intently.
And another day passes without useful information exchange.
What a great list this is.
Paul Schmehl ([EMAIL PROTECTED])
Adjunct Information Security Officer
University of Texas at Dallas
AVIEN Founding Member
http://www.utdallas.edu/
___
Full
nd couldn't agree more. ISearch gets it's
> hooks so far into a system that it can only be classed as the garbage
> spyware program that it is(IMHO).
>
> Goos job and good luck!
>
> Paul Laudanski wrote:
> > In a letter received by CastleCops from a law firm re
Hi,
Sometimes you can tell that there is a problem with a software product
when you type the name of it in Google and it comes back with the "Sponsored
Links" as "Remove [software name here]" :)
Check it out:
http://www.google.com/search?hl=en&q=isearch&btnG=Google+
/shownews/60608
http://www.revenews.com/wayneporter/archives/000429.html
http://www.wilderssecurity.com/showthread.php?t=67648
--
Regards,
Paul Laudanski - Computer Cops, LLC.
CastleCops(SM) - http://castlecops.com
http://cuddlesnkisses.com | http://justalittlepoke.com | http://zhen-xjell.com
Seriously, doesn't Microsoft has anything better to do...
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Berend-Jan
Wever
Sent: Thursday, February 17, 2005 10:14 AM
To: full-disclosure@lists.netsys.com
Subject: [Full-Disclosure] A parent's primer to comp
appropriate
keys. That's how I do it - using KiXtart I can determine major and minor
revs as well as dat versions by reading the registry keys.
Paul Schmehl ([EMAIL PROTECTED])
Adjunct Information Security Officer
The University of Texas at Dallas
AVIE
Folks, here is a summary of a discussion with Mark at Eset for NOD32 about
.tar.bz2. So what do you folks think, how many people would like to see
this capability?
--
Regards,
Paul Laudanski - Computer Cops, LLC.
CastleCops(SM) - http://castlecops.com
http://cuddlesnkisses.com | http
ction vector, although probably not all that useful for viruses. I
> don't believe many users will go googling for the tools needed.
> Nonetheless at least a few of the vendors think it's necessary to go
> beyond the common zip and rar.
--
Regards,
Paul Laudanski
ly other archive formats
> that aren't very common on windows systems (but supported by the common
> archive tools).
>
> Full write up here:
> http://zeedo.blogspot.com/2005/02/multiple-av-vendors-ignoring-targz.html
--
Regards,
Paul Laudanski - Computer Cops, LLC.
CastleC
ublic would like to know from Computer Associates who now
own PestPatrol. Will they continue to remain partners with COAST? As
Wayne put it, "Is COAST Toast"?
trackbacks:
http://alpha.revenews.com/MT/mt-tb.cgi/337
http://castlecops.com/trackback/News/5719
--
Regards,
Paul Laud
Under a default or "dumb" switched environment, both the switch and the
victim hosts will digest the phony ARP broadcasts sent by tools like Cain or
Ettercap. Static ARP entries on a server should be enough to prevent
session hijacking, but in order to stop eavesdropping, both victims need
static
,
Paul Laudanski - Computer Cops, LLC.
CastleCops(SM) - http://castlecops.com
http://cuddlesnkisses.com | http://justalittlepoke.com | http://zhen-xjell.com
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
vulnerability
> Date: January 30, 2005
> Bugs: #78522
> ID: 200501-45
>
> - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
>
--
Regards,
Paul Laudanski - Computer Cops, LLC.
CastleCops(
Interesting Site. When I went to the page, McAfee VirusScan notified me of
an script it blocked on the page. The blocked script, a virus, was called
"JS/Stealus.gen". After some research, I found the script "exploit(s) an
Internet Explorer vulnerability resulting in Internet Explorer displaying
one
--On Saturday, January 29, 2005 12:37 AM -0800
[EMAIL PROTECTED] wrote:
Paul Schmehl Said:
No, because non-routeable addresses are...wellnon-routeable.
But Paul, I route non-routable addresses all the time. It is only
internet routers that are usually configured to not route certain
for that session.
Of course you have to know in advance all those variables, so, since you're
sitting right there, just pound the dern thing with a hammer and be done
with it. :-)
Paul Schmehl ([EMAIL PROTECTED])
Adjunct Information Security Officer
The University of Texas at Dallas
AVIEN
Wouldn't the phone try to open the jpg file as a picture, and not execute
it. Just like on desktop PCs: if you rename a .exe (application/program) to
a jpg (picture file), and try to open the file, your image program will open
the file, thinking it is a image file. The application code will not be
; any any (msg:"IRC communications"; content:
JOIN; sid: 100; rev:1;)
alert tcp $HOME_NET any -> any any (msg:"IRC communications"; content:
PRIVMSG; sid: 101; rev:1;)
Paul Schmehl ([EMAIL PROTECTED])
Adjunct Information Security Officer
The University of Texa
Mind control is also when Bush was given answers at the first debate; by a
radio receiver hidden under his coat
(http://www.washingtonpost.com/wp-dyn/articles/A18734-2004Oct8.html). But
when the media questioned Bush, he just said it was a "poorly tailored"
suit. Yeah right!
-Paul
---
Multiple Vulnerabilities in Netgear FVS318 Router
http://www.securinews.com/vuln.htm?vulnid=103
-
Overview:
The Netgear FVS318 is an easy to use, firewall/router designed for home users
and small businesses. SecuriNews Research has found 2 vulnerab
Sometimes :)
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Joel Esler
Sent: Friday, January 14, 2005 10:11 PM
To: Danny
Cc: Full-Disclosure (E-mail)
Subject: Re: [Full-Disclosure] Google.com down?
Wait a minute, "my Windows XP TCP/IP stack and DNS reso
Are there any good modern wardialers that will work in windows 2003 or
RHES? I don't want to have to babysit a dos box running toneloc. My
goal is to run and view the results of scans across the network.
___
Full-Disclosure - We believe in it.
Charter:
We've had nothing but problems with SBC. I would look at AT&T Business DSL.
Pricy ($80-$100), but the speed is awesome (3.0 Mbps). They do not block
port 25. Yeah!
-Paul Kurczaba
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of J.A.
Terranson
Sen
It is up at 18:46 EST
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Jianqiang
XinSent: Friday, January 14, 2005 11:23 AMTo:
Full-Disclosure (E-mail)Subject: [Full-Disclosure] Amazon.com is
down
It seems that Amazon.com is
down. Is it related to any attack?
__
Works perfectly! The crash dialog says the the error exists in user32.dll
-Paul
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of sourvivor
Sent: Thursday, January 13, 2005 6:09 PM
To: full-disclosure@lists.netsys.com
Subject: [Full-Disclosure] little
y correct. Exploiting this race condition is very easy,
however it is always difficult to exploit SMP race conditions if the load
is high, since you must achieve parallel execution of two threads and the
scheduler may prevent you from parallel execution in that case.
--
Paul Starzetz
iSEC
I feel bad for the poor folks that follow the "Workaround" :(
-Paul
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Team Pwnge
Sent: Tuesday, January 11, 2005 5:52 PM
To: [EMAIL PROTECTED]; bugtraq@securityfocus.com;
full-disclosure@lists.
That is the same thing I found :) What a waste of bandwidth... He could have
at least sent it from a hijacked box in the US :) O, well...
-Paul
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Eric Paynter
Sent: Wednesday, January 12, 2005 4:32 PM
To
Hi list,
Firstly, I sent an email to a client quoting some prices on the server that we use for our own website and it arrived with the (correctly) typed £ sign as a capital 'L' .I then sent a test email to myself from my ISP account to my address on this same (questionable) server and it was perf
://www.kernel.org/
URL: http://isec.pl/vulnerabilities/isec-0022-pagefault.txt
CVE: CAN-2005-0001
Author:Paul Starzetz <[EMAIL PROTECTED]>
Date: Jan 12, 2005
Issue:
==
Locally exploitable flaw has been found in the Linux page fault handler
code that allows users to gain
Why not also delete KDE, Gnome and all the other desktops out there.
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Team Pwnge
Sent: Tuesday, January 11, 2005 5:52 PM
To: [EMAIL PROTECTED]; bugtraq@securityfocus.com;
full-disclosure@lists.netsys.com
Subj
including 2.6.10
Vendor:http://www.kernel.org/
URL: http://isec.pl/vulnerabilities/isec-0021-uselib.txt
CVE: CAN-2004-1235
Author:Paul Starzetz <[EMAIL PROTECTED]>
Date: Jan 07, 2005
Issue:
==
Locally exploitable flaws have been found in the Linux binary
here the plagiate.
--
Paul Starzetz
iSEC Security Research
http://isec.pl/
-- Forwarded message --
Date: Fri, 7 Jan 2005 09:39:18 +0100 (CET)
From: Janusz Niewiadomski <[EMAIL PROTECTED]>
Reply-To: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: [iSEC] [Dailydave] Advi
kernel
Version: 2.4 up to and including 2.4.29-rc2, 2.6 up to and including 2.6.10
Vendor:http://www.kernel.org/
URL: http://isec.pl/vulnerabilities/isec-0021-uselib.txt
CVE: CAN-2004-1235
Author:Paul Starzetz <[EMAIL PROTECTED]>
Date: Jan 07, 2005
Issue:
==
L
sion will be free and allow for centralized
> domain management. It's the least that Microsoft can do.
To expand on your tests, I know this doesn't include the Microsoft
rebranded Giant, but this is worth a look:
http://spywarewarrior.com/asw-test-guide.htm
--
Regards,
Paul Lauda
--On Thursday, January 06, 2005 08:07:13 AM +0530 "ALD, Aditya, Aditya
Lalit Deshmukh" <[EMAIL PROTECTED]> wrote:
Dear paul I think you answered your own question over here - its perl!
Yeah, I'm beginning to think that's what I'm going to have to do.
However there
5%28%24%48%54%54%50%5F%47%45%54%5F%56%41%52%53%5B%72%75%73%68%5D%29.%2527
>
> HTTP/1.1"
--
Regards,
Paul Laudanski - Computer Cops, LLC. CEO & Founder
CastleCops(SM) - http://castlecops.com
Promoting education and health in online security and privacy.
On Sat, 25 Dec 2004, Paul Laudanski wrote:
> [code]
> SecFilter "visualcoders\.net/spy\.gif\?\&cmd"
> SecFilter ":/"
> [/code]
>
> Just in case the URL changes, the latter should still get all sorts of:
>
> http://
> ftp://
>
> Natu
, for example, could tell me all the machines
on our network that are running copies of phpBB (obvious reasons) so that
we could quickly identify potential problem areas.
Paul Schmehl ([EMAIL PROTECTED])
Adjunct Information Security Officer
The University of Texas at Dallas
AVIEN
too sooper sekrit to share with us
mere mortals. (Sort of like the alien corpses they have hidden out in Area
51.)
Paul Schmehl ([EMAIL PROTECTED])
Adjunct Information Security Officer
The University of Texas at Dallas
AVIEN Founding Member
http://www.utdallas.edu
___
closure but that also
requires you to notify the vendor (there were no @eeye.com's in your
"to" list but there were a couple of press mailboxes).
Your entire post could be classified as casting perls before swine.
Paul Schmehl ([EMAIL PROTECTED])
Adjunct Information Security Officer
On Sun, 26 Dec 2004, Raistlin wrote:
> Paul Laudanski wrote:
>
> > Certainly doing it to /tmp, /usr/tmp, /var/tmp
> > could help, but it isn't 100% foolproof, and some don't even consider it
> > security.
>
> Just a bit of hardening :)
There are a cou
positives are analyzed.
http://castlecops.com/article5642.html
Filter examples are provided for:
- modsecurity
- php
- modrewrite
A couple hardening suggestions are also included.
--
Regards,
Paul Laudanski - Computer Cops, LLC. CEO & Founder
CastleCops(SM) - http://castlecops.com
Promo
BILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE, AND
NONINFRINGEMENT. http://castlecops.com/article1.html
--
Regards,
Paul Laudanski - Computer Cops, LLC. CEO & Founder
CastleCops(SM) - http://castlecops.com
Promoting education and health in online security and privacy.
_
Then again, you can always disable the functions in php.ini for exec and
system for instance to help stave off other similar attacks.
--
Regards,
Paul Laudanski - Computer Cops, LLC. CEO & Founder
CastleCops(SM) - http://castlecops.com
Promoting educati
[/quote]
It is making use of the highlight exploit in pre phpbb 2.0.11.
Even though the 'worm' itself may be hindered, we can certainly expect
script kiddies to attempt these manually.
http://www.modsecurity.org/blog/archives/46.html
Now that is catching the single quote in the h
ition to what others have
stated:
http://www.mynetwatchman.com/
http://www.zone-h.org/
--
Regards,
Paul Laudanski - Computer Cops, LLC. CEO & Founder
CastleCops(SM) - http://castlecops.com
Promoting education and health in online security and privacy.
[This message is for the designa
ve any of you encounted
this before?
php 4.3.9 has several serious security flaws in it. (See here for more
info - <http://www.php.net/release_4_3_10.php>). You should have upgrade
it ASAP. That's most likely how the script altered the files.
Paul Schmehl ([EMAIL PROTECTED])
Ad
-2004-1016
Author:Paul Starzetz <[EMAIL PROTECTED]>
Date: Dec 14, 2004
Issue:
==
A locally exploitable flaw has been found in the Linux socket layer,
that allows a local user to hang a vulnerable machine.
Details:
The Linux kernel provides a powerful socket A
On Tue, 14 Dec 2004, Leif Sawyer wrote:
> Tested on UltraSparc 32-bit userland, Gentoo 2004.3 2.6.7-rc2 SMP
> Excellent
You dream... Maybe just the expl code is buggy, I never claimed it works
for all vulnerable configurations. Just read your kernel source :-]
--
Paul Starzet
ND
NONINFRINGEMENT.
Comments
Because security is everything, CastleCops encourages the pursuit
of education and health in security, privacy, and computing via
the continuous renewal of open discussions for the benefit of all.
: CAN-2004-1137
Author:Paul Starzetz <[EMAIL PROTECTED]>
Date: Dec 14, 2004
Issue:
==
Multiple locally as well as remotely exploitable bugs have been found in
the Linux IGMP networking module and the corresponding user API.
Details:
The IGMP (or internet group mana
GreyMagic Security <[EMAIL PROTECTED]> kindly made an online decoder
available at
http://www.greymagic.com/security/tools/decoder/
On occasions it may be more useful to have a "local" decoder: I often
use the following perl script.
Cheers,
Paul Szabo - [EMAIL
;;
some_time)
OPTION=1
;;
lots_of_time)
OPTION=2
;;
*)
echo $"Usage: 0$ {no_time|some_time|lots_of_time}"
exit 1
esac
Paul Schmehl ([EMAIL PROTECTED])
Adjunct Information Security Officer
The University of Texas at Dallas
AVIEN Fou
Whether it be because of legal or other reasons
it would seem the server Lycos used to distribute
the list of spammer's servers has been taken off
line. Now the screensaver simply displays a
"Please Stand By" message and no get requests are sent.
=
The defaced iamge is attached.
Catch
The deface image is attached.
one step at a time...
Find local movie times and trailers on Yahoo! Movies.<>
uot;automated updates" that she doesn't have to deal with. On
a corporate network, that's doable, but at home??? I explained to her why
trusting her computer's updates to someone else was a bad thing, but that
only made her more knowledgeable, not more happy. :-)
Paul
ity in the hands
of the county election board for *that very reason*.
Might want to study up a bit - political machines from Boss Tweed to
Richard Daley have had absolutely *no* problems in getting the ballot
to go the way they wanted....
Yes, *before* electronic balloting.
Paul Schmehl ([EMAIL
ncing their behavior or outcome couldn't possibly be
surmounted.
Jason, I'm not making anything complicated. I'm observing the complication
that already exists - the complication that you apparently refuse to
acknowledge.
Paul Schmehl ([EMAIL PROTECTED])
Adjunct Information Secu
- Original Message -
From: "Gregory Gilliss" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Tuesday, November 23, 2004 5:27 PM
Subject: Re: [Full-Disclosure] University Researchers Challenge Bush Win In
Florida
>
> But, for heaven's sake, leave Paul
ot;, "Bushie the bozo",
etc., etc. Who knew.
Jason, you really need to think before posting. You're beginning to look
silly.
Paul Schmehl ([EMAIL PROTECTED])
Adjunct Information Security Officer
The University of Texas at Dallas
AVIEN Founding Member
http://www.utdallas.ed
My thanks to all who replied both on & off-list.
Your various points have been noted.
Regards
=
one step at a time...
Find local movie times and trailers on Yahoo! Movies.
http://au.movies.yahoo.com
___
Full-Disclosure - We believe in it.
Chart
le to
act in concert for extended periods of time. Given man's overwhelmingly
selfish and greedy nature, it's impossible to think that every single
participant in the conspiracy would maintain both their loyalty *and* their
silence throughout.
Paul Schmehl ([EMAIL PROTECTED])
Adju
--On Monday, November 22, 2004 07:56:14 PM +0530 Sandeep Singh Rawat
<[EMAIL PROTECTED]> wrote:
Are we able to run Explorer.exe using runas utility...
Of course. You can run any binary using runas. You may have to use
absolute paths, but that's a minor inconvenience.
Paul Schm
ted by it, *if* thats possible.
I'm still not convinced that, more than a few feet from a device, the
interference would even be detectable.
Paul Schmehl ([EMAIL PROTECTED])
Adjunct Information Security Officer
The University of Texas at Dallas
AVIEN Founding Memb
Thanks guys, and thanks for the welcome Benjamin.
I figured CISSP would be what to aim for.
Unfortunately Cisco cert is covered by the
networking major at my college while I'm doing
web-design/admin. I guess that means I'm in for
plenty of reading beyond the course and plenty of
prac pentesting
While I gotta agree that experience is what
counts, what (if any) specialist certs should a
tertiary student, with a special interest in
security, use to underpin their prac?
P.S. If I'm too ignorant to warrant a civil
answer, like being told to go to the movies, my
apologies in advance so no flam
--On Friday, November 19, 2004 2:30 PM -0800 Daniel Veditz
<[EMAIL PROTECTED]> wrote:
Paul Schmehl wrote:
Even *if* they are correct (which is at least debateable) the 130,000
vote discrepancy they argue for won't overcome Bush's lead of 380,000,
so this is, at best, an acade
a user who is actually just a "User". Not once, ever.
And this is a flaw of the *OS*? Or of the *OEM*?
Paul Schmehl ([EMAIL PROTECTED])
Adjunct Information Security Officer
The University of Texas at Dallas
AVIEN Founding Member
http://www.utdallas.edu
___
--On Friday, November 19, 2004 1:15 PM -0600 [EMAIL PROTECTED] wrote:
Paul, do you really feel that as long as the (potentially) fraudulent
votes did not change the outcome (as far as we know...knowing absolutely
nothing for certain at this point) it's perfectly ok that a method for
fixing
ubject before
you claim expert status and presume to preach to others.
While we're lecturing the unwashed, would you mind trimming your replies?
Who needs six levels of FD disclaimers?
Paul Schmehl ([EMAIL PROTECTED])
Adjunct Information Security Officer
The University of Texas at
trary location(s) in kernel space.
The condition is not easy to exploit since an attacker must trick
kmalloc() to sleep on allocation of a special chunk of memory and then
convince the scheduler to execute another thread. But it is feasible.
Conclusion: update as quick as possible to 2.4.28.
- --
Bush's lead of 380,000, so this
is, at best, an academic exercise.
Paul Schmehl ([EMAIL PROTECTED])
Adjunct Information Security Officer
The University of Texas at Dallas
AVIEN Founding Member
http://www.utdallas.edu
___
Full-Disclosure - We b
--On Thursday, November 18, 2004 09:32:27 AM -0600 Paul Schmehl
<[EMAIL PROTECTED]> wrote:
--On Wednesday, November 17, 2004 12:41:44 PM -0500 "Lachniet, Mark"
<[EMAIL PROTECTED]> wrote:
Could also be RF interference. One of my coworkers tracked down a
particularly in
generated with the cracked version of Sound Forge 4.5.
Cheers,
Paul Szabo - [EMAIL PROTECTED] http://www.maths.usyd.edu.au:8000/u/psz/
School of Mathematics and Statistics University of Sydney 2006 Australia
___
Full-Disclosure - We believe in it
e the same
could happen with other interference. Having a common SSID would seem
to indicate this is not the problem, but just thought I'd mention it.
Thanks for a particularly interesting and potentially useful bit of
information, Mark.
Paul Schmehl ([EMAIL PROTECTED])
Adjunct Information
When you do an "ls", you are making a call that the *os* has to respond to.
The os is *not* vulnerable, so it (properly) rejects the request as
malformed.
Hopefully that makes more sense to you.
Paul Schmehl ([EMAIL PROTECTED])
Adjunct Information Security Officer
The University of Texa
http://www.securityfocus.com/news/9866
I have seen nothing stating that this is a spoof.
On Tue, Nov 16, 2004 at 04:58:46PM +, n3td3v wrote:
> The site which was hosting services, like bombs, fake ID and other
> terrorist stuff is now showing a defacement or replacement page
> showing wor
erica?
No, it was to avoid the dangers of democracy.
Why stop the people from leraning?
Because this is the wrong forum.
Paul Schmehl ([EMAIL PROTECTED])
Adjunct Information Security Officer
The University of Texas at Dallas
AVIEN Founding Member
http://www.utdallas.edu
__
e through the
daemon. In the latter, you were attempting to access a file through a unix
utility. The former (smbd) is vulnerable. The latter (ls) apparently is
not.
Paul Schmehl ([EMAIL PROTECTED])
Adjunct Information Security Officer
The University of Texas at Dallas
AVIEN Founding Memb
ontest of interest on the canvass report. Absentee ballots cast
totals appear separately at the end of each contest on the canvass report.
If you have any questions, please contact the Board of Election\x{2019}s
Ballot Department Manager at (216) 443-6454."
Paul Schmehl ([EMAIL PROTE
d
rejected it. Now people who purport to be "smarter" than the men who
founded our nation want to change that system and eliminate the safeguards
that have held the nation together for so long.
I *reject* that "wisdom".
Paul Schmehl ([EMAIL PROTECTED])
Adjunct Informa
;s your point?
If you want to understand how the electoral system works, read. Just
because you don't understand it doesn't mean it doesn't make sense.
Paul Schmehl ([EMAIL PROTECTED])
Adjunct Information Security Officer
The University of Texas at Dallas
A
ampaigns do not care a bit
about states like Texas where a ten percent swing in one direction or
the other simply has no net result.
<http://www.sbe.state.va.us/Election/Electoral_College.htm>
<http://www.usconstitution.net/consttop_elec.html>
<http://www.spies.com/Forums/showthre
s and why it's designed the way that it is.
Again, this has nothing to do with security, so stop filling up the list
with it.
Paul Schmehl ([EMAIL PROTECTED])
Adjunct Information Security Officer
The University of Texas at Dallas
AVIEN Founding Member
http://www.utdallas.edu
Curt, as XP can have its bells & whistles shut
down to perform as 2K can, your preference must
be security related. Would you be spcefic, or
should I just read every advisory again? This
perplexes me as M$ at least eventually patch XP
while 2K is entering its next life.
=
one step at a time
me that I don't understand how the system works. The system was
designed with "Majority rules" in mind, they just didn't have the
resources to implement it properly.
Read the Federalist Papers and then come back here with some knowledge.
In the meantime, shut up and stop posti
Every person's vote counts the same. Just because you don't comprehend the
electoral college doesn't mean that a vote doesn't count.
Paul Schmehl ([EMAIL PROTECTED])
Adjunct Information Security Officer
The University of Texas at Dallas
AVIEN Founding Membe
) MIME parts.
Some cases remain un-fixed, as Eudora developers know and admit privately.
One such example below.
Cheers,
Paul Szabo - [EMAIL PROTECTED] http://www.maths.usyd.edu.au:8000/u/psz/
School of Mathematics and Statistics University of Sydney 2006 Australia
#!/usr/bin/perl --
use
may not
like the results, but no vote counts any more or any less than any other
vote.
How does that feel? Knowing that someone elses vote is more important than
yours?
How does it make you feel that you can't even think logically?
Can we remove this "discussion" from the list pleas
tes,
would they not?
You're going to have to get more specific about what it is you think was
possible.
Paul Schmehl ([EMAIL PROTECTED])
Adjunct Information Security Officer
The University of Texas at Dallas
AVIEN Founding Member
http://www.utdallas.edu
___
/isec-0017-binfmt_elf.txt
CVE: not assigned
Author:Paul Starzetz <[EMAIL PROTECTED]>
Date: Nov 10, 2004
Issue:
==
Numerous bugs have been found in the Linux ELF binary loader while
handling setuid binaries.
Details:
On Unix like systems the execve(2) syste
hater, this pissed me off more than
a bit.
Never attribute to malice what can be explained by incompetence. Most
likely what happened is the left hand (PR) didn't know what the right hand
(secure@) was doing.
Paul Schmehl ([EMAIL PROTECTED])
Adjunct Information Security Officer
The Universi
Thanks for the responses. I wasn't able to take a copy of the malware to send for analysis/identification as I was dealing with the client by phone. He found the file Jim Duggan named & deleted it in Safe Mode. AVG now reports the machine as clean.
So, thanks Jim.
P.S. I did ask the client
I have a client's machine running AVG 6. AVG reports trojan SuslixB but says it can't deal with it. I can't find any reference to such a trojan through Google or on any of the major AV sites. Has anyone heard of it? If so would you be kind enough to post a url or details?
Regards
one step at
affect any other connection, or prevent new connections from being
established. Given that, I don't think that this is even a DoS
vulnerability.
Paul.
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
m? How ungrateful - now
I understand - not.
Read OBL's latest proclamation. He dates his desire to take down the WTC
towers to 1982. I was being generous by saying "fifteen years".
Paul Schmehl ([EMAIL PROTECTED])
Adjunct Information Security Officer
The University of Texas at Dallas
AVIEN
--On Sunday, October 31, 2004 09:59:55 PM -0600 "J.A. Terranson"
<[EMAIL PROTECTED]> wrote:
As Nader supporters continually point out, Kerry is a compromised,
centrist Democrat,
Calling Kerry a centrist Democrat is akin to calling pigs flamingos.
You know the rest...
Paul
so
involved in the corruption.
If you can do that successfully, you get to call me stupid. Right now I'll
just call you ignorant of the facts.
Paul Schmehl ([EMAIL PROTECTED])
Adjunct Information Security Officer
The University of Texas at Dallas
AVIEN Founding Member
http://www.utdallas.
lterated crap to be spewed
on this list without responding.
All replies to /dev/null.
Paul Schmehl ([EMAIL PROTECTED])
Adjunct Information Security Officer
The University of Texas at Dallas
AVIEN Founding Member
http://www.utdallas.edu
___
Full-Disclosure -
1 - 100 of 727 matches
Mail list logo