What's the Negative Public Relations Industry?
On Wed, Mar 19, 2008 at 10:36 PM, Fionnbharr [EMAIL PROTECTED] wrote:
PDP,
I don't really need backing up, I think my stuff stands but it seems
you haven't looked at it still. Reckon you could spell my name
correctly though? I get enough typo's
The world does NOT need another Hacking Exposed. But it does need (and
always will need) a modern book of Computer Security Fundamentals. There
should be little to NO focus on tools (as these change quite often), the
bulk of the focus should be on the Fundamentals and Standards;
(I am mainly
Can emails like the one below be sent to the person not the entire list...
for the benefit of all list members? Thanks.
- G
- Original Message -
From: reepex
To: Petko D. Petkov ; full-disclosure@lists.grok.org.uk
Sent: Tuesday, March 18, 2008 11:26 PM
Subject: Re: [Full-disclosure
Dear Reepex,
Unfortunately, you've already lost all the respect for a larger
portion of people on this mailing list as well outside of it. You have
never led by example but by bashing people on what they try to
accomplish. Everyone who has been in this industry/life style for long
enough know
reepex,
you are the only one backing up troth, read on all comments... I don't
bash people. I encourage them and this is present in all my work and
the work behind the GNUCITIZEN umbrella. Not I, but the crowd hanged
him, as well they will hang you for your arrogant, egocentric, foolish
and
consuming energies that could be better served hacking the
[EMAIL PROTECTED] out of something.
Jay
- Original Message -
From: Petko D. Petkov [mailto:[EMAIL PROTECTED]
To: [EMAIL PROTECTED],full-disclosure@lists.grok.org.uk
Sent: Wed, 19 Mar 2008 11:08:31 +
Subject: Re: [Full-disclosure
I'm not sure a community book is going to make a lot of sense, have any
coherency, or be all that useful. If you want a view of the future, go to
packetstorm, grab up 100 random text how to's and see how well they read
when placed back to back as a book. It won't be pretty. It'll read worse (or
Michael,
I have no clue how it will go. However, just because no one has done
it and there are too many IFs, it does not mean that we should not
approach this problem. If we manage to find a way to crowdsource all
the information in a timely manner, keep up-to-date with the latest
and be at the
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
I have no clue how it will go. However, just because no one has done
it and there are too many IFs, it does not mean that we should not
approach this problem.
Actually attempting to submit the book to a publisher would probably
not work because
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
try me.
No thanks.
I am quite confident that we can make this project into a
salable book but that's not the point. the point is to accumulate
valuable knowledge into one place and if, if this start making some
money you will decide what to
On Wed, 19 Mar 2008 17:30:08 -, Petko D. Petkov said:
moreover, the project is not a Phrack knock-off as you said. It is
very different. As I said, it wont contain explanations but like hands
on tips/tricks and techniques even the most knowledgeable can learn
from or use as a base
On Wed, Mar 19, 2008 at 1:35 PM, [EMAIL PROTECTED] wrote:
% ps ax | grep '[x]yzzy' | wc -l
you could also teach people the -c parameter to grep but I am just a troll
___
Full-Disclosure - We believe in it.
Charter:
On Wed, Mar 19, 2008 at 6:08 AM, Petko D. Petkov
[EMAIL PROTECTED] wrote:
you are the only one backing up troth, read on all comments..
You are very dense. All the people posting bad about thoth have not seen
his work either. They are mindless sheep following your bad example. Have
you
On Wed, Mar 19, 2008 at 8:49 AM, nnp [EMAIL PROTECTED] wrote:
Man, you're wasting your breath with these people.
There's no point in arguing with someone who's willing to title something
as 'The best book ever'. Common sense says that unless you're going to
get experts from every
On Wed, 19 Mar 2008 13:46:12 CDT, you said:
you could also teach people the -c parameter to grep but I am just a troll
And as I pointed out, that was the *second* teachable moment.. ;)
pgpONbXBsGfRz.pgp
Description: PGP signature
___
Full-Disclosure
I think this post sums up best the problem with the hacking exposed series
and the direction pdp's book is going. Hacking exposed does not explain
anything it only teaches tools and results. I much prefer books like
'hacking the art of exploitation', 'the art of software security
assessment',
On Wed, Mar 19, 2008 at 12:42 PM, reepex [EMAIL PROTECTED] wrote:
... I much prefer books like
'hacking the art of exploitation', 'the art of software security
assessment', and 'secrets of reverse engineering' because they are tool
agnostic and teach the low level concepts that are going on.
I don't disagree at all with any of your post except the part that no one
has done this before. I think there are tons of communities online that
share information and maybe even document it on a website, from forums to
wikis to expert-exchange type places to exploit archives to mailing list
PDP,
I don't really need backing up, I think my stuff stands but it seems
you haven't looked at it still. Reckon you could spell my name
correctly though? I get enough typo's with my real name let alone
people messing up 'thoth' (though 6 letter minimum for gmail account
names meant I had to put
reepex, I know how much I know and I know that you fall into the group
of lamers, trolls and all other unfriendly inhabitants (you know who
you are) of full-disclosure who are incapable of showing what they
know and incapable of producing anything of a value so that they keep
doing what they do
This reads like a troll, all it's missing is the QED after the last sentence.
Awesome work PDP.
On Tue, Mar 18, 2008 at 6:12 AM, Petko D. Petkov
[EMAIL PROTECTED] wrote:
reepex, I know how much I know and I know that you fall into the group
of lamers, trolls and all other unfriendly
Just because you call me troll doesn't mean you should ignore my questions.
Who is your book aimed towards? You said this will be the ' best hacking
reference/manual/book ever made' . Doesn't that mean it should contain lots
of low level/kernel level exploitation of which you are incapable?
http://www.gnucitizen.org/blog/agile-hacking/
Help us create the best hacking reference/manual/book ever made. We
provide the scene, the resources and the money, and you keep the
credits and the control over the eventual profits. Read on.
During the next couple of months we are open for your
well, let's see how it goes
On Tue, Mar 18, 2008 at 7:19 PM, reepex [EMAIL PROTECTED] wrote:
Just because you call me troll doesn't mean you should ignore my questions.
Who is your book aimed towards? You said this will be the ' best hacking
reference/manual/book ever made' . Doesn't that
I see thoth responded negatively to your project and again you assume that
if someone bashes you that he/she has no skill and is just trolling. This
means you obviously were not as his kiwicon talk or read the slides ( not
that you would understand them ) but it shows how arrogant you are.
you
On Tue, Mar 18, 2008 at 10:36 PM, Nate McFeters [EMAIL PROTECTED]
wrote:
I don't consider myself a 'kiddie' and I've considered contributing to
it. I feel like the old adage of blowing out someone elses flame to make
yours burn brighter applies here. Reepex, I didn't get a chance to see your
Ok, I'll buy that, that's reasonable. I wasn't in the exchange with thoth.
I guess when I read about a community project to write the ultimate hacking
book, I assumed people from all backgrounds of security would be interested
in contributing... maybe that's a bit of a Utopian view, but I could
27 matches
Mail list logo