You know this is all old crap and a load of smoke bowing up usb ports.
The entire point of the advertising industry is that they will try to
put adds everywhere
all over the place. And it's you're job to be a smart enough person to
avoid them, and
buy what you want.
The only reason we are seeing
Micheal Espinola Jr wrote:
> http://whyfirefoxisblocked.com/
>
> http://www.cnet.com/8301-13739_1-9770502-46.html?part=rss&subj=news&tag=2547-1_3-0-5
>
>
This already a bit old.
It's a fine way of thinking in circles
firfox->add block extention ->don't generate revenue -> block all
firefox use
David Maciejak wrote:
> Hi,
>
> Playing around with privilege escalation I found that WLM 8.0, 8.1 and
> probably newer (since live call feature in fact) are vulnerable to a local
> privilege escalation issue. It's not a critical flaw.
> The problem occurs when livecall.exe process is launch.
> The
Joey Mengele wrote:
> Where does security come into play here? This is a local crash in a
> non setuid binary. I would like to hear your remote exploitation
> scenario. Or perhaps your local privilege escalation scenario?
>
> J
>
>
I'll play advocate of the devil then. Imagine a wiki running o
htg wrote:
> yes folks, we've been working hard behind the scene on Month Of n3td3v Bugs.
>
> what with the whole neal krawetz and robert lemos propaganda machine
> working overtime to be little the n3td3v brand we're working on Month
> Of n3td3v Bugs.
>
> we couldn't think of a better way to stick
[EMAIL PROTECTED] wrote:
> On Fri, 10 Aug 2007 09:25:11 +0200, monikerd said:
>
>
>> However off course the md5 hashes don't really
>> say anything. Except that you would be able to
>> verify that your copy is the one you obtained.
>>
>
> I
Why this is the decision problem all over again.
I wish all companies would give out the sourcecode
for us to check too ;)
There really is no need to suspect immunity any
more than another piece of software. The person
who sent the advisory is playing a trick on you.
However off course the md5 ha
llipses? You cannot throw off Doctor
> Neal's algorithms gobbles. Or should I call you n3td3v? Nice try,
> troll.
>
> J
>
> On Thu, 09 Aug 2007 16:34:30 -0400 monikerd <[EMAIL PROTECTED]>
> wrote:
>
>> md5 is broken in a way that you could make 2 .ex
md5 is broken in a way that you could make 2 .exe's with the same md5
that do different things ...
Not that i believe you are data mining, would be quite a feat to go
unnoticed
out my network anyway.
Thought I'd point that out, so that maybe we could "like" stop using
md5 in situations where its
Thierry Zoller wrote:
> Dear Jared,
>
> My opinion :
>
>
>> but some folks don't like the idea of selling directly to the
>> vendor.
>>
> It reads a bit like the mob, extorion style. I have a bug, you want it
> ? Pay me money.
>
>
> Ps. Nice presentaion @BH
>
because getting it entire
Gadi Evron wrote:
> I formerly had a great deal of respect, bordering on admiration, for Theo
> deRaadt's refusals to compromise his open source principles, even in the
> face of stiff opposition. Although he has occasionally gone over-the-top,
> recommended some frankly very dubious changes to
Crashes my firefox
latest stabe gentoo portage package. when the image is displayed, not
loaded. i can load it in a tab in the background just fine, but switching to
it crashes FF.
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk
i see only two possible ways for google to get this kind of data.
google toolbar
or it buys/gets this information from some isp/companies/anybody with a big
enough pipe ..
On 1/2/07, php0t <[EMAIL PROTECTED]> wrote:
>
>
> How exactly does such data get captured? Somebody placed a link
> so
13 matches
Mail list logo