammers have a vulnerability that we have
not yet exploited. They collect information, granted the returns are small
but since email is cheap they send out tons
29 matches
Mail list logo