Hugo van der Kooij wrote:
Thank you all for turning a security mailinglist into a mudpool in which
throwing around dirt about political candidates has become the prime
objective.
However that was not my objective when I came to this list so it seems
this list has become rather useless to me.
Quite
Thanks to everyone who replied to this, I appreciate your time.
This issue has now been dealt with.
Ali
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
BillyBob wrote:
Any more suggestions ?
I have seen something similar to this behaviour caused by a flaky power
connector in a Si3112 mirrored RAID array.
Ali
___
Full-Disclosure - We believe in it.
Charter:
Hi there,
Sorry for a question which I'm sure a lot of people on this list will
consider trivial, but I'm subscribed, so I might as well ask it here.
I need a Linux utility which I can use to encrypt a single gzipped file
via the command line. Obviously something open source would be
IMO i find the comments about Bush and Kerry - in Jason's original
posting as well as the subsequently postings - very untastefully and
very very irellevant.
Yes, and it's worth pointing out this little nugget from the
full-disclosure list charter at
Also seems like a lot of money for something I seem to remember was done
singlehandedly by Steve G* when he was trying to track DDoS IRC bots ...
What he did was nothing like what this research proposal is for.
[snip]
For those that can't read English, what they want to attempt to do is
A waste of money. They won't find anything.. people are too smart
to use chatrooms to discuss elite stuff.
Another reason to vote Bush out. :-)
Also seems like a lot of money for something I seem to remember was done
singlehandedly by Steve Gibson when he was trying to track DDoS IRC bots ...
What the .gov is thinking of doing now is meant for extremely large
networks
like EfNet.
I don't think Steve van singlehandedly monitor the whole of EfNet.
I agree that SG couldn't possibly monitor the whole of efnet, but he
*did* have some automatic analysis going on:
(from grc.com)
They
Does the fixed-length nature of RISC instructions make detecting a
shellcode on a platform such as PPC via IDS easier ? Or does the larger
availability of pseudo-NOP instructions on these platforms (owing
chiefly to more combinations of registers being available) in fact make
it harder ?
I
ElviS .de wrote:
the last step before the worm
http://www.k-otik.com/exploits/09252004.JpegOfDeath.c.php
Are securepoint giving away consultancy jobs for the first working
implementation this time ?
;)
___
Full-Disclosure - We believe in it.
Charter:
Mike Nice wrote:
http://www.techworld.com/opsys/news/index.cfm?NewsID=2275
Next time think twice before replacing Un*x with Voles!
The servers are timed to shut down after 49.7 days of use in order to
prevent a data overload,
Hee hee, someone used the milliseconds since bootup counter as a
[EMAIL PROTECTED] wrote:
Face it, people who can break security are valuable to
those trying to create it.
I would agree with you if this guy had discovered the LSASS
vulnerability himself. But if I remember correctly, it was discovered by
those clever people at eeye. Now I don't consider
Sending logs to a printer makes the most sense to me. Absolutely
unhijackable, and a good use for that old 9-pin dotmatrix and 2000
sheets of traction feed paper you have in the cupboard.
No idea whether it's possible on windows, though.
VeNoMouS wrote:
why not just log all events to a remote
Do I take it that these things are just trying to log in using some
guessed password(s) ? Out of interest, do we have any idea what these
opportunistic passwords might be ?
___
Full-Disclosure - We believe in it.
Charter:
14 matches
Mail list logo