MW To Whom it May Concern;
MW The Original Post is http://www.securityfocus.com/bid/11711
MW On Windows XP all releases, when you replace, or change the
MW screensaver displayed on the login screen with a specially crafted
MW version designed to execute programs, those programs are launched
MW
Eric Scher wrote:
Want to view www.georgewbush.com from outside the US? You can't: Access
denied. This "security" measure (!?) can easily be avoided using a proxy in
the US or any anonymous surfing website though.
So, what is it he doesn't want anyone from outside the US to
Richard Verwayen wrote:
Hello list!
A few weeks ago there was a discussion about automated ssh scanning with
user/password combinations like guest/guest or admin/admin.
I set up a debian woody fully patched with both accounts activated, and
got rooted some days later...
The attackers installed
Darren Reed wrote:
What I see Microsoft as doing is pretty much forcing everyone to turn
on Automatic Windows Update. Why leave it as a control panel option,
I've no clue. Same with BIT (Background Intelligent Transfers.)
For the millions of users out there that are likely subject to viruses,
Gregory A. Gilliss wrote:
...before there were mad rag heads disgracing one of the world's most civilized
religions...
...before there was you, being an ass...
grow up! the rag-head thing is so passé, it makes your argument fall
apart, makes you look like an ass, and makes any chance of me
Security List wrote:
Went to windows update last night w/ XP Pro.
Redirected to the v5 version. I was asked to install
the new Windows Update software...downloaded the WU
software...copied the files...then saw
registering...kinda thinking that it was checking for
a valid registration or license.
joe wrote:
Yep, this is how it works now.
You control whether Windows Update is updating or not via the security panel
in the control panel applets (wscui.cpl).
To eb complete, I should have mentioned I have Automatic Updates turned
off in the control panel. I also had the service disabled
Staves, Steve wrote:
Unfortunately,
the notorious Microsoft Mammoth is still holding on to it's ever
persistent image of wreaking havoc on O/S's! With the latest update
from our esteemed "Rulers", XP now has an added "Undocumented feature"
of losing focus on applications - Even on
Am I the only one who thinks that this list is slowly descending into
complete worthlessness? It's amazing. The kiddies tried to
destroy it
early on and failed. So then the members of the list did the
job for them.
Worthless topic after worthless topic until the real purpose
of the
Does anyone know WTF they are trying to say in this AP article,
Core Internet Technology Is Vulnerable,
http://story.news.yahoo.com/news?tmpl=storycid=562ncid=738e
=1u=/ap/20040420/ap_on_hi_te/internet_threat
It sounds like they are talking about a sequence number guessing
attack on
My fully registered and activated copy of Office
Professional Enterprise
2003 was given to me free by M$all I had to do was
register for their
Office System 2003 event...had to listen to a M$ rep ramble
for 8 hours
about the Office System but hey I figure I can give them 8
How can i know if there a sniffer running in my network?
if you're lucky, they are stupid and are using microsoft's network monitor.
Tools -- Identify Network Monitor Users
http://www.comptechdoc.org/os/windows/ntserverguide/ntsnetmon.html
-
Look it through
attachment: aeddb.zip
btw
[EMAIL PROTECTED] wrote:
Look it through
You would think this list would have some sort of scanner
blocking crap
like this.
Oh, and the worm in question uses fake From: fields, so
little point in
notifying the apparent sender.
(which is rich, coming from someone whose
There is no debate, windows is gay - period.
ah! so that's been my problem all this time.
cough troll! cough
-d
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
attachment: dcacdaccc.zip
They finally have a fix for the url spoofing problem (%00)
and updated a
previous IE roll up to cover it. I have seen reference to this bug
being used in the wild already, which meets Microsoft's out of cycle
release criteria.
it also seems to have fixed the damn annoying scrolling bug.
On Thu, Dec 11, 2003 at 10:26:06AM -0500, Funk Jr, Joseph C. wrote:
Works fine for me same version IE6.0.2800.1106.xpsp2.
Sends me to https://paypal.com Although I did notice that
the button seems to be a requirement for this vulnerability
to work, as using a plain hyperlink a href
To be fair, do you really think that fixing all currently known, but
still unfixed bugs would cost millions of dollars?
Does hiring people like Lyu Die Lu costs millions of dollars?
because you can find the bugs does not mean you can fix the bugs or solve
the engineering problems which
What I was attempting to say is that when you live in the ghetto and get
robbed because you forgot to lock your door, /SOME/ of the blame falls
on you.
Just my view. I hate to start a flame war or a snowball this topic into
9000 posts, mail me directly if you wish.
this will quickly get
-Original Message-
From: Richard Stevens [mailto:[EMAIL PROTECTED]
Sent: Thursday October 30, 2003 9:14 AM
To: [EMAIL PROTECTED]
Subject: RE: [Full-Disclosure] Shortcut.. may cause 100%
cpu use!!!
THIS FORMAT C: /U VULNERABILTY JUST DOS'ED MY WHOLE HDD !!
I HAD TO DO IT
-Original Message-
From: David Vincent [mailto:[EMAIL PROTECTED]
Sent: Thursday, October 30, 2003 12:26 PM
To: [EMAIL PROTECTED]
Subject: RE: [Full-Disclosure] Shortcut.. may cause 100%
cpu use!!!
-Original Message-
From: Richard Stevens [mailto:[EMAIL PROTECTED
-Original Message-
From: Michael Sierchio [mailto:[EMAIL PROTECTED]
Sent: Tuesday October 28, 2003 9:32 AM
To: [EMAIL PROTECTED]
Subject: Re: [Full-Disclosure] Is bugtraq even worth it anymore?
I consider Symantec's control of bugtraq to be analogous to
Scientology's control
I don`t know what you think about this, but in my opinion
will never exist a method to REALLY protect CDs, just because
I think that if I can ear it, I can reproduce (and record) it.
There will never be a point where you can't make an analogue copy by
simply recording the output.
What
A customers machine appears to be infected with some type of malware
that apparently harvests email addresses and puts them into a file named
'~'. Just the tilde ~, no extention. This file is created under the
C:\Documents and Settings\%username%\~. I have attached a zipped copy
it was said
--
We have seen multiple instances where DHCP enabled workstations have had
their DNS reconfigured to point to two of the three addresses listed
below. Can anyone else confirm this? Incidents.org is reporting an
increase in port 53 traffic over the last two
I can't recall ever speaking to someone who actually bought a new
application from a vendor simply because their old version of the
application from the vendor was insecure or buggy. In fact, that
would tend to push them to look elsewhere.
Well Microsoft expects you to buy it for
get firebird:
http://texturizer.net/firebird/download.html
and then get flash click to view:
http://texturizer.net/firebird/extensions/#Flash%20Click%20To%20View
-d
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
Sent: Wednesday, September 17, 2003 2:46 PM
To:
since when did releasing non propagating code constitute a crime???
see the case of 2600 vs. the MPAA aka the DeCSS Case.
http://www.afterdawn.com/news/archive/1959.cfm
http://www.google.com/search?q=2600+DECSS+legal+battle
-d
___
Full-Disclosure
Dear ALL,
How to break Administrator password's Windows 2000/XP/NT ?
And break / crack password share folder Windows 2000/XP/NT ?
Mightbe, any want hav information about this, please share it.
You seem to have mistakenly posted a message meant for the as yet
unarrested skript
- Original Message -
From: lepkie [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Tuesday, September 02, 2003 1:29 PM
Subject: [Full-Disclosure] sans.org
maybe off topic
can anyone resolve www.sans.org or www.incidents.org?
I tried several name servers and none return
All the experts were totally faked out. While everyone was
concentrating on getting the magic 20 machines shut down,
no one realized that different copies of Sobig.f had
different lists of servers to contact.
We put a block of udp port 8998 on our firewall this morning.
We had 3
works from here.
-d
-Original Message-
From: Rafa³ ^^MAg^^ Kwa½ny [mailto:[EMAIL PROTECTED]
Sent: August 13, 2003 4:19 AM
To: [EMAIL PROTECTED]
Subject: [Full-Disclosure] windowsupdate.com
Hello
([EMAIL PROTECTED])(375/ttyp2)(01:15P:08/13/03)-
(#:~)- host
If Microsoft were as evil an empire as they are perceived to be, then
wouldn't they already have the backdoor to your system to apply the
patch anyway? If so then why go throught the pain in the ass
to write a
shotty worm and draw bad publicity to the company?
* Digital Rights Management
---
David Vincent CNA/MCSE
Network Administrator
www.mightyOaks.com
[EMAIL PROTECTED]
MIGHTY OAKS WIRELESS SOLUTIONS INC.
209-3347 Oak Street
Victoria, B.C. Canada V8X 1R2
Phone: 250.386.9398 Fax: 250.386.9399
Pager: 250.380.4575 Cell: 250.884.3000
I agree with Microsoft's recommendation for a hardware firewall on all
home PCs. A Linksys NAT router box is selling for only $40 at Amazon as
we speak. Besides protecting against the MSBlaster worm, a hardware
firewall blocks those annoying Windows pop-up spam messages which have
The good thing about SUS is that you can set it up to not
push out the packages until you approve them. The SUS box
downloads all the critical updates and then they sit in queue
until you tell them it's ok to push them out. I think that's
the best way to handle the situation. Sure
...blah blah blah snipped some stuff about w2k being almost good blah blah
blah...
Regardless of how you feel about the .NET concept (personally I feel
distributed code is a security nightmare waiting to happen)
2003 server is
an improvement. You can actually run it more than 30 days
this is messenger service spam.
the messenger service runs by default out of the box. since it runs as a
service, it is running and accepting connections before anyone logs in.
you happenned to login with the admin login, i bet if you'd done the same
thing with a user account it would have been
would ya look at that! donnie weiner made the news...
-d
---
http://www.theregister.co.uk/content/55/31353.html
Come up and see me some time
By Mike Kemp
Posted: 20/06/2003 at 17:14 GMT
WebcamNow, a streaming image service with more than 1.5 million users a
month, stores user
On Fri, Jun 20, 2003 at 12:15:11PM -0700, David Vincent wrote:
would ya look at that! donnie weiner made the news...
-d
Thats not making the news, THIS is making the news ;)
http://news.google.com/news?q=hack4lifehl=delr=ie=UTF-8edi
tion=filter=0
Enjoy
H4L
-BEGIN PGP
well you're just so fucking cool. the bees knees even.
-Original Message-
From: morning_wood [mailto:[EMAIL PROTECTED]
Sent: Thursday, June 19, 2003 3:41 PM
To: Donnie Weiner; [EMAIL PROTECTED]
Subject: Re: [Full-Disclosure] Destroying PCs remotely?
i was doing debug -G
what's funnier to me, is how the graphics are arranged on the main page
http://www.usdoj.gov/kidspage/ so it looks like this sentence: FBI Kids
and Youth 10 most wanted Civil Rights. Get it straight.
but seriously
http://www.cybercrime.gov/rules/cybercitizen2.htm
My friend Quentin brags
what's-his-name said...
Is it me or ms never credit vulnerabilities according to
http://www.microsoft.com/security/passport_issue.asp a report was
published detailing a security vulnerability(...)? No more details or
credit.
...and then asserted...
I also saw online news like
You said...
We at GOBBLES Security have just recieved word that Flashn, a famous Swedish
hacker (known in some circles as Joakim Berg) has recently been taken into custody by
INS agents in New York City, where he will be held until exported back to his own
country.
Don't you mean
You said...
We at GOBBLES Security have just recieved word that Flashn, a famous Swedish
hacker (known in some circles as Joakim Berg) has recently been taken into custody by
INS agents in New York City, where he will be held until exported back to his own
country.
Don't you mean
check out the internet pulse website...
http://www.internetpulse.net/1/
yesterday (thursday the 21st) the Internap section was completely red. late
last night i noticed it had cleared up but as i look at it right now
Internap is experiencing problems again.
i didn't notice anything like this at
snip
There was also a file that I believe may have been created by the
attackers.
It contained the following text, which is not clear to me:
I am the Dragon and you call me insane? My movements are followed and
recorded as avidly as those of a mighty nebula. Before me, you are a slug
in
the sun.
Even an unmoderated list requires some filtering
of abusers. Otherwise, what good is a list charter?
my point exactly.
-d
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
i'm a patient person, but surely the 25+ copies of this spam being sent to
the list is enough to get this address banned/bumped for at least a few
days?
spam sucks.
-d
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]
Sent: October 10, 2002 9:13 AM
To: [EMAIL
it has been spaken thusly...
I think the list should just block hushmail.com and hush.com, as in the
few
days it has been proven that these folks are using anonymity to hide
behind
dozens of stupid posts.
I vote to block hushmail.com
I second.
if you don't want to get mail from
51 matches
Mail list logo