Hello List,
Does anyone have a list of query URLs used by W32/MyDoom-O
(Sophos name: http://www.sophos.com/virusinfo/analyses/w32mydoomo.html)
to dig e-mail addresses from search engines?
Are these specific enough that there's a chance to catch them in the
config of a web proxy (e.g. Squid) and a
Bryan,
On Tue, Jan 25, 2005 at 10:05:42AM -0800, [EMAIL PROTECTED] wrote:
>
> >I think that this may trigger on the regular HTTP request that SkyPE does
> at
> >start up (and only then). This checks the SkyPE web site for updates. This
> is
> >also what the available Snort signature trigger on,
Bryan,
Thanks for your input.
On Tue, Jan 25, 2005 at 12:04:45AM -0800, [EMAIL PROTECTED] wrote:
> Full-Disclosure aspect: knowing the capabilities and limitations of the
> various firewalls employed. How policies can be violated without detection.
> Vendors and open-source community need to pus
On Tue, Jan 25, 2005 at 03:22:20PM +1100, Gregh wrote:
>
> - Original Message -
> From: "Alain Fauconnet" <[EMAIL PROTECTED]>
> To:
> Sent: Tuesday, January 25, 2005 2:05 PM
> Subject: Re: [Full-Disclosure] blocking SkyPE?
>
>
> > H
Hello list,
Thanks to all the tips and suggestions about my question on how to
block SkyPE traffic. I'll summarize and reply below:
* "Brenno J.S.A.A.F. de Winter" <[EMAIL PROTECTED]>:
>You had the technical answer already. I just wanted add this: How
>certain are you that Skype is really someth
Hello list,
This may be a bit borderline topic. Feel free to redirect me to a more
appropriate place for this discussion if you know one.
I need to block SkyPE at the border of our network for many reasons.
It's not an easy task. The following paper:
http://www1.cs.columbia.edu/~library/TR-repos
Paul,
On Wed, Jan 05, 2005 at 03:28:24PM -0600, Paul Schmehl wrote:
> Is anyone aware of a search tool (not Google or search engine aggregation
> software) that could be used to search our network for "interesting stuff"?
> It needs to be capable of doing pattern matching similar to perl's regul
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On Saturday 31 July 2004 17:59, Aviv Raff wrote:
> Confirmed. Using FireFox 0.9.2 on XP and Win2k3.
Also works on linux (Firefox 0.9.1)
- --
un saludo,
Alain Crespo <[EMAIL PRO
82.130.240.230:21
- --
un saludo,
Alain Crespo <[EMAIL PROTECTED]>
_,.-:*"``'*:-.,_,.-:*"``'*:-.,_,.-:*"``'*:-.,_,.-:*"``'*:-.,_,.-:*"``'*:-.,_
Why use Windows, since there is a door?
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.4 (GN
> Full-Disclosure - We believe in it.
> Charter: http://lists.netsys.com/full-disclosure-charter.html
- --
un saludo,
Alain Crespo <[EMAIL PROTECTED]>
_,.-:*"``'*:-.,_,.-:*"``'*:-.,_,.-:*"``'*:-.,_,.-:*"``'*:-.,_,.-:*"``'*:-.,_
rter: http://lists.netsys.com/full-disclosure-charter.html
- --
un saludo,
Alain Crespo <[EMAIL PROTECTED]>
_,.-:*"``'*:-.,_,.-:*"``'*:-.,_,.-:*"``'*:-.,_,.-:*"``'*:-.,_,.-:*"``'*:-.,_
Why use Windows, since there is a doo
ather control exploit?
Surely he wants to propose them to euro-patent the thermomether or the use of
the rain in agriculture ;)
- --
un saludo,
Alain Crespo <[EMAIL PROTECTED]>
_,.-:*"``'*:-.,_,.-:*"``'*:-.,_,.-:*"``'*:-.,_,.-:*"``'*:-.,_,.-:
ped.
And then, no intelligence is needed. ;)
- --
_,.-:*"``'*:-.,_,.-:*"``'*:-.,_,.-:*"``'*:-.,_,.-:*"``'*:-.,_,.-:*"``'*:-.,_,.-:*"``'*:-.,_,.-:*"``'*:-.,_,.-:*"``'*:-.,_,.-:*"``'*:-.,_,.-:*"``'*:-.,_
un saludo,
Alain Crespo <[EMAIL PROTECTED]>
-BEGIN PG
- Original Message -
From: "Osigbemeh Okenyi" <[EMAIL PROTECTED]>
To: "ald2003" <[EMAIL PROTECTED]>; "opticfiber"
<[EMAIL PROTECTED]>; "martin f krafft" <[EMAIL PROTECTED]>;
"full-disclosure" <[EMAIL PROTECTED]>
Sent: Sunday, February 22, 2004 2:43 AM
Subject: [Full-Disclosure] RE: ) Fire
I'm sure this was obtained reading w2k leaked source...
I think that is just the begining of this kind of vulnerabilities. Surely in
the future will apear more vulnerabilities in the food, carpenter, ... and
other types of industry.
It's a conspirancy???
The true is out there...
;)
- Original
I'am preparing for drive exam, and looking for study material... what
should I do
www.google.com
[- Original Message - ]
From: jacobjango
To: [EMAIL PROTECTED]
Sent: Thursday, February 19, 2004 6:53 PM
Subject: [Full-Disclosure] CISSP Study material
> hi list,
> I am preparin
This uses a little old bug (fixed april 2003) in MS Java VM, named by
McAfeeVS as Exploit-ByteVerify. It's low securyty risk, and it seems that
only can change a registry key (to change browser's Home, or similar).
More info:
http://tinyurl.com/34dm2 (McAfee virus info)
http://tinyurl.com/95ro (M
For best reading of Full Disclosure, please, DONT MAIL IN HTML!
- Original Message -
From: Tiziano Radice
To: [EMAIL PROTECTED]
Sent: Monday, January 19, 2004 11:40 AM
Subject: [Full-Disclosure] Readability of Full Disclosure communications :-)
I find full disclosure communications very
On Tue, Nov 25, 2003 at 10:43:38AM +0200, Andrew Thomas wrote:
> Hi,
>
> Just to confirm receipt of another email containing the following
> text:
> --snip--
> Hello my dear Mary,
>
(...)
>
> With attached Private.zip.
(...)
It's identified as 'Troj/Sysbug-A' by Sophos.
Greets,
_Alain_
__
> . : Shell Security Advisory : .
>
> Subject: Buffer overflow in the cable modem Thomson TCM315
It also works in a Thomson TCM305.
It causes a full restart.
It's a bug of all the TCM series???
Or of all Thomson firmware cable modems???
_
> There really is only one way to solve this, and that is to moderate the
> list. At least temporarly, until the noise dies down. At which time the
> list can be unmoderated agian.
Another solution is to ban temporally people who wrotes non-security
related posts and spamers. It's bad idea to m
21 matches
Mail list logo