#0296
Sincerely: Tamas Feher from Hungary.
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
--
Gregory A. Gilliss, CISSP E-mail: [EMAIL PROTECTED]
Computer Security
can laugh all you want happy boy, but that is what is coming
next. Get used to it.
--
Gregory A. Gilliss, CISSP E-mail: [EMAIL PROTECTED]
Computer Security WWW: http://www.gilliss.com/greg/
PGP Key fingerprint 2F 0B 70 AE 5F 8E 71 7A 2D 86 52
!-- l27.login.scd.yahoo.com compressed/chunked Thu Aug 19 07:38:10 PDT 2004
--
--
Gregory A. Gilliss, CISSP E-mail: [EMAIL PROTECTED]
Computer Security WWW: http://www.gilliss.com/greg/
PGP Key fingerprint 2F 0B 70 AE 5F 8E 71 7A 2D 86 52 BA B7
.
--
Gregory A. Gilliss, CISSP E-mail: [EMAIL PROTECTED]
Computer Security WWW: http://www.gilliss.com/greg/
PGP Key fingerprint 2F 0B 70 AE 5F 8E 71 7A 2D 86 52 BA B7 83 D9 B4 14 0E 8C A3
___
Full
computer I notice
that my SMS Administrators Console was broken. I later tracked it down
to the fact that SMS sends a lot of information to your computer over
UDP and it was being blocked by SP2. This could be the root of a good
number of the problems you are experiencing.
--
Gregory A. Gilliss
All:
1) Are there any (offshore meaning outside the jurisdiction of fascist
democracies)?
2) If not, who wants to start one (reply OFF LIST pls)?
G
___
Full-Disclosure - We believe in it.
Charter:
of
SP2, are no longer permitted.
Yay Microsoft, you finally got it right (sort of).
G
--
Gregory A. Gilliss, CISSP E-mail: [EMAIL PROTECTED]
Computer Security WWW: http://www.gilliss.com/greg/
PGP Key fingerprint 2F 0B 70 AE 5F 8E 71 7A 2D
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
--
Gregory A. Gilliss, CISSP E-mail: [EMAIL PROTECTED]
Computer Security WWW: http
a little less access...or said I say..it is a mis-configuration.
=)
--
Gregory A. Gilliss, CISSP E-mail: [EMAIL PROTECTED]
Computer Security WWW: http://www.gilliss.com/greg/
PGP Key fingerprint 2F 0B 70 AE 5F 8E 71 7A 2D 86 52 BA B7 83 D9 B4
magically appeared in
front of
me and I didn't even intend to go there .. I was just surfing
for porn
.. Let me hurridly download some stuff from there and give it my
account
details
--
Gregory A. Gilliss, CISSP E-mail: [EMAIL PROTECTED]
Computer Security
- We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
--
Gregory A. Gilliss, CISSP E-mail: [EMAIL PROTECTED]
Computer Security WWW: http://www.gilliss.com/greg/
PGP Key fingerprint 2F 0B 70 AE 5F 8E 71 7A 2D 86 52
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
--
Gregory A. Gilliss, CISSP
in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
--
Gregory A. Gilliss, CISSP E-mail: [EMAIL PROTECTED]
Computer Security WWW: http://www.gilliss.com/greg/
PGP Key fingerprint 2F 0B 70 AE 5F 8E 71 7A 2D 86 52 BA B7 83 D9
- We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
--
Gregory A. Gilliss, CISSP E-mail: [EMAIL PROTECTED]
Computer Security WWW: http://www.gilliss.com/greg/
PGP Key fingerprint 2F 0B 70 AE 5F 8E 71 7A 2D 86 52
.
--
Gregory A. Gilliss, CISSP E-mail: [EMAIL PROTECTED]
Computer Security WWW: http://www.gilliss.com/greg/
PGP Key fingerprint 2F 0B 70 AE 5F 8E 71 7A 2D 86 52 BA B7 83 D9 B4 14 0E 8C A3
___
Full-Disclosure
in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
--
Gregory A. Gilliss, CISSP E-mail: [EMAIL PROTECTED]
Computer Security WWW: http://www.gilliss.com/greg/
PGP Key fingerprint 2F 0B 70 AE 5F 8E 71 7A 2D 86 52 BA B7 83 D9
newspapers that no one's
ever heard of ... :-)
G
--
Gregory A. Gilliss, CISSP E-mail: [EMAIL PROTECTED]
Computer Security WWW: http://www.gilliss.com/greg/
PGP Key fingerprint 2F 0B 70 AE 5F 8E 71 7A 2D 86 52 BA B7 83 D9 B4 14 0E 8C A3
protection in place since the
good old days of syn flooding started
--
Gregory A. Gilliss, CISSP E-mail: [EMAIL PROTECTED]
Computer Security WWW: http://www.gilliss.com/greg/
PGP Key fingerprint 2F 0B 70 AE 5F 8E 71 7A 2D 86 52 BA B7 83 D9 B4 14
/ap_on_hi_te/internet_threat
SNIP
--
Gregory A. Gilliss, CISSP E-mail: [EMAIL PROTECTED]
Computer Security WWW: http://www.gilliss.com/greg/
PGP Key fingerprint 2F 0B 70 AE 5F 8E 71 7A 2D 86 52 BA B7 83 D9 B4 14 0E 8C A3
took more responsibility in using it properly.
What's more, we had the excuse of naivety and immaturity of software
design back then.
I wonder how long before the current monoculture threat to the net is
addressed as effectively.
--
Gregory A. Gilliss, CISSP E
is common with the technique described in this article?
http://www.ebcvg.com/articles.php?id=207
It says something about using Google to target servers by searching
paths to vulnerabilities.
Any thoughts on that?
Kind regards,
--
Gregory A. Gilliss, CISSP E
, but comparing it with mcafee is a little
hard task to do.
--
Gregory A. Gilliss, CISSP E-mail: [EMAIL PROTECTED]
Computer Security WWW: http://www.gilliss.com/greg/
PGP Key fingerprint 2F 0B 70 AE 5F 8E 71 7A 2D 86 52 BA B7 83 D9 B4 14 0E 8C A3
in the mail.
4) Deal with removing the file after a week or so.
5) All the *other* cruft involved in that whole process.
In general, *not* something your Aunt Tillie can deal with.
--
Gregory A. Gilliss, CISSP E-mail: [EMAIL PROTECTED]
Computer Security
pls ;-)
G
--
Gregory A. Gilliss, CISSP E-mail: [EMAIL PROTECTED]
Computer Security WWW: http://www.gilliss.com/greg/
PGP Key fingerprint 2F 0B 70 AE 5F 8E 71 7A 2D 86 52 BA B7 83 D9 B4 14 0E 8C A3
and responsible people, to take action and do what must be done.
--
Gregory A. Gilliss, CISSP E-mail: [EMAIL PROTECTED]
Computer Security WWW: http://www.gilliss.com/greg/
PGP Key fingerprint 2F 0B 70 AE 5F 8E 71 7A 2D 86 52 BA B7 83 D9 B4 14 0E
--
Gregory A. Gilliss, CISSP E-mail: [EMAIL PROTECTED]
Computer Security WWW: http://www.gilliss.com/greg/
PGP Key fingerprint 2F 0B 70 AE 5F 8E 71 7A 2D 86 52 BA B7 83 D9 B4 14 0E 8C A3
___
Full
and accurately identify the malicious
attackers in order to plan and execute appropriate countermeasures
effectively fighting fire with fire.
--
Gregory A. Gilliss, CISSP E-mail: [EMAIL PROTECTED]
Computer Security WWW: http
--
Gregory A. Gilliss, CISSP E-mail: [EMAIL PROTECTED]
Computer Security WWW: http://www.gilliss.com/greg/
PGP Key fingerprint 2F 0B 70 AE 5F 8E 71 7A 2D 86 52 BA B7 83 D9 B4 14 0E 8C A3
___
Full
http://www.theregister.co.uk/content/55/35938.html
--
Gregory A. Gilliss, CISSP E-mail: [EMAIL PROTECTED]
Computer Security WWW: http://www.gilliss.com/greg/
PGP Key fingerprint 2F 0B 70 AE 5F 8E 71 7A 2D 86 52 BA B7 83 D9 B4 14 0E 8C A3
they consider the start of the internet in Al
Gore terms?
--
Gregory A. Gilliss, CISSP E-mail: [EMAIL PROTECTED]
Computer Security WWW: http://www.gilliss.com/greg/
PGP Key fingerprint 2F 0B 70 AE 5F 8E 71 7A 2D 86 52 BA B7 83 D9 B4 14 0E
with one fragment a la
teardrop/Winnuke.
G
--
Gregory A. Gilliss, CISSP E-mail: [EMAIL PROTECTED]
Computer Security WWW: http://www.gilliss.com/greg/
PGP Key fingerprint 2F 0B 70 AE 5F 8E 71 7A 2D 86 52 BA B7 83 D9 B4 14 0E 8C A3
up about
a DoS. I got a DoS for you - kick the power plug. Marc is a a joke (TRUST
ME, I KNOW). There is no exploit for this - Marc got you all worked
up for NOTHING.
--
Gregory A. Gilliss, CISSP E-mail: [EMAIL PROTECTED]
Computer Security
exploit
for ASN.1?
Ok, sounds like a conspiracy theroys doesn't it? And it probably isn't
true, but stranger things have happened :-)
--
Gregory A. Gilliss, CISSP E-mail: [EMAIL PROTECTED]
Computer Security WWW: http://www.gilliss.com
some fire being held to their
feet.
G
On or about 2004.02.18 15:52:15 +, Paul Starzetz ([EMAIL PROTECTED]) said:
please do not post any exploit code(s) before a proper grace period.
--
Gregory A. Gilliss, CISSP E-mail: [EMAIL PROTECTED]
Computer Security
restrictions wouldn't hold up?
--
Gregory A. Gilliss, CISSP E-mail: [EMAIL PROTECTED]
Computer Security WWW: http://www.gilliss.com/greg/
PGP Key fingerprint 2F 0B 70 AE 5F 8E 71 7A 2D 86 52 BA B7 83 D9 B4 14 0E 8C A3
kshell
=;^)
On or about 2004.02.16 10:42:58 +, Pr0 Curve ([EMAIL PROTECTED]) said:
I thought folks on this list might be interested in this:
Hacker Intel
http://www.hackerintel.com
Constantly Updated Security News
--
Gregory A. Gilliss, CISSP E-mail
nasties, if all you did was telnet to that port.)
--
Gregory A. Gilliss, CISSP E-mail: [EMAIL PROTECTED]
Computer Security WWW: http://www.gilliss.com/greg/
PGP Key fingerprint 2F 0B 70 AE 5F 8E 71 7A 2D 86 52 BA B7 83 D9 B4 14 0E 8C A3
supported
corporate applications is important. Reducing the safe margin of time
that one has to do that IS a problem in my eyes.
SNIP
--
Gregory A. Gilliss, CISSP E-mail: [EMAIL PROTECTED]
Computer Security WWW: http
on purpose.
--
Gregory A. Gilliss, CISSP E-mail: [EMAIL PROTECTED]
Computer Security WWW: http://www.gilliss.com/greg/
PGP Key fingerprint 2F 0B 70 AE 5F 8E 71 7A 2D 86 52 BA B7 83 D9 B4 14 0E 8C A3
it would take
a bit longer for it to be out, but that was just day-dreaming.
Thor Larholm just gave me this URL, as you can notice, the server is busy:
http://www.neowin.net/comments.php?id=17509
SNIP
--
Gregory A. Gilliss, CISSP E-mail: [EMAIL PROTECTED]
Computer
*This* is funny, considering SUN's track record with Slowaris,
not to mention Verisign's track record for service:
http://internetnews.com/dev-news/article.php/3311331
--
Gregory A. Gilliss, CISSP E-mail: [EMAIL PROTECTED]
Computer Security
facetious.
My presupposition ...
- US located vendor must have backdoors by inofficiale rules of
government...
Isn't it?
--
Gregory A. Gilliss, CISSP E-mail: [EMAIL PROTECTED]
Computer Security WWW: http://www.gilliss.com/greg/
PGP Key
/education/?ID=SecurityPosters
there are posters like Hackers Ahead, Internet Worm Crossing, Do Not
Pick Up Viruses.
they are so dumb i wonder is this a defacement?
georgi
--
Gregory A. Gilliss, CISSP E-mail: [EMAIL PROTECTED]
Computer Security
and Abuse!
SNIP
--
Gregory A. Gilliss, CISSP E-mail: [EMAIL PROTECTED]
Computer Security WWW: http://www.gilliss.com/greg/
PGP Key fingerprint 2F 0B 70 AE 5F 8E 71 7A 2D 86 52 BA B7 83 D9 B4 14 0E 8C A3
-virus and Firewall software that you were fully protected. However
you didn't know what your were still open to. You need to learn what
these tools do and more importantly, what they don't do.
--
Gregory A. Gilliss, CISSP E-mail: [EMAIL PROTECTED]
Computer Security
??
--
Gregory A. Gilliss, CISSP E-mail: [EMAIL PROTECTED]
Computer Security WWW: http://www.gilliss.com/greg/
PGP Key fingerprint 2F 0B 70 AE 5F 8E 71 7A 2D 86 52 BA B7 83 D9 B4 14 0E 8C A3
graffiti on the wall.
G
On or about 2004.02.06 12:09:47 +, Ishikodzume ([EMAIL PROTECTED]) said:
I think we can learn just fine by ourselves, thanks.
--
Gregory A. Gilliss, CISSP E-mail: [EMAIL PROTECTED]
Computer Security WWW: http
for
this vulnerability to be exploited, mpg321 would need to request an
mp3 stream from a malicious remote server via HTTP.
SNIP
-END PGP SIGNATURE-
--
Gregory A. Gilliss, CISSP E-mail: [EMAIL PROTECTED]
Computer Security WWW: http
PGP SIGNED MESSAGE-
Hash: SHA1
Too bad it won't last - once all the newbies get CISSPs, we'll be screwed!
Thanks Uncle Scrot, best thing I've seen on this list in a while!
SNIP
--
Gregory A. Gilliss, CISSP E-mail: [EMAIL PROTECTED]
Computer Security
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
--
Gregory A. Gilliss, CISSP E-mail: [EMAIL PROTECTED]
Computer Security WWW: http://www.gilliss.com/greg
stop using Cisco products?
This anti-MS drivel is so tiresome.
--
Gregory A. Gilliss, CISSP E-mail: [EMAIL PROTECTED]
Computer Security WWW: http://www.gilliss.com/greg/
PGP Key fingerprint 2F 0B 70 AE 5F 8E 71 7A 2D 86 52 BA B7 83 D9 B4
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
--
Gregory A. Gilliss, CISSP E-mail: [EMAIL PROTECTED]
Computer Security WWW: http://www.gilliss.com/greg
-Disposition: attachment
[-- application/x-msdownload is unsupported (use 'v' to view this part) --]
--- CUT HERE --
--
Gregory A. Gilliss, CISSP E-mail: [EMAIL PROTECTED]
Computer Security
the backup goes away).
--
Gregory A. Gilliss, CISSP E-mail: [EMAIL PROTECTED]
Computer Security WWW: http://www.gilliss.com/greg/
PGP Key fingerprint 2F 0B 70 AE 5F 8E 71 7A 2D 86 52 BA B7 83 D9 B4 14 0E 8C A3
.
--
Gregory A. Gilliss, CISSP E-mail: [EMAIL PROTECTED]
Computer Security WWW: http://www.gilliss.com/greg/
PGP Key fingerprint 2F 0B 70 AE 5F 8E 71 7A 2D 86 52 BA B7 83 D9 B4 14 0E 8C A3
ver: 3.72.0.0 Win2k SP3 WinXP SP1
Usage: dmware TargetIP TargetPort YourIp YourPort
eg: dmware 10.0.0.1 6129 10.0.0.2 21
SNIP
--
Gregory A. Gilliss, CISSP E-mail: [EMAIL PROTECTED]
Computer Security WWW: http://www.gilliss.com
Greetings,
I've recently been told that 13 NASA servers were compromised by
some group in Brazil? Can anyone point me to any articles on this incident?
- --
Regards,
--
Gregory A. Gilliss, CISSP E-mail: [EMAIL PROTECTED]
Computer Security
PROTECTED]) said:
At 09:31 AM 12/18/2003 -0800, Daniel Sichel wrote:
I have to ask, does CERT leak at the same rate they suck? That would be
a weird equilibrium.
Leak--Suck. It's more a continuum than an equilibrium.
;-)
--
Gregory A. Gilliss, CISSP E
/UrlFilter.htm
Regards,
Frank Hagenson.
--
Gregory A. Gilliss, CISSP E-mail: [EMAIL PROTECTED]
Computer Security WWW: http://www.gilliss.com/greg/
PGP Key fingerprint 2F 0B 70 AE 5F 8E 71 7A 2D 86 52 BA B7 83 D9 B4 14 0E 8C A3
for security-related information. Can
anybody else make a comment on this? Agree? Disagree?
Thanks.
--
Gregory A. Gilliss, CISSP E-mail: [EMAIL PROTECTED]
Computer Security WWW: http://www.gilliss.com/greg/
PGP Key fingerprint 2F 0B 70 AE 5F 8E
-conditions.php
SNIP
--
Gregory A. Gilliss, CISSP E-mail: [EMAIL PROTECTED]
Computer Security WWW: http://www.gilliss.com/greg/
PGP Key fingerprint 2F 0B 70 AE 5F 8E 71 7A 2D 86 52 BA B7 83 D9 B4 14 0E 8C A3
to investigate code.
Regards: Tamas Feher.
--
Gregory A. Gilliss, CISSP E-mail: [EMAIL PROTECTED]
Computer Security WWW: http://www.gilliss.com/greg/
PGP Key fingerprint 2F 0B 70 AE 5F 8E 71 7A 2D 86 52 BA B7 83 D9 B4 14 0E 8C A3
on
a workstation, telnet to the router, and copy run tftp.
Gaak. It will let you do that without a password???
--
Gregory A. Gilliss, CISSP E-mail: [EMAIL PROTECTED]
Computer Security WWW: http://www.gilliss.com/greg/
PGP Key
Hutley ([EMAIL PROTECTED]) said:
Most Unix operating systems have switched to using a more secure
encryption mechanism than the old-style crypt(3).
--
Gregory A. Gilliss, CISSP E-mail: [EMAIL PROTECTED]
Computer Security WWW: http
In plain English, wide f**kin' open. No telling where it came from
(unless someone wants to try the box and look for history or logs :)
Billions for espionage, not one yuan for security =;^)
G
On Wed, 2003-11-19 at 22:23, Gregory A. Gilliss wrote:
For all who were interested in reviewing
attachments -)
G
-Original Message-
From: Gregory A. Gilliss [mailto:[EMAIL PROTECTED]
Sent: Wednesday, November 19, 2003 6:22 PM
To: [EMAIL PROTECTED]
Subject: [Full-Disclosure] Another noxious M$ trojan
Hello all:
Heads up - I received this in my mailbox this afternoon
2AM on a major holiday, or a snowstorm, or other reason that the NOC is
running lights-out and nobody's there to push the button to power it back on..
--
Gregory A. Gilliss, CISSP E-mail: [EMAIL PROTECTED]
Computer Security WWW: http
. What do you think? And, most
important of all, do you see any way to fight this behaviour? Because
honestly, I don't.
Greets
--
Gregory A. Gilliss, CISSP E-mail: [EMAIL PROTECTED]
Computer Security WWW: http://www.gilliss.com/greg
, no-one has to read the un-moderated
list, but everybody has the chance to do it.
--
Gregory A. Gilliss, CISSP E-mail: [EMAIL PROTECTED]
Computer Security WWW: http://www.gilliss.com/greg/
PGP Key fingerprint 2F 0B 70 AE 5F 8E 71 7A 2D 86 52
PROTECTED] for further information on how to
obtain proof of concept code.
--
Secure Network Operations, Inc. || http://www.secnetops.com
Embracing the future of technology, protecting you.
--
Gregory A. Gilliss, CISSP
a self-referencing shortcut on your desktop, you have,
as they say, larger fish to fry.
--
Gregory A. Gilliss, CISSP Telephone: 1 650 872 2420
Computer Engineering E-mail: [EMAIL PROTECTED]
Computer Security
the rest]
--
Gregory A. Gilliss, CISSP Telephone: 1 650 872 2420
Computer Engineering E-mail: [EMAIL PROTECTED]
Computer SecurityICQ: 123710561
Software Development WWW
on.
--
Gregory A. Gilliss, CISSP Telephone: 1 650 872 2420
Computer Engineering E-mail: [EMAIL PROTECTED]
Computer SecurityICQ: 123710561
Software Development WWW: http
proves the
robustness of a certain piece of code, well, that's just silly. Cops
aren't software developers, they're cops. Court orders are their tools
of choice, not disassemblers.
--
Gregory A. Gilliss, CISSP Telephone: 1 650 872 2420
Computer Engineering
in this day and age. Then
you come wobbling out of the woodwork to muster up some obscure
insult about me being a code monkey? Very classy Paul.
SNIP
--
Gregory A. Gilliss, CISSP Telephone: 1 650 872 2420
Computer Engineering E-mail
that it is pretty well understood that the best and brightest have
gone from FS.
SNIP
--
Gregory A. Gilliss, CISSP Telephone: 1 650 872 2420
Computer Engineering E-mail: [EMAIL PROTECTED]
Computer Security
and before congress now
and then come as no surprise. I did an interesting article on the state
of cyber security a year or so ago mentioning some of this for TISC
Insight Newsletter, and a copy can be found at
http://sysinfo.com/sec-state.html.
--
Gregory A. Gilliss, CISSP
sp1beta, WinXP without SP and w2k sp0-sp2.
--
Gregory A. Gilliss, CISSP Telephone: 1 650 872 2420
Computer Engineering E-mail: [EMAIL PROTECTED]
Computer SecurityICQ: 123710561
Software
not been installed
--
Gregory A. Gilliss, CISSP Telephone: 1 650 872 2420
Computer Engineering E-mail: [EMAIL PROTECTED]
Computer SecurityICQ: 123710561
Software Development
approach, it's not just having a
keyboard that is breaking the law, it's the combination of having a
keyboard AND the Windows operating system installedsince the
protection doesn't work on the UNIX operating system you will be safe if
you erase your hard drive and install Linux.
--
Gregory
--
Gregory A. Gilliss, CISSP Telephone: 1 650 872 2420
Computer Engineering E-mail: [EMAIL PROTECTED]
Computer SecurityICQ: 123710561
Software Development WWW: http
A. Zdziarski ([EMAIL PROTECTED]) said:
A good percentage of spam filters ignore any attachments when processing
(I know ours does). This spam was probably crafted to circumvent
heuristic-based filters, such as spamassassin, which are all but
obsolete.
--
Gregory A. Gilliss, CISSP
to immorally 'interfere' in others lives, you
know... deal with Hitler, Mussolini, Tojo, Noriega, Sadaam... We'll be sure
to leave them aloneHow about you, Nick, sprechen Sie Deutsches?
--
Gregory A. Gilliss, CISSP Telephone: 1 650 872 2420
Computer Engineering
getting kind of stupid around here.
--
Gregory A. Gilliss, CISSP Telephone: 1 650 872 2420
Computer Engineering E-mail: [EMAIL PROTECTED]
Computer SecurityICQ: 123710561
Software Development
the
changes to the .com and .net top-level domains introduced on 15
September 2003 by 6:00 PM PDT on 4 October 2003. Failure to comply with
this demand by that time will leave ICANN with no choice but to seek
promptly to enforce VeriSign's contractual obligations.
--
Gregory A. Gilliss, CISSP
.
Are microsoft criminals from legal point of view?
Or does justice work this way: if you deface a website, you are a criminal, but if
you screw most of the internet you are a hero?
--
Gregory A. Gilliss, CISSP Telephone: 1 650 872 2420
Computer Engineering
2003.10.02 20:55:31 +, KF ([EMAIL PROTECTED]) said:
http://www.google.com/dmca.html
--
Gregory A. Gilliss, CISSP Telephone: 1 650 872 2420
Computer Engineering E-mail: [EMAIL PROTECTED]
Computer Security
it. Not really worth the trouble to use something like this as a
general-purpose personal machine. Trusted by Disney, Enron, DHS, but not the
user.
--
Gregory A. Gilliss, CISSP Telephone: 1 650 872 2420
Computer Engineering E-mail: [EMAIL
on
it.
--
Gregory A. Gilliss, CISSP Telephone: 1 650 872 2420
Computer Engineering E-mail: [EMAIL PROTECTED]
Computer SecurityICQ: 123710561
Software Development WWW
? Nope.
Night all =;^)
G
--
Gregory A. Gilliss, CISSP Telephone: 1 650 872 2420
Computer Engineering E-mail: [EMAIL PROTECTED]
Computer SecurityICQ: 123710561
Software Development
documentation and
detail on the cited 'Microsoft Virus Support(TM)'? I've not heard of this -
well, except through your posts. But, I'm open to be educated.
--
Gregory A. Gilliss, CISSP Telephone: 1 650 872 2420
Computer Engineering E
tampered, or not
official then it would be reflected by the signature not matching or
the key not being right. Then nobody could say anything about a Phrack
being valid or not. Might make things easier and make for less arguing.
--
Gregory A. Gilliss, CISSP
into and improve ways to enforce a security
policy (e.g. by using Mandatory Access Control (MAC)) would be one way to
proactively deal with security.
--
Gregory A. Gilliss, CISSP Telephone: 1 650 872 2420
Computer Engineering E-mail
.
G
On or about 2003.09.22 16:29:40 +, J. Race ([EMAIL PROTECTED]) said:
feh.
http://www.icann.org/correspondence/lewis-to-twomey-21sep03.htm
--
Gregory A. Gilliss, CISSP Telephone: 1 650 872 2420
Computer Engineering E-mail
it
attached is the ORGINAL EXPLOIT code i wrote months ago
SNIP
--
Gregory A. GillissTelephone: 1 650 872 2420
Computer Engineering E-mail: [EMAIL PROTECTED]
Computer SecurityICQ
its a seripus issue in one of its highly highlighted product
this would prove lot of inconvinence to most users [I DON'T THINK YOU
USE MOVIE MAKER]
--
Gregory A. GillissTelephone: 1 650 872 2420
Computer Engineering E-mail
(as well as almost any other software vendor) try to rule out by their
EULAs?
Regards
Ansgar Wiechers
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
--
Gregory A. Gilliss
passed, are they prepared
to see their employees who work on the Bugtraq email list go to jail?
;-)
--
Gregory A. GillissTelephone: 1 650 872 2420
Computer Engineering E-mail: [EMAIL PROTECTED]
Computer Security
. this case has nothing
to do with computers and any precedents that stem from this case should be
struck and nulled from the books.
--
Gregory A. GillissTelephone: 1 650 872 2420
Computer Engineering E-mail: [EMAIL PROTECTED
perhaps?
G
On or about 2003.09.09 15:09:49 +, Richard Spiers ([EMAIL PROTECTED]) said:
Hi guys, anybody got more information on this? Any thoughts?
http://www.theregister.co.uk/content/55/32653.html
--
Gregory A. GillissTelephone: 1 650 872 2420
Computer
1 - 100 of 102 matches
Mail list logo