Re: [Full-Disclosure] Erasing a hard disk easily

2004-07-12 Thread Maarten
t funds). And a DOS format will not defer anybody except newbies, nitwits and idiots. :-) [ the command for dd overwrite with zeros is: dd if=/dev/zero of=/dev/hd? ] Good luck with it. Maarten -- Yes of course I'm sure it's the red cable. I guarante[^%!/+)F#0c|'NO CARRIER

Re: [Full-Disclosure] Firefox 0.92 DoS via TinyBMP

2004-07-12 Thread Maarten
Linking to a page with a 4400 MB jpeg isn't exactly what I'd call a DoS, but the effect sure looks like it though ;-) However... maybe I was jumping to conclusions too quick... Since, for the record, Mozilla on linux doesn't suffer anything. Or so it seems. Maarten -- Yes of

Re: [Full-Disclosure] Re: Erasing a hard disk easily

2004-07-13 Thread Maarten
ve, a "privacy-enhanced" drive ? I'm just thinking here, but... Marketing-wise it would certainly be feasible, and it would leave paranoid people like us with a safer product, and how hard can it be to implement this in firmware ? Maarten -- Yes of course I'm sure it's

Re: [Full-Disclosure] Erasing a hard disk easily

2004-07-13 Thread Maarten
nes and zeros. For recovery of deleted data, you don't want such a digital yes/no signal, but an analog signal, so that you can differentiate between reading a 0.04 and a 0.08 instead of treating both (correctly) as zero. Drives do not offer that (analog) output and without that you cannot

Re: [Full-Disclosure] Erasing a hard disk easily

2004-07-14 Thread Maarten
ords out real0m4.770s user0m0.016s sys 0m4.513s [EMAIL PROTECTED]:~> time dd if=/dev/zero of=/dev/null count=1 1+0 records in 1+0 records out real0m0.269s user0m0.020s sys 0m0.019s Maarten ___ Full-Discl

Re: [Full-Disclosure] antisemtism, FD and bandwidth - what I want out of it

2004-07-22 Thread Maarten
gins with _physical_ security, one can easily argue that all those systems are notorously insecure. ;-) Maarten -- Yes of course I'm sure it's the red cable. I guarante[^%!/+)F#0c|'NO CARRIER ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

Re: [Full-Disclosure] Re:

2004-08-03 Thread Maarten
On Tuesday 03 August 2004 16:19, Ron DuFresne wrote: > On Tue, 3 Aug 2004, Esler, Joel - Contractor wrote: > > What is a "foto" > > no actually it is slang for phtograph, picture. Slang ?? What you call slang we actually recognise as German, Dutch, etc. __

Re: [Full-Disclosure] (no subject)

2004-08-12 Thread Maarten
quite simple to do, simple to update and overall better for everyone. Maarten > > ... Imagine that were the case in science, particular > > medicine... > > Or perhaps it would be better to imagine that you made a more > meaningful analogy, such as asking how well you think

Re: [Full-Disclosure] (no subject)

2004-08-12 Thread Maarten
malware names > become much less "precise", in the sense that instead of reporting > "Bagle.AA" and "Bagle.AB", product developers may respond to naming > consensus requirements by simply reporting both as "Bagle" (though > internal to the product t

Re: [Full-Disclosure] SP2 is killing me. Help?

2004-08-12 Thread Maarten
On Thursday 12 August 2004 17:34, Harlan Carvey wrote: > > i agree that this is "crap update". > > Ok. > > > don't use windoze for anything serious, but a person > > familiar with windoze > > said sp2 breaks so much warez it is unusable. > > Just how useful is a phrase like "breaks so much warez >

Re: [Full-Disclosure] (no subject)

2004-08-13 Thread Maarten
head... It happened on SO many occasions to me that the installed AV scanner did identify the virus but was unable to remove it (or it instantly came back after "removal") that I had to hunt down a different (better) removal tool (rescue-CD, dedicated removal tool, or otherwise). It is a

Re: [Full-Disclosure] (no subject)

2004-08-13 Thread Maarten
eaking down. Or are you saying you've never been asked to de-toxify your parents'-, friends'- or siblings'- computers that got infested despite everything ? Everyone has. Oh and P.S.: Yes, I did read all of the threads pertaining to this. Maarten On Friday 13 August 2004

Re: [Full-Disclosure] (no subject)

2004-08-13 Thread Maarten
On Saturday 14 August 2004 02:52, [EMAIL PROTECTED] wrote: > On Fri, 13 Aug 2004 21:17:44 +0200, Maarten said: > > The only thing Todd (and I) are trying to say is that it is possible to > > rename after the fact. I don't #!%$&* care how many old Cobol programs > >

Re: [Full-Disclosure] lame bitching about xpsp2

2004-08-14 Thread Maarten
l platforms. But at least MY vendor doesn't take several _months_ to provide such a patch. Unlike some other vendor we all know. Maarten -- Yes of course I'm sure it's the red cable. I guarante[^%!/+)F#0c|'NO CARRIER ___ Full-Disclo

[Full-Disclosure] meta-question about the list

2004-08-14 Thread Maarten
aste the right addresses. Is there a special reason this header isn't used ? Maarten -- Yes of course I'm sure it's the red cable. I guarante[^%!/+)F#0c|'NO CARRIER ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

Re: [Full-Disclosure] meta-question about the list

2004-08-15 Thread Maarten
On Sunday 15 August 2004 02:48, Brendan Dolan-Gavitt wrote: > On Sun, 15 Aug 2004 00:41:08 +0200, Maarten <[EMAIL PROTECTED]> wrote: > > Hi list, > > > > I noticed that this list (-software) unlike many others does not add a > > "Reply-To: field with the lis

Re: [Full-Disclosure] (no subject)

2004-08-15 Thread Maarten
On Sunday 15 August 2004 04:52, Nick FitzGerald wrote: > Maarten wrote: > > First off: Nick, please lose that damn attitude of yours ! > > Why? Because you're being rude, and anti-social. You don't score points with this. Jeez why do I even HAVE to explain thin

Re: [OT] Re: [Full-Disclosure] lame bitching about xpsp2

2004-08-19 Thread Maarten
om/wwpc/us/en/sm/ WF05a/321957-64295-89315-321838-f33-395654.html Linux (Novell/SuSE) preinstalled on HP nx5000 laptop... Maarten -- Yes of course I'm sure it's the red cable. I guarante[^%!/+)F#0c|'NO CARRIER ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

Re: [Full-Disclosure] Unsecure file permission of ZoneAlarm pro.

2004-08-20 Thread Maarten
the alarm system unlocks them again ? > Again, no issue. You must have a screw loose somewhere. Seriously. Maarten ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

Re: [Full-Disclosure] The 'good worm' from HP

2004-08-20 Thread Maarten
wsuits and or for prosecution even, but now that an important influential company like HP is suggesting (building) it, this may well signifiy an important shift in the fight against malware. I, for one, welcome the initiative... Maarten > -KF -- Yes of course I'm sure it'

Re: [Full-Disclosure] The 'good worm' from HP

2004-08-20 Thread Maarten
On Friday 20 August 2004 21:57, [EMAIL PROTECTED] wrote: > On Fri, 20 Aug 2004 19:55:51 +0200, Maarten said: > > Stuff like counter-attacking has been discussed often, whether in large > > open forums such as FD or in more private circles. Mostly, people were > > too concern

Re: [Full-Disclosure] The 'good worm' from HP

2004-08-21 Thread Maarten
f. I.e. to stay with the human virus analogy: you'll be hospitalized against your will cause you pose a health risk. Maarten ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

Re: [Full-Disclosure] U.S. National Security Awareness Day (NSAD)

2004-08-27 Thread Maarten
s just gibberish. What, are we gonna go back to building bomb shelters in the backyard now ? Or smile broadly and thank the officer who gave you a rear examination because you just wanted to fly from Paris to Brussels ? Maarten > Peter > > __

Re: [Full-Disclosure] Re: !SPAM! Automated ssh scanning

2004-08-28 Thread Maarten
ventually. It really was a pain. Mind you, that was a few years back, I get the distinct impression things have changed for the better now. Maarten -- Yes of course I'm sure it's the red cable. I guarante[^%!/+)F#0c|'NO CARRIER ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

Re: [Full-Disclosure] Re: Re: !SPAM! Automated ssh scanning

2004-08-29 Thread Maarten
On Sunday 29 August 2004 00:04, [EMAIL PROTECTED] wrote: > On Sat, Aug 28, 2004 at 10:23:36PM +0200, Maarten ([EMAIL PROTECTED]) wrote: > > I remember well that at one time I wanted to install a SuSE system > > without X, and just one package triggered 4 other packages

Re: [Full-Disclosure] viruses coming from this list..

2004-08-29 Thread Maarten
On Sunday 29 August 2004 19:28, Doomdaddy wrote: > Someone is using this list to send viruses,..stop the bs assclown. I get this distinctive deja-vu... let's see... 2 months ago ? -- Yes of course I'm sure it's the red cable. I guarante[^%!/+)F#0c|'NO CARRIER _

Re: [Full-Disclosure] Re: Re: Re: !SPAM! Automated ssh scanning

2004-08-29 Thread Maarten
On Sunday 29 August 2004 22:41, [EMAIL PROTECTED] wrote: > On Sun, Aug 29, 2004 at 09:27:10PM +0200, Maarten ([EMAIL PROTECTED]) wrote: > > On Sunday 29 August 2004 00:04, [EMAIL PROTECTED] wrote: > > > On Sat, Aug 28, 2004 at 10:23:36PM +0200, Maarten > > > ([EMAI

Re: [Full-Disclosure] Re: Why o why did NASA do this?

2004-10-15 Thread Maarten
; in vacuum. Incredible > boob vibrations in weightlessness captured on video. Much > better than Big Brother sex! LOL > All this on a double DVD for just 9.95$ and straight to your > door. Orders accepted from all people over 21 years old. > Will ship overseas for 5$. And how much

Re: [Full-Disclosure] RE: How to Break Windows XP SP2 + Internet Explorer 6 SP2

2004-10-20 Thread Maarten
On Wednesday 20 October 2004 17:07, Thor Larholm wrote: > I successfully reproduced this exploit on a fully patched XPSP2 > installation and can verify that malware.htm is planted locally after > which HTML Help is used to launch it and circumvent the XPSP2 browser > security improvements, compromi

Re: [Full-Disclosure] Senior M$ member says stop using passwords completely!

2004-10-20 Thread Maarten
i, passwords vs. passphrases, which do you recommend? I vote for passparagraphs ! ;-) Maarten ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

Re: [Full-Disclosure] MS03-039 has been released - critical

2003-09-10 Thread Maarten
If you do, please don't hesitate to keep it private for another 10 days or so to give us poor admins the chance to get patching ;-) > anyone know of a 'sploit for this one yet? Or even proof of concept code? > ___ Full-Disclosure - We believe in it. C

[Full-Disclosure] exploiting fortigate firewall through webinterface

2003-10-02 Thread Maarten
Issue: Several vulnerabilities in web interface of Fortigate firewall of which the most serious one will allow a remote attacker to obtain a username and password of the Fortigate. Release: pre 2.50 maintenance release 4 Fixed in: Fortinet OS 2.50 MR4, available from FTP as of 29 Sept. 2003 Date: 1

Re: [Full-Disclosure] Coming soon: CPU fix for buffer overflows

2004-02-24 Thread maarten
That is not proven. If the expansion and subsequent predicted collapse of the universe happens _sooner_ than that poor 4004 finishing its quantum simulation answer, your theory does not fly.;-)) Maarten > Regards, > Maz -- Yes of course I'm sure it's the red cable. I guarante

Re: [Full-Disclosure] a question about e-mails

2004-02-26 Thread maarten
admin). If that were not the case, that would mean using BCC has a hole in it big enough to drive a truck through... and we would have heard about it. Maarten > Warm regards, > Sandeep. > > -Original Message- > From: ASLI Unur [mailto:[EMAIL PROTECTED] > Sent: Thu 26

Re: [Full-Disclosure] a question about e-mails

2004-02-27 Thread maarten
On Thursday 26 February 2004 14:35, Nico Golde wrote: > Hallo Chris, > > I tested it on my system. > i send a mail to nico and bcc root. > here is the mail header: > Bcc: root > > ^ > here is the bcc line Hehe. Well, since you obviously can read hidden BCC headers that we 'nor

Re: [Full-Disclosure] Backdoor not recognized by Kaspersky

2004-03-03 Thread maarten
Option A) is not really [usually] acceptable in the real world. (YMMV) Maarten -- Yes of course I'm sure it's the red cable. I guarante[^%!/+)F#0c|'NO CARRIER ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

Re: [Full-Disclosure] Comcast using IPS to protect the Internet from their home user clients?

2004-03-09 Thread Maarten
ng, that would fix a lot of problems with compromised boxes, but they should allow for non-clueless people to still run their servers, for instance by a configurable setting in the ISPs' service pages. Maarten > ps::: I may have the adders ass-backwards the linux boxes might have got

[Full-Disclosure] Blaster: will it spread without tftp?

2003-08-14 Thread Maarten
understanding the impact of the worm. I also read something about SP0|1|2 on W2K not being vulnerable to msblaster (probably because of the "universal" offsets used). Is there anyone that can confirm this finding? maarten ___ Full-Disclosure - We bel

Re: [Full-Disclosure] viruses being sent to this list

2004-03-24 Thread Maarten
ere special mailinglist, and soon spammers will stop sending you their junk, for they will FEAR who you associate with." Great stuff! just kidding, of course... ;-) Maarten ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com

Re: [Full-Disclosure] SHUT UP

2004-03-24 Thread Maarten
th-a-password, and Eve... Eve just opens her inbox ;-) Well. I must say... yeah, it's a fitting analogy. ;-) Maarten ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

Re: [Full-Disclosure] viruses being sent to this list

2004-03-24 Thread Maarten
st because of the paranoia that often comes with this job- they may change their minds when they subscribe to FD. You know the sign... "Ye who enter here... yada yada yada". ;-) Well... this subject has been beaten to death, and I even helped a bit. I will now crawl ba

Re: [Full-Disclosure] Bugfinder Being Indicted As Criminal ("Counterfeiter") in France

2004-03-31 Thread Maarten
On Wednesday 31 March 2004 22:20, Drew Copley wrote: > http://www.guillermito2.net/archives/2004_03_25e.html > > [thanks to AJ 'Effin' Reznor] > > [Disclaimer: I don't know who has seen this already, and I do not > pretend to know the full facts of the case. -- Drew ] Yeah, the story hit Slashdot

Re: [Full-Disclosure] erase with magnet

2004-04-03 Thread Maarten
On Saturday 03 April 2004 17:36, B$H wrote: > Hi all! > > I'm interested in the original question about erasing a harddrive using a > magnet. Is it possible to erase data on a hard disk drive with a powerful > magnet, but then be able to use the drive and the PC again? No, not really. The thing

Re: [Full-Disclosure] erase with magnet

2004-04-04 Thread Maarten
www.periphman.com/degaussing/degaussers/v92.shtml Quote: "Do not operate the degausser if you have a pacemaker." Maarten ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

Re: [inbox] Re: [Full-Disclosure] erase with magnet

2004-04-04 Thread Maarten
, you might change your viewpoint... Maarten -- Linux: Because rebooting is for adding hardware. ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

Re: [Full-Disclosure] Wiretap or Magic Lantern?

2004-04-07 Thread Maarten
ication is largely irrelevant, the fact that a contact was established is enough. Remember, terrorists don't need to be _secret_, they need to be inconspicuous. Maarten -- Linux: Because rebooting is for adding hardware. ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

Re: [Full-Disclosure] Wiretap or Magic Lantern?

2004-04-07 Thread Maarten
On Wednesday 07 April 2004 14:12, Szilveszter Adam wrote: > Hello all, > BTW as for some of the myths that accompany these covert ops in > cyberspace: you would be really surprised to learn how sophisticated > criminals have already been caught simply by sending them HTML email > that contained

Re: [Full-Disclosure] Wiretap or Magic Lantern?

2004-04-07 Thread Maarten
ertain it remains a secret at all cost. Maarten -- Linux: Because rebooting is for adding hardware. ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

Re: [Full-Disclosure] Wiretap or Magic Lantern?

2004-04-07 Thread Maarten
On Wednesday 07 April 2004 17:39, Exibar wrote: > Now of course, if they are monitoring ALL internet traffic, we've all > been flagged because we've used NSA and terrorists in the same e-mail. > Good thing we didn't mention anything about m-16's or poison gas bombs, or > anything like that too!

Re: [Full-Disclosure] Wiretap or Magic Lantern? (on PGP)

2004-04-07 Thread Maarten
being aware is priceless. (see also: WWII, Enigma) See my point ? Maarten -- Linux: Because rebooting is for adding hardware. ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

Re: [Full-Disclosure] Wireless ISPs

2004-05-11 Thread Maarten
sound. Funny things that, laws... ;) > Please direct all flames to /dev/null Okay. Well then, on a more serious note: Either look into SSL encrypting your mail ( pop3s / imaps / ... ), or encrypt your entire wireless traffic, either by WEP (trivially crackable but may deter amateurs

Re: [Full-Disclosure] Wireless ISPs

2004-05-11 Thread Maarten
gt; > Dan, the internet is an unsafe place for sensitive > > data. I would suggest some study in different > > encryption methodlogies to educate yourself. > > Education leads to positive, well thought out data > > communication, which leads to peace of mind. Well put. Maart

Re: [Full-Disclosure] Wireless ISPs

2004-05-11 Thread Maarten
ormed. Give them a choice and they will always go for the status quo / the easiest way. Give them NO choice and you're good. Maarten ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

Re: [Full-Disclosure] User bypass privs for Mysql??

2004-05-18 Thread Maarten
gt; database. > > Of course, I did have select, insert on mysql.. probably why huh? I'm not a mysql guru but... yes. That would be akin to disallowing the use of 'chsh' and 'chfn' but in the meantime having /etc/passwd world-writeable... Maarten > -Or

Re: [Full-Disclosure] irc over ssl

2004-05-24 Thread Maarten
On Monday 24 May 2004 12:41, Giannakis Eleftherios wrote: > Hello everybody, > > are there any known issues concerning rootkits, backdoors, cmd execution > concerning an irc(with ssl) client ? I use the irssi client to conect to a > irc server with ssl.Is there a way for the admins of the irc serve

Re: [Full-Disclosure] irc over ssl

2004-05-24 Thread Maarten
On Monday 24 May 2004 21:37, adam wrote: > Just because they're using mIRC, doesn't mean that they aren't > unix/cisco > tech geeks. Ever consider that they might have run Windows on their > workstations at work? And even so using the clients that have been ported > to Windows might

Re: [Full-Disclosure] Odd packet?

2004-05-25 Thread Maarten
eek and nothing > changed here. Thanks for any help. Notwithstanding what I said above, spoofing 127.0.0.1 would not really serve a purpose for an attacker. A full TCP handshake would never occur, and a DoS is likewise impossible (or at least real unlikely). But who knows... Any packet dumps

Re: [Full-Disclosure] Odd packet?

2004-05-25 Thread Maarten
On Tuesday 25 May 2004 22:35, Steffen Schumacher wrote: > On 25.05.2004 21:55:19 +0000, Maarten wrote: > > On Tuesday 25 May 2004 15:57, Gregh wrote: > > > Getting quite a few 127.0.0.1 on differing ports lately and I know it > > > isn't originating FROM this mach

Re: [Full-Disclosure] Odd packet?

2004-05-25 Thread Maarten
On Tuesday 25 May 2004 23:10, Valentino Squilloni - Ouz wrote: > On Tue, 25 May 2004, Maarten wrote: > > Not saying what you see must be wrong but, if your routing / packetfilter > > / kernelsettings were properly configured you would not ever get these > > packets as they wo

Re: [Full-Disclosure] Cisco's stolen code

2004-05-25 Thread Maarten
CO ... SCO ? What's that, is that short for ciSCO...? ;-)) Maarten -- Yes of course I'm sure it's the red cable. I guarante[^%!/+)F#0c|'NO CARRIER ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

Re: [Full-Disclosure] Re: Cisco's stolen code

2004-05-26 Thread Maarten
rived from too-large-for-fair-use pieces thereof. I advise against > seeking it or messing with it unbeknownst to the owners. Yeah, precisely. Maarten > -Original Message- > From: [EMAIL PROTECTED] > [mailto:[EMAIL PROTECTED] Behalf Of Tobias > Weisserth > Sent: Wednesday,

Re: [Full-Disclosure] Imaging Operating Systems

2004-05-27 Thread Maarten
ores using readily available linux tools? I'd like to be able to do something like running dd over a network connection, or tar, or whatever other tool. In that case, a bootable CD is all you need. But I'm unsure how to do that... Maarten -- Yes of course I'm sure it's the

Re: FW: [Full-Disclosure] Re: Cisco's stolen code

2004-05-27 Thread Maarten
[ cc: FD ] On Thursday 27 May 2004 15:18, you wrote: > Maarten - > This letter I wrote is relevant to your point also. It offers a > scenario in which the code is acquired legally. > > To be sure I am not really that concerned with Cisco's code one way > or the other. I A

Re: [Full-Disclosure] Imaging Operating Systems

2004-05-27 Thread Maarten
On Thursday 27 May 2004 18:30, Kevin Connolly wrote: > Maarten wrote: > > This is an interesting thread... But out of curiosity, is it also > > possible to do backup / restores using readily available linux tools? > > I'd like to be able to do something like

Re: [Full-Disclosure] Imaging Operating Systems

2004-05-27 Thread Maarten
tra effort or cost... Maarten On Thursday 27 May 2004 17:29, Maarten wrote: > On Thursday 27 May 2004 16:09, Nick FitzGerald wrote: > > Michael Schaefer <[EMAIL PROTECTED]> wrote: > > > We are building a Windows test system, to try out tool bars, spy ware, > > > mal

Re: [Full-Disclosure] Web sites compromised by IIS attack

2004-07-01 Thread Maarten
nces of 'Problem noted by' > in the release notes. Except for the fact that your math is off; 15 times 90 equals 1350, not 135. By that number, we'd have to assume that not even half of sendmails' bug are found as of yet, which imho is a little hard to believe. just nitpic

Re: [Full-Disclosure] software burning cpu or mobo ?

2004-07-02 Thread Maarten
of junk), and IIRC the Mandrake issue also could not be fixed without returning the unit to the factory. So, "real" damage or not (depending on your viewpoint), it still kills your system, even beyond repair in most cases. Maarten -- Yes of course I'm sure it's the

Re: [Full-Disclosure] Web sites compromised by IIS attack

2004-07-03 Thread Maarten
nough has been said on that subject anyway... So no, of course your ISP does not have to support the stuff you download off the net. And no, neither are they resonsible if someone sends you a trojan. Maarten -- Yes of course I'm sure it's the red cable. I guarante[^%!/+)F#0c|'N

Re: [Full-Disclosure] Web sites compromised by IIS attack

2004-07-03 Thread Maarten
sandwich at a normal price. Do you sue in this case ? Note: I don't have all the answers to the above... just some food (pun not intended) for thought... Maarten > What type of support you get is contractual based on what you service > level you "buy". > > When Red Hat re

Re: [Full-Disclosure] VERY HIGH VULNERABILITY DISCLOSURE !!! MASS ROOT POSSIBLE !!! PLEASE BE ATTENTIVE !!!

2004-07-03 Thread Maarten
adly, there is a bug in in the php.ini file. Set register_globals to ON, otherwise this software will not function." That they even dare calling it a "bug" is beyond arrogance. Maarten -- Yes of course I'm sure it's the red cable. I guarante[^%!/+)F#0c|'NO CAR

Re: [Full-Disclosure] Successful in blocking all known exploits

2004-07-03 Thread Maarten
On Saturday 03 July 2004 18:25, J.A. Terranson wrote: > On Sat, 3 Jul 2004, RandallM wrote: > > After a number of years, much thought,and long nights I have developed a > > systematic method to prevent and thwart exploits on my system! > > > > NEVER REBOOT! > > > > I have been up and running for 8

Re: [Full-Disclosure] Gmail Information Disclosure Vulnerability

2004-07-05 Thread Maarten
an issue? Besides, the hole isn't that serious, so where's the fire anyway ? Maarten -- Yes of course I'm sure it's the red cable. I guarante[^%!/+)F#0c|'NO CARRIER ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

Re: [Full-Disclosure] Gmail Information Disclosure Vulnerability

2004-07-05 Thread Maarten
e public will find > some security holes... > > If we must publish all security advisorys about beta software, this list > will be flooded... The very reason to HAVE a beta test phase is to find and flush out bugs early. Doing that, the released program can be as flawless as can be.

[Full-Disclosure] vulnerabilities in fortigate firewall webinterface

2003-11-12 Thread Maarten Hartsuijker
ISSUE Several vulnerabilities in web interface of Fortigate firewall of which the most serious one will under specific circumstances allow a remote attacker to obtain a username and password of the Fortigate. RELEASE pre 2.50 maintenance release 4 FIXED Issue 3 - Fortinet OS 2.50 MR

Re: [Full-Disclosure] Blaster: will it spread without tftp?

2003-08-14 Thread Maarten Hartsuijker
> nope. It can be downloaded from the infected host(s). It'll spread > inside the Intranet just fine. Thank you! > Buckle your seatbelt, it's going to be a bumpy night - at least for > you. ;^) Well, not this night. Have been monitoring my segment all day and have not seen any attempts (on the ins

[Full-Disclosure] shopfactory shopping cart

2003-03-05 Thread Maarten Hartsuijker
Security advisory Issue: Shopfactory e-commerce application allows alteration of order details Date: 03/05/03 Vendor first notified: December 2002 Affected versions: All available versions (current version Shopfactory 5.8) ABOUT SHOPFACTORY: Shopfactory is a shopping cart solution. According

[Full-Disclosure] Re: Web server http protocol version support

2004-11-12 Thread Maarten Van Horenbeeck
pecific to certain server types (encoding, default settings such as keepalive), this is quite reliable. Cheers, Maarten -- Maarten Van Horenbeeck, GCIA <[EMAIL PROTECTED]> http://www.daemon.be/maarten ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html