Hi,
On Sat, May 7, 2011 at 12:19 AM, Gustavo wrote:
>
> WTF ?
>
> notebook:~$ ping www.compusa.com
> PING bh.georedirector.akadns.net (127.0.0.1) 56(84) bytes of data.
> 64 bytes from localhost.localdomain (127.0.0.1): icmp_req=1 ttl=64 time=0.019
> ms
>
> notebook:~$ ping www.tigerdirect.com
>
Works fine for me on Windows.
C:\>ping www.compusa.com
Pinging e3531.b.akamaiedge.net [96.17.206.102] with 32 bytes of data:
Reply from 96.17.206.102: bytes=32 time=15ms TTL=58
Reply from 96.17.206.102: bytes=32 time=16ms TTL=58
Reply from 96.17.206.102: bytes=32 time=16ms TTL=58
Reply from 96.17
Guess you got nulled
On 05/06/2011 11:49 AM, Gustavo wrote:
> WTF ?
>
> notebook:~$ ping www.compusa.com
> PING bh.georedirector.akadns.net (127.0.0.1) 56(84) bytes of data.
> 64 bytes from localhost.localdomain (127.0.0.1): icmp_req=1 ttl=64 time=0.019
> ms
>
> notebook:~$ ping www.tigerdirect
On Fri, 06 May 2011 15:49:31 -0300, Gustavo said:
> WTF ?
>
> notebook:~$ ping www.compusa.com
> PING bh.georedirector.akadns.net (127.0.0.1) 56(84) bytes of data.
www.compusa.com and www.tigerdirect.com are Akamai'zed. They play DNS games to
point you at the "nearest" Akamai cache server (techn
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 05/06/2011 11:15 PM, Nick Boyce wrote:
> On Fri, May 6, 2011 at 6:49 PM, Gustavo
> wrote:
>
>> WTF ?
>>
>> notebook:~$ ping www.compusa.com PING bh.georedirector.akadns.net
>> (127.0.0.1) 56(84) bytes of data. 64 bytes from
>> localhost.localdomai
On Fri, May 6, 2011 at 6:49 PM, Gustavo wrote:
> WTF ?
>
> notebook:~$ ping www.compusa.com
> PING bh.georedirector.akadns.net (127.0.0.1) 56(84) bytes of data.
> 64 bytes from localhost.localdomain (127.0.0.1): icmp_req=1
> ttl=64 time=0.019 ms
Same here ... this time on Windows :
F:\>ping www
WTF ?
notebook:~$ ping www.compusa.com
PING bh.georedirector.akadns.net (127.0.0.1) 56(84) bytes of data.
64 bytes from localhost.localdomain (127.0.0.1): icmp_req=1 ttl=64 time=0.019 ms
notebook:~$ ping www.tigerdirect.com
PING bh.georedirector.akadns.net (127.0.0.1) 56(84) bytes of data.
64 byt
>
> And if the author is sincere and it was really his original intent, he
> should refrain from blogging from now on...
>
I have a feeling his employer will see to that for the foreseeable future.
At least in a professional context representing them as a company.
If he really meant it as everyon
Looks to me more like the "unqualified person doing testing" argument
is used as an escape from their faux-pas. When you read the initial
article, the author is clearly interested in the issue of crime being
perpetrated by using these tools :
"Penetration tools clearly allow the breaking and ente
Looks like he rewrote it and clarified what he meant to say.
I think this is a lesson on why you really should proofread stuff and
ask someone else to go over your writings before you publish
something.
On Mon, May 3, 2010 at 5:44 PM, Sec News wrote:
> Did anyone else see this?
>
> http://blog.e
> are there any reliable caches for this url?
Attrition has an annotated, but otherwise verbatim copy:
http://attrition.org/errata/sec-co/eeye-01.html
/mz
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charte
On Mon, May 03, 2010 at 05:44:55PM -0700, Sec News wrote:
> Did anyone else see this?
>
> http://blog.eeye.com/vulnerability-management/penetration-tools-can-be-weapons-in-the-wrong-hands
>
are there any reliable caches for this url?
search for the shit you quoted returns basically this thread a
On 5/4/2010 12:37 PM, Justin C. Klein Keane wrote:
> For an interesting take on this see page xxxix in Ross Anderson's
> "Security Engineering" (the Legal Notice). Apparently the debate over
> whether or not to publish tools/techniques that could be used for evil
> (specifically with respects to c
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
For an interesting take on this see page xxxix in Ross Anderson's
"Security Engineering" (the Legal Notice). Apparently the debate over
whether or not to publish tools/techniques that could be used for evil
(specifically with respects to crypto) dates
On 5/3/2010 7:44 PM, Sec News wrote:
> Did anyone else see this?
>
> http://blog.eeye.com/vulnerability-management/penetration-tools-can-be-weapons-in-the-wrong-hands
>
> """
> Penetration Tools Can Be Weapons in the Wrong Hands
> Author: Morey Haber Date: May 3rd, 2010 Categories: Network Secur
Load o' bull.
On Tue, May 4, 2010 at 2:44 AM, Sec News wrote:
> Did anyone else see this?
>
>
> http://blog.eeye.com/vulnerability-management/penetration-tools-can-be-weapons-in-the-wrong-hands
>
> """
> Penetration Tools Can Be Weapons in the Wrong Hands
> Author: Morey Haber Date: May 3rd, 201
Did anyone else see this?
http://blog.eeye.com/vulnerability-management/penetration-tools-can-be-weapons-in-the-wrong-hands
"""
Penetration Tools Can Be Weapons in the Wrong Hands
Author: Morey Haber Date: May 3rd, 2010 Categories: Network Security,
Vulnerability Management
After a lifetime in t
Why dont you post under your real nick aka n3tcr4p ?
you think it make n3tcr4p kid more credible in some ways ?
0r m4yb3 5h4|| 1 5p34k |1k3 7h15 7o m4k3 you und3r574nd my p01n7 ?
1 don7 know wh3n 1 |ook 47 your w3b5173 1 wond3r .
2009/1/11
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
You tell me.
On Sun, 11 Jan 2009 19:30:17 -0500 Pete Licoln
wrote:
>What's the point with MI5 n3td3v ?
>
>Regards Pete
-BEGIN PGP SIGNATURE-
Charset: UTF8
Note: This signature can be verified at https://www.hushtools.com/verify
Version: Hush
What's the point with MI5 n3td3v ?
Regards Pete
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
naive to think mi5 is gender biased:)))
On Sun, 11 Jan 2009 18:36:56 -0500 Pete Licoln
wrote:
>sexyazngrl69 is a n3td3v alias, no doubt about it.
>
>Regards Pete
-BEGIN PGP SIGNATURE-
Charset: UTF8
Version: Hush 3.0
Note: This signature can b
amazing how every message becomes tainted with bullshit.
On Sun, Jan 11, 2009 at 6:01 PM, wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
>
> pics?
>
> On Sun, 11 Jan 2009 17:48:53 -0500 waveroad waveroad
> wrote:
>>N3td3v other alias spotted.
>>
>>
>>
>>2009/1/11
>>
>>> -BEGIN PG
sexyazngrl69 is a n3td3v alias, no doubt about it.
Regards Pete
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
pics?
On Sun, 11 Jan 2009 17:48:53 -0500 waveroad waveroad
wrote:
>N3td3v other alias spotted.
>
>
>
>2009/1/11
>
>> -BEGIN PGP SIGNED MESSAGE-
>> Hash: SHA1
>>
>> i find the surname mcafee to be a turn-on here on the security
>> mailing lis
N3td3v other alias spotted.
2009/1/11
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
>
> i find the surname mcafee to be a turn-on here on the security
> mailing list, mister good hacker:)))
>
> a/s/l?
>
>
> On Sun, 11 Jan 2009 16:49:20 -0500 Will McAfee commun...@thegoodhacker.com> wrote:
If you want to solve the problem, then you and people like you need to:
Step 1: Filter out n3td3v, urleet, etc so you never see their posts or
replies to them. ie: filter the noise Step 2: Post something that you think
is relevant to the list. ie: add to the signal
Step 3: Profit!
Notice there is
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
i find the surname mcafee to be a turn-on here on the security
mailing list, mister good hacker:)))
a/s/l?
On Sun, 11 Jan 2009 16:49:20 -0500 Will McAfee wrote:
>I have lurked for some time, and really, this list has become
>pathetic
>due to it's h
I have lurked for some time, and really, this list has become pathetic
due to it's hiijacking by two or three trolls with nothing better to
do than destroy the relevant signal to noise ratio. This list is not
about MI5, the NSA, or Mossad unless there is something practical to
be learned f
28 matches
Mail list logo