RE: [Full-disclosure] Corporate Virus Threats

2006-07-04 Thread Maxime Ducharme
ECTED] [mailto:[EMAIL PROTECTED] De la part de n3td3v Envoyé : 3 juillet, 2006 16:08 À : full-disclosure@lists.grok.org.uk Objet : Re: [Full-disclosure] Corporate Virus Threats On 6/30/06, n3td3v <[EMAIL PROTECTED]> wrote: > On 6/30/06, Antczak, Ed <[EMAIL PROTECTED]> wrote: > > >

Re: [Full-disclosure] Corporate Virus Threats

2006-07-03 Thread ninjadaito
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 [chop] Listen netd00dle; Very few on this list are remotely interested in anything you have to say - anyone who is either gets a ROFL or truly deserves you. Now piss off. Ninja. >John Cartwright hasn't responded to my calls to have multiple FD >

Re: [Full-disclosure] Corporate Virus Threats

2006-07-03 Thread n3td3v
On 6/30/06, n3td3v <[EMAIL PROTECTED]> wrote: On 6/30/06, Antczak, Ed <[EMAIL PROTECTED]> wrote: > > I second the motion. > An opportunity to focus and filter the broad spectrum of security issues > is welcome if possible. > > Edwin Antczak > Windows Engineer I see a major loophole here, as we d

Re: [Full-disclosure] Corporate Virus Threats

2006-06-30 Thread n3td3v
On 6/30/06, Antczak, Ed <[EMAIL PROTECTED]> wrote: I second the motion. An opportunity to focus and filter the broad spectrum of security issues is welcome if possible. Edwin Antczak Windows Engineer I see a major loophole here, as we don't know how much traffic on the dedicated securityfocus

RE: [Full-disclosure] Corporate Virus Threats

2006-06-30 Thread Antczak, Ed
-disclosure@lists.grok.org.uk Subject: Re: [Full-disclosure] Corporate Virus Threats On 6/30/06, Castigliola, Angelo <[EMAIL PROTECTED]> wrote: > >When the malicious code writers build their viruses and Trojans why > >not code the threats to detect the use of proxy servers and if

Re: [Full-disclosure] Corporate Virus Threats

2006-06-30 Thread n3td3v
On 6/30/06, Castigliola, Angelo <[EMAIL PROTECTED]> wrote: >When the malicious code writers build their viruses and Trojans why not >code the threats to detect the use of proxy servers and if used, connect >through them. Typically you can get to the internet through the default gateway directly

RE: [Full-disclosure] Corporate Virus Threats

2006-06-30 Thread Castigliola, Angelo
TECTED] On Behalf Of Terminal Entry Sent: Thursday, June 29, 2006 10:14 AM To: Bug Traq; Full Disclosure Subject: [Full-disclosure] Corporate Virus Threats When the malicious code writers build their viruses and Trojans why not code the threats to detect the use of proxy servers and if used, conne

Re: [Full-disclosure] Corporate Virus Threats

2006-06-29 Thread Kevin
On 6/29/06, Terminal Entry <[EMAIL PROTECTED]> wrote: When the malicious code writers build their viruses and Trojans why not code the threats to detect the use of proxy servers and if used, connect through them. One reason why not is that it's easier to aim for the largest population of easy t

[Full-disclosure] Corporate Virus Threats

2006-06-29 Thread Terminal Entry
When the malicious code writers build their viruses and Trojans why not code the threats to detect the use of proxy servers and if used, connect through them.  Working in Corporate America, most firewall configurations block outbound TCP 80, as the proxies listen on other non-standard TCP ports.