On 3/12/06, SO SECURITY RESEARCH INSTITUTE <[EMAIL PROTECTED]> wrote:
>
> If you can provide the evidence to support your claim that the information
> published by the blogger was already in the public non-corporate circuit
> prior to the blog entry being made, do get in touch.
You got me thinking
On Sun, 12 Mar 2006, SO SECURITY RESEARCH INSTITUTE wrote:
> ADP
> were unavailable for comment at time of this message being submitted to
> Full-Disclosure mailing list. http://tinyurl.com/plqt3
This URL describes ADPs not unreasonable password policy (8-14 characters,
must contain special char
If you can provide the evidence to support your claim that the information published by the blogger was already in the public non-corporate circuit prior to the blog entry being made, do get in touch. While the information may be common knowledge amoung corporate users of ADP, it doesn't say the in
This isn't confidential Yahoo information. It's not even confidential
ADP information -- any company who uses ADP's probusiness workcenter has
subjected its employees to this ridiculous password complexity
requirement.
On Sun, Mar 12, 2006 at 08:41:18AM -0800, SO SECURITY RESEARCH INSTITUTE wrot
On 3/12/06, SO SECURITY RESEARCH INSTITUTE <[EMAIL PROTECTED]> wrote:
>
> It appears no action will be taken against a Yahoo employee who disclosed
> confidential corporate side security information (with screenshots) to his
> weblog. This obviously gives the green light for anyone at Yahoo to do t
Dear All, Do you, uh, Yahoo? It appears no action will be taken against a Yahoo employee who disclosed confidential corporate side security information (with screenshots) to his weblog. This obviously gives the green light for anyone at Yahoo to do the same in the future. Why have a Yahoo poli