ECTED]
[mailto:[EMAIL PROTECTED] De la part de n3td3v
Envoyé : 3 juillet, 2006 16:08
À : full-disclosure@lists.grok.org.uk
Objet : Re: [Full-disclosure] Corporate Virus Threats
On 6/30/06, n3td3v <[EMAIL PROTECTED]> wrote:
> On 6/30/06, Antczak, Ed <[EMAIL PROTECTED]> wrote:
> >
>
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
[chop]
Listen netd00dle; Very few on this list are remotely interested in
anything you have to say - anyone who is either gets a ROFL or
truly deserves you.
Now piss off.
Ninja.
>John Cartwright hasn't responded to my calls to have multiple FD
>
On 6/30/06, n3td3v <[EMAIL PROTECTED]> wrote:
On 6/30/06, Antczak, Ed <[EMAIL PROTECTED]> wrote:
>
> I second the motion.
> An opportunity to focus and filter the broad spectrum of security issues
> is welcome if possible.
>
> Edwin Antczak
> Windows Engineer
I see a major loophole here, as we d
On 6/30/06, Antczak, Ed <[EMAIL PROTECTED]> wrote:
I second the motion.
An opportunity to focus and filter the broad spectrum of security issues
is welcome if possible.
Edwin Antczak
Windows Engineer
I see a major loophole here, as we don't know how much traffic on the
dedicated securityfocus
-disclosure@lists.grok.org.uk
Subject: Re: [Full-disclosure] Corporate Virus Threats
On 6/30/06, Castigliola, Angelo <[EMAIL PROTECTED]> wrote:
> >When the malicious code writers build their viruses and Trojans why
> >not code the threats to detect the use of proxy servers and if
On 6/30/06, Castigliola, Angelo <[EMAIL PROTECTED]> wrote:
>When the malicious code writers build their viruses and Trojans why not
>code the threats to detect the use of proxy servers and if used, connect
>through them.
Typically you can get to the internet through the default gateway directly
TECTED] On Behalf Of Terminal Entry
Sent: Thursday, June 29, 2006 10:14 AM
To: Bug Traq; Full Disclosure
Subject: [Full-disclosure] Corporate Virus Threats
When the malicious code writers build their viruses and Trojans why not code
the threats to detect the use of proxy servers and if used, conne
On 6/29/06, Terminal Entry <[EMAIL PROTECTED]> wrote:
When the malicious code writers build their viruses and Trojans why not code
the threats to detect the use of proxy servers and if used, connect through
them.
One reason why not is that it's easier to aim for the largest
population of easy t
When the malicious code writers build their viruses and Trojans why not code the threats to detect the use of proxy servers and if used, connect through them. Working in Corporate America, most firewall configurations block outbound TCP 80, as the proxies listen on other non-standard TCP ports.