Re: [Full-Disclosure] Re: text

2004-03-25 Thread Nick FitzGerald
Bennett Todd [EMAIL PROTECTED] felt compelled to burble: If you want to really enjoy the pleasure of idiot false-positives from weak virus-scanners, just use this as your .sig, or better yet bodge it into a header: [EMAIL PROTECTED](P^)7CC)7}\$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!\$H+H*

RE: [Full-Disclosure] SHUT UP

2004-03-25 Thread Jos Osborne
It's God's fault for putting the apple in the garden It's been downhill ever since. :) Well, since you brought it up, last time I checked God did not swist the arm of Adam or Eve to eat the apple, so how could that be God's fault? Man is the one that chooses to do the good thing

[Full-Disclosure] Re: OpenSSH attack attempt?

2004-03-25 Thread Raven Alder
Heya -- Quoth Honza Vlach (Mon, Mar 22, 2004 at 10:40:12AM +0100): 2004-03-22 09:01:37.781326500 Failed keyboard-interactive for illegal user xjunr01 from :::212.65.252.97 port 61991 ssh2 2004-03-22 09:01:37.781379500 Disconnecting: Too many authentication failures for xjunr01 2004-03-22

[Full-Disclosure] Yahoo Mail! - Cross Site Scripting

2004-03-25 Thread Rafel Ivgi, The-Insider
~~~ Application:Yahoo Mail! Vendors: http://www.yahoo.com Platforms:WebMail Bug: Cross Site Scripting Risk: High - Stealing Accounts Exploitation:Remote with browser Date:

Re: [Full-Disclosure] stenagrophy software recommendations

2004-03-25 Thread Kare Presttun
At 24.03.2004 17:50 -0800, [EMAIL PROTECTED] wrote: hi people i'm looking for a very simple,reliable, small (certainly less the 1mb), must-have gui, windows, stenographic encryption program. i'd appreciate any recommendations. What you are looking for is steganography I guess I suggest having a

[Full-Disclosure] E-mail virus free tags (Was: SHUT THE F**K UP)

2004-03-25 Thread Andrew Aris
This has been something I've wondered about for a while, its a good idea for e-mails to carry some kind of passed tag from AV systems only if it actually means something. Which as just a plain text, easily duplicatable signature it doesn't in-fact as recent Netsky variants are busy proving its

Re: [Full-Disclosure] E-mail virus free tags (Was: SHUT THE F**K UP)

2004-03-25 Thread Nick FitzGerald
Andrew Aris [EMAIL PROTECTED] wrote: This has been something I've wondered about for a while, its a good idea for e-mails to carry some kind of passed tag from AV systems only if it actually means something. Which as just a plain text, easily duplicatable signature it doesn't in-fact as

[Full-Disclosure] WinAmp =5.01 - Multiple Vulnerabilities

2004-03-25 Thread Rafel Ivgi, The-Insider
~~~ Software: WinAmp Vendor: NullSoft http://www.nullsoft.com http://www.winamp.com Versions: =5.01 Platforms: Windows Bug:Multiple

Re: [Full-Disclosure] Viruses from the list...

2004-03-25 Thread Rodrigo Barbosa
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On Tue, Mar 23, 2004 at 05:15:08AM +0200, Gadi Evron wrote: I quite understand how this is possible, I simply don't see why this content which is clearly: 1. Mis-leading. B. Nothing but harmful. C. Not in accordance with the list charter.

Re: [Full-Disclosure] ISS 'Witty' Worm Analyzed

2004-03-25 Thread Jean-Baptiste Marchand
* [EMAIL PROTECTED] [EMAIL PROTECTED]: I have completed an analysis of the 'Witty' worm that impacts multiple ISS products. The worm is spreading via a very simple UDP propagation algorithm. The unique nature of this worm made it a fascinating piece of code to analyze. The analysis gets

RE: [Full-Disclosure] meay-meay! (virus sent via full-discosure list)

2004-03-25 Thread Bill Royds
This virus sent to the list shows the problem of complete lack of moderation. What would be best is a filter that does a virus scan and WARNS about possible virus, but does not block anything. You would still be responsible for personal digital hygiene, but would have a flag to filter on. Here

[Full-Disclosure] One more Wack at the dead equine WAS: viruses being sent to this list

2004-03-25 Thread Marc Rassbach
On Wed, 24 Mar 2004, Maarten wrote: On Wednesday 24 March 2004 13:34, Gadi Evron wrote: As I got a response from the managers, I am happy. And I took it off-list. I left this thread alone for a long time, partly since what I felt was already being said by others, and also partly because I

RE: [Full-Disclosure] SMTP Encryption (S/MIME) for Outlook questi on

2004-03-25 Thread James Lay
Brandon, Check out TLS/SSL for your Exchange server...it's built in and all you need is to install a couple certs and away you go. This encrypts server to server email, so the server on the other side must support STARTTLS as well. James -Original Message- From: Fetch, Brandon

Re: [Full-Disclosure] SMTP Encryption (S/MIME) for Outlook question

2004-03-25 Thread Ben Timby
Brandon, we use Mozilla, and it's S/MIME features. You can get free personal certs from thawte.com. Also, we use postfix for our mailserver, and have enabled TLS, where available (from client to server, and sometimes from server to server) the SMTP traffic is encrypted. The remote server must

RE: [Full-Disclosure] E-mail virus free tags (Was: SHUT THE F**K UP)

2004-03-25 Thread Andrew Aris
This has been something I've wondered about for a while, its a good idea for e-mails to carry some kind of passed tag from AV systems only if it actually means something. Which as just a plain text, easily duplicatable signature it doesn't in-fact as recent Netsky variants are busy

Re: [Full-Disclosure] meay-meay! (virus sent via full-discosure list)

2004-03-25 Thread KUIJPERS Jimmy
How many times has this been discussed on the list? Such alteration of messages send is in itself a form of moderation. even if you don't remove the virus itself. Something the list charter clearly states it will not do. Besides, why would the FD owners want to spend money (cpu power required

Re: [Full-Disclosure] One more Wack at the dead equine WAS: viruses being sent to this list

2004-03-25 Thread Gadi Evron
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 As this email discusses me, I'll reply, inline, to what I must. | And in a private email to Mr. Evron I pointed out how it was nice of him | to be willing to be a moderator. There are already moderators to this mailing list. | Mr. Evron's reply was

Re: [Full-Disclosure] Re: viruses being sent to this list

2004-03-25 Thread Valdis . Kletnieks
On Wed, 24 Mar 2004 17:26:36 EST, Jason Freidman [EMAIL PROTECTED] said: The frequency of these compared to regular virus emails makes it seem that some viruses actively target these type of addresses. That's only because only 23 people or so had your e-mail address on their disks (until you

RE: [Full-Disclosure] New exploit now circulating?

2004-03-25 Thread Ron DuFresne
Either don;t reply to rtf posts, or fix your MUA, again, ten lkines of crap hides two lines of content; @font-face { font-family: Tahoma; } @page Section1 {size: 8.5in 11.0in; margin: 1.0in 1.25in 1.0in 1.25in; } P.MsoNormal { FONT-SIZE: 12pt; MARGIN: 0in 0in 0pt; FONT-FAMILY: Times New Roman }

RE: [Full-Disclosure] New exploit now circulating?

2004-03-25 Thread Ron DuFresne
text, the mailing list supports text, not html, not rtf, please, fix your mailers, ten lines of trash to reach two lines of content?!; @font-face { font-family: Tahoma; } @page Section1 {size: 8.5in 11.0in; margin: 1.0in 1.25in 1.0in 1.25in; } P.MsoNormal { FONT-SIZE: 12pt; MARGIN: 0in 0in 0pt;

Re: [Full-Disclosure] Signal to Noise Ratio for February

2004-03-25 Thread Valdis . Kletnieks
On Wed, 24 Mar 2004 17:56:09 MST, Epic [EMAIL PROTECTED] said: Lately the SNR wouldn't allow for minimal communications if this were any communications infrastructure. You'd be amazed what Shannon lets you get away with. http://seti.sentry.net/archive/bioastro/2000/0147.html -178dBm. Yowza.

Re: [Full-Disclosure] SHUT UP

2004-03-25 Thread Valdis . Kletnieks
On Thu, 25 Mar 2004 00:48:34 +0100, Aschwin Wesselius [EMAIL PROTECTED] said: In my opinion the shout was towards Jesus in His multiple personality: JESUS CHRIST (calling Him), SHUT THE FUCK UP (very demanding towards the Lord) YOU GODDAM MORONS (talking in plural form, thus towards more

RE: [inbox] [Full-Disclosure] stenagrophy software recommendations

2004-03-25 Thread Curt Purdy
[EMAIL PROTECTED] wrote: i'm looking for a very simple,reliable, small (certainly less the 1mb), must-have gui, windows, stenographic encryption program. i'd appreciate any recommendations. There's a nice list at: http://www.jjtc.com/Steganography/toolmatrix.htm Although steganography has

Re: [Full-Disclosure] stenagrophy software recommendations

2004-03-25 Thread dk
[EMAIL PROTECTED] wrote: hi people i'm looking for a very simple,reliable, small (certainly less the 1mb), must-have gui, windows, stenographic encryption program. i'd appreciate any recommendations. thanks xlop If your gonna go to the trouble of using steg, do it right. Drop the GUI, get a

[Full-Disclosure] GLSA200403-04 Multiple security vulnerabilities in Apache 2

2004-03-25 Thread Aida Escriva-Sammer
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200403-04 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org - - - - -

[Full-Disclosure] eSignal v7 remote buffer overflow (exploit)

2004-03-25 Thread Vizzy
-BEGIN PGP SIGNED MESSAGE- Hash: MD5 ===-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=== VizibleSoft Security Advisory #2004/01 25th Mar 2004 http://viziblesoft.com/insect/advisories/vz012004-esignal7.txt [EMAIL PROTECTED]

[Full-Disclosure] RE: [Unpatched] PivX Predictions Confirmed, Qwik-Fix Protected

2004-03-25 Thread Alerta Redsegura
The following is an excerpt from a PivX statement which is worth quoting: --- PivX Predictions Confirmed, Qwik-Fix Protected Over the course of the last 2 years, PivX Solutions has warned the security industry and the public about the possibility of automatically executing email worms. This

RE: [Full-Disclosure] Signal to Noise Ratio for February

2004-03-25 Thread Ng, Kenneth (US)
I'd like to know how low the bit rate had to be to lock onto a signal that low. :-) You can do incredible correlation tricks if you don't mind waiting a long time for the data. In California they use GPS to measure millimeter movements of the fault lines, but they signal correlate for hours, if

RE: [inbox] [Full-Disclosure] stenagrophy software recommendations

2004-03-25 Thread C I
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 i'm looking for a very simple,reliable, small (certainly less the 1mb), must-have gui, windows, stenographic encryption program. i'd appreciate any recommendations. There's a nice list at: http://www.jjtc.com/Steganography/toolmatrix.htm Also, there

[Full-Disclosure] LNSA-#2004-0006: bug workaround for Apache 2.0.48

2004-03-25 Thread Vincenzo Ciaglia
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Netwosix Linux Security Advisory #2004-0006 http://www.netwosix.org - --- Package

Re: [Full-Disclosure] Signal to Noise Ratio for February

2004-03-25 Thread Valdis . Kletnieks
On Thu, 25 Mar 2004 14:50:45 EST, Ng, Kenneth (US) said: I'd like to know how low the bit rate had to be to lock onto a signal that low. :-) I don't have a cite handy, but I believe it was on the order of 5 bits/second. pgp0.pgp Description: PGP signature

RE: [inbox] [Full-Disclosure] stenagrophy software recommendations

2004-03-25 Thread xlopkov
hi thanks all of you who responded. i really appreciate the caring my information recieved. thanks for the links. thread closed. i also wanted to put my 2 cents in :whenever someone's emails someone off-the-list, basicly just smalltalk, the person who got the email shouldn't send it to the whole

Re: [Full-Disclosure] NEVER open attachments

2004-03-25 Thread jacob[at]buildtheb0x.com
On Sun Mar 21, 2004 at 10:48:19AM -0600, Jeff Schreiner wrote: My fully registered and activated copy of Office Professional Enterprise 2003 was given to me free by M$all I had to do was register for their Office System 2003 event...had to listen to a M$ rep ramble for 8 hours about the

RE: [Full-Disclosure] NEVER open attachments

2004-03-25 Thread David Vincent
My fully registered and activated copy of Office Professional Enterprise 2003 was given to me free by M$all I had to do was register for their Office System 2003 event...had to listen to a M$ rep ramble for 8 hours about the Office System but hey I figure I can give them 8

Re: [Full-Disclosure] One more *plonk*

2004-03-25 Thread John Sage
*plonk* :0: # Luz3rz L1zt * ^From:.*( _snip_ |gadi|[EMAIL PROTECTED]| _snip_ ) Luz3rz_L1zt - John -- Mad cow? You'd be mad too, if someone was trying to eat you. ___ Full-Disclosure - We believe in it. Charter:

Re: [Full-Disclosure] RE: [Unpatched] PivX Predictions Confirmed, Qwik-Fix Protected

2004-03-25 Thread Nick FitzGerald
Alerta Redsegura [EMAIL PROTECTED] wrote: The following is an excerpt from a PivX statement which is worth quoting: --- PivX Predictions Confirmed, Qwik-Fix Protected Over the course of the last 2 years, PivX Solutions has warned the security industry and the public about the possibility

Re: [Full-Disclosure] NEVER open attachments

2004-03-25 Thread VB
What have I wrought? - Original Message - From: David Vincent [EMAIL PROTECTED] To: [EMAIL PROTECTED] Sent: Thursday, March 25, 2004 7:45 PM Subject: RE: [Full-Disclosure] NEVER open attachments My fully registered and activated copy of Office Professional Enterprise 2003

[Full-Disclosure] Message - Banner's Styles

2004-03-25 Thread Gan Chin Kiat
Hi, Question 1: --- I have a Banner with Power Server which is it will displayed after opened the telnet session. Meaning previously it will displayed SunOS 5.6, now it will displayed Power Server. So how would i get the part of the Banner to be displayed in BOLD? e.g. : I want the

Re: [Full-Disclosure] PivX is full of crap rant (was : Predictions Confirmed, Qwik-Fix Protected )

2004-03-25 Thread Jelmer
You shouldn't take them seriously PivX is full of crap, allways has been allways will be One thing you've got to understand about them is that they are a media company, their busnessmodel is build around getting as many media as possible to portrait them as experts. And they're doing a damn fine

[Full-Disclosure] RE: [Unpatched] PivX Predictions Confirmed, Qwik-Fix Protected

2004-03-25 Thread Alerta Redsegura
Nick FitzGerald wrote: free publicity that will be generated from its entirely bogus claims being picked up and repeated more or less verbatim by a media machine now much more focussed on entertaining than on informing and whose recent history suggests the concept of fact checking is now such a

[Full-Disclosure] NetSupport School Pro: Password Encryption weaknesses

2004-03-25 Thread spiffomatic 64
Vendor : NetSupport URL : http://www.netsupport-inc.com/ Version : Invision NetSupport School Pro Risk: Password protection weakness Description: NetSupport School, market leading training tool for the modern classroom featuring full student remote control, application internet

[Full-Disclosure] Remote crash in Etherlords I 1.07 and II 1.03

2004-03-25 Thread Luigi Auriemma
### Luigi Auriemma Application: - Etherlords I http://www.etherlords.com/etherlords1/ - Etherlords II http://www.etherlords.com Versions:

[Full-Disclosure] OpenLinux: mutt remote buffer overflow

2004-03-25 Thread please_reply_to_security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 __ SCO Security Advisory Subject:OpenLinux: mutt remote buffer overflow Advisory number:CSSA-2004-013.0 Issue date:

[Full-Disclosure] OpenLinux: mc Updated packages resolve local buffer overflow vulnerability

2004-03-25 Thread please_reply_to_security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 __ SCO Security Advisory Subject:OpenLinux: mc Updated packages resolve local buffer overflow vulnerability Advisory number:

[Full-Disclosure] SGI Advanced Linux Environment security update #15

2004-03-25 Thread SGI Security Coordinator
-BEGIN PGP SIGNED MESSAGE- SGI Security Advisory Title : SGI Advanced Linux Environment security update #15 Number: 20040303-01-U Date : March 25, 2004 Reference :

[Full-Disclosure] SGI Advanced Linux Environment security update #16

2004-03-25 Thread SGI Security Coordinator
-BEGIN PGP SIGNED MESSAGE- SGI Security Advisory Title : SGI Advanced Linux Environment security update #16 Number: 20040304-01-U Date : March 25, 2004 Reference :

[Full-Disclosure] NetSupport School Pro: Password encryption weaknesses

2004-03-25 Thread spiffomatic 64
Vendor : NetSupport URL : http://www.netsupport-inc.com/ Version : Invision NetSupport School Pro Risk: Password protection weakness Description: NetSupport School, market leading training tool for the modern classroom featuring full student remote control, application internet