If you internet goes down out of business hours
, don't expect anyone to answer you from CERT.
This is the laugh out loud government you guys have in America. If its not
CERT doing a major fuck -up with internet infrastructure security its the
bloody Department of Homeland Security.
n3td3v
-
Hi folks, I noticed this today and thought this would cheer you up...
Paul Connolly: Seven signs your kid might be a hacker.
http://www.eweek.com/slideshow_viewer/0,1205,l=&s=25932&a=216320&po=1,00.asp?p=y&kc=EWKNLEDP100807A
I submitted it to Digg as well...
http://digg.com/security/Is_Your_Kid
http://news.bbc.co.uk/1/hi/programmes/click_online/7029540.stm
read this, its very very very interesting.
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secu
On 10/3/07, nitro <[EMAIL PROTECTED]> wrote:
>
> Very nice description of hacker lifecycle =)
>
> but imho, you forget a description of hackers who are no more public, fed
> up by the system, still producing 0day, you know, the real one, the one wich
> take years before being disclosed, these kind
new-bie - hangs around web based chat: yahoo chat, msn chat. watches what
hackers are doing, hangs about with them to befriend them and gain
intelligence on how they hack, and ask for the tools from the people who
make them to hack a few yahoo or msn accounts for themselves. while this
isn't true
If you read my version of the life cycle of a hacker you would know you were
talking bollocks. n3td3v has nothing to do with gobbles or any other group
you mentioned. n3td3v is apart from them. n3td3v is different from all those
others. so don't bring those names into my own agenda of defining the
new-bie - hangs around web based chat: yahoo chat, msn chat. watches what
hackers are doing, hangs about with them to befriend them and gain
intelligence on how they hack, and ask for the tools from the people who
make them to hack a few yahoo or msn accounts for themselves. while this
isn't true h
On 9/28/07, [EMAIL PROTECTED] <[EMAIL PROTECTED]> wrote:
>
> On Fri, 28 Sep 2007 17:29:51 BST, worried security said:
>
> > Two months is still recently. Think about "In recent history we invaded
> > Iraq", "In recent times terrorism has become more promin
On 9/28/07, Jimby Sharp <[EMAIL PROTECTED]> wrote:
>
> I asked you to stop your bullshit you mad man. It is crazy to see so
> many anonymous IDs talking to each other and spamming the whole list.
I haven't seen your name before, it will be added to the echelon database
now.
_
On 9/28/07, Troy <[EMAIL PROTECTED]> wrote:
>
> Wouldn't UDV be more appropriate, for unpatched disclosed vulnerability?
> > The "R" in RDV means recent. I wouldn't consider a two-month old, but still
> > unpatched, vulnerability to be recent, so I wouldn't really be able to call
> > it an RDV. I
On 9/27/07, T Biehn <[EMAIL PROTECTED]> wrote:
>
> Genius!
Billy: Wow, thats a cool 0-day.
Joe: You mean an RDV.
Billy: What?
Joe: Only the bad guys call it 0-day now, haven't you heard?
Billy: Nope.
Joe: Yeah Gadi Evron and friends didn't like the term 0-day anymore, because
it sounds too e
RDV = recently disclosed vulnerability.
A recently disclosed vulnerability (or RDV for short) is an unpatched
vulnerablity which has been recently disclosed.
"RDV" will be used by the whitehat industry to describe what the underground
and blackhats call "0-day".
If you agree with RDV, start usin
On 9/26/07, Thierry Zoller <[EMAIL PROTECTED]> wrote:
>
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
>
>
> Dear List,
> You may or may not have noticed but a lot of German companies and
> researches have pulled their tools from their website in fear of
> litigation.
I don't think it was nec
On 9/26/07, jf <[EMAIL PROTECTED]> wrote:
also fuck pdp and gnucitizen, the only amazing part is that he has gotten
anyone to take him serious.
no, gnucitizen is a respected member of the security community.
if gnucitizen had released the 0day in full, there would be all sorts of
*worm within day
bugtraq is a moderated mailing list for hackers to tell the government and
corporations about 0day, governments and corporations should only discuss
the mission critical under a 0day disclosure.
the government or corporation should not disrespect the person who posted
the original advisory, the mo
-- Forwarded message --
From: worried security <[EMAIL PROTECTED]>
Date: Sep 25, 2007 9:15 AM
Subject: gnucitizen 0day
To: [EMAIL PROTECTED]
On 9/20/07, pdp (architect) <[EMAIL PROTECTED]> wrote:
>
> http://www.gnucitizen.org/blog/0day-pdf-pwns-windows
Whe
-- Forwarded message --
From: n3td3v <[EMAIL PROTECTED]>
Date: Sep 23, 2007 12:59 PM
Subject: Re: [funsec] Keep Gadi Evron off Bugtraq
To: [EMAIL PROTECTED]
On 9/23/07, Gadi Evron <[EMAIL PROTECTED]> wrote:
> Guys, I can't in good conscience kick n3td3v out while it is me who is
>
Bugtraq is a supposed to be a MISSION CRITICAL mailing list for folks
at the sharp end of keeping their core systems secure from threats.
So where does conversation about buzzwords have any usefulness for
folks who are sitting at corporate security teams who don't want their
servers going offline
On 9/22/07, Joel R. Helgeson <[EMAIL PROTECTED]> wrote:
>
> Everyone knows who Gadi is, so by definition, Gadi **is** high profile…
>
> I happen to agree with Gadi, that a 0day is the day an EXPLOIT is
> RELEASED, where such exploit also serves as the ONLY vendor notification of
> a bug being disc
Who seen Gadi Evron on the mailing lists trolling about what a 0day is and
what a 0day isn't, in the middle of a serious disclosure about a PDF flaw?
Hilarious.
Well, just incase you missed it, here it is again...
http://seclists.org/bugtraq/2007/Sep/0229.html
And this guy wants to be a high pr
In a startling development, "hackthegov" otherwise known as "n3td3v" to the
security community has perhaps managed to pull off some political point
scoring between Symantec's Securityfocus editorial staff and the United
States government.
"hackthegov" on an unmoderated information security mailing
this person has been sharing login information to the world wide web,
opening up world governments up to terrorist cyber intrusions. this guy has
not been sent to guantanamo bay yet why not? this reckless act of evil
against western values is not good for the world. we should stop these
individuals
101 - 122 of 122 matches
Mail list logo