I have forwarded on the details of this to [EMAIL PROTECTED] (hosting the
netblock that hosts the site that the URL decodes to (www.vbill.biz) )
From: Visa Service ([EMAIL PROTECTED])
Subject: Visa Security Update
Dear Sir/Madam,
We were informed that your credit card is used by another person
Hi,
Just to confirm receipt of another email containing the following
text:
--snip--
Hello my dear Mary,
I have been thinking about you all night. I would like to apologize
for the other night when we made beautiful love and did not use
condoms. I know this was a mistake and I beg you to
Hi,
Just to confirm receipt of another email containing the following
text:
--snip--
Hello my dear Mary,
I have been thinking about you all night. I would like to apologize
for the other night when we made beautiful love and did not use
condoms. I know this was a mistake and I beg you to
From: Nick FitzGerald
Sent: 12 August 2003 01:48
Subject: Re: [Full-Disclosure] Windows Dcom Worm planned DDoS
Andrew Thomas [EMAIL PROTECTED] wrote:
The examinations of the code so far indicate that the worm is
coded to DoS the windowsupdate site from the 15th of August
onwards
From: Darren Bennett [mailto:[EMAIL PROTECTED]
Sent: 12 August 2003 08:07
To: Andrew Thomas
Cc: 'Mike'; [EMAIL PROTECTED]; 'Darren Reed'; 'Andrew J
Homan'; Full Disclosure
Subject: RE: [Full-Disclosure] aside: worm vs. worm?
I disagree.. MS would have been hit harder than other OS's
From: Chris Eagle [mailto:[EMAIL PROTECTED]
Sent: 12 August 2003 01:31
Subject: RE: [Full-Disclosure] Windows Dcom Worm planned DDoS
The IP is not hard coded. It does a lookup on windowsupdate.com
Allowing the option for corporates and/or isp's to dns poison that
to resolve to
From: Dan Stromberg
Sent: 16 July 2003 04:27
Actually, that's *STILL* impossible.
No, that used to be a popular misconception. It's always
been theoretically possible for a plaintext mailreader to
allow, EG, a buffer overflow. It's harder to get it wrong
with a simpler mailreader,
++ designed products use a standard library, would
it not be possible to investigate closed source applications and find e.g.
strcpy calls by setting breakpoints with SoftIce or some other debugger?
Regards,
Andrew Thomas.
___
Full-Disclosure - We believe
Hi Simon,
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED]] On Behalf Of Simon Richter
Sent: 18 December 2002 06:43
To: [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]
Subject: Re: [Full-Disclosure] Trustworthy Computing Mini-Poll
...snip...
This stuff has some interesting