others
to wonder whether noexec /tmp really buys you much, other than tripping
up virus and trojan-horse writers that haven't considered that case
and planned for it (e.g. `pwd`/.hi instead of /tmp/hi).
--
Brent J. Nordquist [EMAIL PROTECTED] N0BJN
Other contact information: http
any information to third parties until the manufacturer
releases an advisory or patch.
--
Brent J. Nordquist [EMAIL PROTECTED] N0BJN
Other contact information: http://kepler.its.bethel.edu/~bjn/contact.html
___
Full-Disclosure - We believe
On Thu, 19 Feb 2004, Brian [EMAIL PROTECTED] wrote:
Protection:
Vendors should put all Pepsi 20 OZ bottles in a vending machine,
Or fill the bottles just a *bit* more full. :-)
--
Brent J. Nordquist [EMAIL PROTECTED] N0BJN
Other contact information: http://kepler.acns.bethel.edu/~bjn
are for the weak of mind
http://www.mail-archive.com/[EMAIL PROTECTED]/msg13315.html
--
Brent J. Nordquist [EMAIL PROTECTED] N0BJN
Other contact information: http://kepler.acns.bethel.edu/~bjn/contact.html
___
Full-Disclosure - We believe in it.
Charter: http
/Netsky.b (you can see jokes on the list):
http://vil.nai.com/vil/content/v_101034.htm
Anybody have a copy of the full mail message ... I haven't seen any here
yet, though it's been upgrade to Medium by NAI, Sophos, etc.
--
Brent J. Nordquist [EMAIL PROTECTED] N0BJN
Other contact information
in order to work on Unix ports. GNU makefiles would make
sense in that context.
--
Brent J. Nordquist [EMAIL PROTECTED] N0BJN
Other contact information: http://kepler.acns.bethel.edu/~bjn/contact.html
* Fast pipe * Always on * Get out of the way - Tim Bray http://tinyurl.com/7sti
On Tue, 27 Jan 2004, Ferris, Robin [EMAIL PROTECTED] wrote:
Does any one know what the size of the attachment is when is comes in as
a zip file?
So far the ZIP ones I've seen (thousands) are all between 22640 and 22798
bytes inclusive.
--
Brent J. Nordquist [EMAIL PROTECTED] N0BJN
Other
On Tue, 18 Nov 2003, Kruse, Steve [EMAIL PROTECTED] wrote:
Repeated hacker challenges by Secure Computing against the Sidewinder
have proven it hasn't been compromised.
Proven is much too strong a word. See:
http://www.schneier.com/crypto-gram-9812.html#contests
--
Brent J. Nordquist
On Tue, 18 Nov 2003, David Maynor [EMAIL PROTECTED] wrote:
On Tue, Nov 18, 2003 at 11:03:06AM -0600, Brent J. Nordquist wrote:
http://www.schneier.com/crypto-gram-9812.html#contests
I think that may be a bad example as that talks about crypto challenges
as oppsoed to operational security
their organization finding these
vulns. without the source, if they really wanted to? Come on.
--
Brent J. Nordquist [EMAIL PROTECTED] N0BJN
Other contact information: http://kepler.acns.bethel.edu/~bjn/contact.html
* Fast pipe * Always on * Get out of the way - Tim Bray http://tinyurl.com/7sti
world, decisions about taking critical systems down are based on a number
of factors... and with that, I agree 100%. This list's main value to me
is adding more data to be weighed in making those decisions.
--
Brent J. Nordquist [EMAIL PROTECTED] N0BJN
Other contact information: http
://LISTSERV.ND.EDU/archives/resnet-l.html
--
Brent J. Nordquist [EMAIL PROTECTED] N0BJN
Other contact information: http://kepler.acns.bethel.edu/~bjn/contact.html
* Fast pipe * Always on * Get out of the way - Tim Bray http://tinyurl.com/7sti
___
Full-Disclosure
-case Subject: . I looked at
all the ones I've received, and sure enough, they're all upper-case.
That might be another telltale you can use if you're taking the procmail
approach.
--
Brent J. Nordquist [EMAIL PROTECTED] N0BJN
Other contact information: http://kepler.acns.bethel.edu/~bjn
*. The question is whether the evidence to date
should lead us to have confidence in your Trustworthy Motoring program,
and your ability to find leaks in what you're building, and your own
declarations of your products as being designed and built to be leak-free.
--
Brent J. Nordquist [EMAIL PROTECTED
be big news.
--
Brent J. Nordquist [EMAIL PROTECTED] N0BJN
Other contact information: http://kepler.acns.bethel.edu/~bjn/contact.html
* Fast pipe * Always on * Get out of the way - Tim Bray http://tinyurl.com/7sti
___
Full-Disclosure - We believe
(though it was sometimes hobbled with a .zi extension). They
slipped right through our checks for Microsoft unsafe extensions. I'm
sure it's just a matter of time before this is commonplace.
--
Brent J. Nordquist [EMAIL PROTECTED] N0BJN
Other contact information: http://kepler.acns.bethel.edu
PowerPC G3)
--
Brent J. Nordquist [EMAIL PROTECTED] N0BJN
Other contact information: http://kepler.acns.bethel.edu/~bjn/contact.html
* Fast pipe * Always on * Get out of the way - Tim Bray http://tinyurl.com/7sti
___
Full-Disclosure - We believe
17 matches
Mail list logo