Hi,
On Wed, 2004-05-26 at 16:32, Mister Coffee wrote:
...
> I don't see it as a perversion of Fair Use at all. While we all agree that the
> original intrusion that acquired the code was illegal, unethical, and generally a
> Bad Thing (tm), using the "It's stolen! Don't touch it!" argument to
Hi Pikett,
On Wed, 2004-05-26 at 11:27, Pikett/LKSI wrote:
> >What is true for Cisco is even more true for Microsoft. Stay the hell
> >away from code that hasn't been licensed for you.
>
> bad guys won't. they'll take their chances to find some holes in the code
> which could allow them to contr
Hi Eric,
On Wed, 2004-05-26 at 01:54, Eric Scher wrote:
> -
> >On Tue, 2004-05-25 Tobias W. wrote:
> >
> >Well, let's face the simple facts. Cisco's code is copyrighted and it's
> >illegal to copy it, distribute it or even use it. There's n
Hi Roman,
On Wed, 2004-05-26 at 08:53, [EMAIL PROTECTED] wrote:
> now when it hits Cisco, everybody say its a crime lurking for the code or
> publicating it. BUT when it hit M$ everybody thought, its a great idea to
> share the stolen source code all over the internet (yes also on FD).
What is
Hi Brian,
On Tue, 2004-05-25 at 17:28, Brian Toovey wrote:
...
> Calm down - While I think it was kind of ignorant to post here asking
> for code and not grep IRC, I dont think this was "not sticking to the
> rules" or "not playing the game." If and when this source becomes
> available I hope dec
Dear "B$H",
On Tue, 2004-05-25 at 11:49, B$H wrote:
> Hi all!
>
> Where can i find the Cisco's stolen code?
Full disclosure is NOT about spreading copyright protected code.
Your question is stupid. Distributing, owning and using Cisco's code is
illegal. So just forget about it. Sticking to the
Hi "joe smith",
On Mon, 2004-05-24 at 17:09, joe smith wrote:
> Does anyone have a capture sample of Bobax and Kibuv? I'm doing an
> analysis it. I search around and come up empty. Any variant is fine.
I can't understand why it seems so hard to catch samples of worms that
knock at my firewall
Hi,
On Sun, 2004-05-23 at 19:01, José María Mateos wrote:
> Hi,
>
> Are you receiving a lot of gentoo-announces mail today or is it just
> me? Some of them from serveral days ago?
You're not alone. They seem to have trouble with their mail?
regards,
Tobias
_
Hi,
On Tue, 2004-05-18 at 13:58, Jos Osborne wrote:
> Hmmm...compulsory national service...what a cheap way of getting a labour force.
> I'm mixed on my views on this - on the one hand having this labour force is a good
> thing, and a younger me could have definately done with having some discipl
Hi,
On Tue, 2004-05-18 at 11:59, Larry Seltzer wrote:
> There's more evidence from this story that he's a "coward" than a "pacifist"
>
> Do they draft 21 year-olds in Germany?
Yes. Every German male citizen can be drafted until he is 27 or in the
case that he studied medical science he can be d
Hi Radule,
On Fri, 2004-05-14 at 17:27, Radule Soskic wrote:
> I can't post this to all the threads that I would like to, so I'm
> opening a new one.
>
> Follow this:
>
> 1. MS is wrongdoing by releasing (and charging for use of) software that
> has bugs in it. Users of such software have losse
On Fri, 2004-05-14 at 17:23, Konstantin Gavrilenko wrote:
> Tobias, following your logic, the people who found and disclosed the
> vulnerability that Sasser was abusing should be prosecuted together with
> the author of the viral code.
Why is that? Did they break German law? Are they responsible
Hi Nils,
On Fri, 2004-05-14 at 15:54, Nils Ketelsen wrote:
> >
> > As soon as your virus changes the content of any part of the system's
> > memory, be it the RAM or any other medium you have already manipulated
> > data and are guilty of the corresponding crime. It's as easy
> > as that. In
>
>
On Thu, 2004-05-13 at 23:38, Georgi Guninski wrote:
> On Thu, May 13, 2004 at 04:43:23PM +0200, Tobias Weisserth wrote:
> > As much as MS products suck, MS has done
> > nothing illegal.
> >
>
> this is completely false, haven't you read news in the past years?
Dear van Helsing (spooky ;-)),
On Thu, 2004-05-13 at 19:48, van Helsing wrote:
> On Thu, 13 May 2004 07:55:01 -0700 (PDT)
> Andrew Morris <[EMAIL PROTECTED]> wrote:
>
> > This must be a joke.
> >
> > Who, with a strait face, can believe that exploiting a
> > buffer overflow is just the act of an
Hi harry,
On Thu, 2004-05-13 at 14:33, harry wrote:
> Tobias Weisserth wrote:
>
> > I find your "explanation" why this author of a virus should be treated
> > any different than other authors somehow illogical. The Sasser author
> > has done nothing to foster se
Hi,
On Thu, 2004-05-13 at 15:16, [EMAIL PROTECTED] wrote:
> Try PostNuke
>
www.postnuke.com
That's a good one :-) Don't forget to issue invitations for crackers too
because you're opening your machine wide and easy with a CMS that tends
to have security issues on a daily basis.
Tobias W.
_
Hi,
this is weird. A donation service for a criminal. Published by anonymous
mail.
"After all, SASSER was intended as a harmless wake-up call to the
world."
Sasser had been a violation of applicable law in Germany. As such the
intention is totally irrelevant.
"Imagine what could happen if this
Hi,
On Sat, 2004-05-08 at 14:37, Thilo Schulz wrote:
> ...
> Not only this, the Phatbot creator has been hunted down too in Baden
> Württemberg, which is a federal state in south-west germany.
> See http://www.heise.de/newsticker/meldung/47209 (german).
Wir können alles.
Außer Hochdeutsch.
:-)
Hey, what's this?! It got past amavisd with H+BEDV Antivir on my
mailserver. This is actually the first time they seem to be lagging
behind with their signatures. I update them hourly via cron and I have
never had any viruses penetrating my home-grown
fetchmail/amavisd-new/postfix/cyrus-imapd solut
Hi,
On Mon, 2004-05-03 at 21:08, [EMAIL PROTECTED] wrote:
> ...
> especially jim jones, who thinks he's very cool, should keep in mind that he's just
> a kiddy with a small brain.
> ---
> Anonymous mail sent from http://stegnox.envy.nu/mailer.html
As lame as th
Hi Andrew,
On Mon, 2004-05-03 at 03:04, Andrew wrote:
> It's an autoreply, he won't be back at his office until the 10th of May.
> Yep well thanks a heap Michael Jäger for letting us all know, I'm sure
> it was important to impart the information, especially in a different
> language.
Well, I gue
Hi John,
I really don't know how often this list has to go through this senseless
discussion about virus filtering.
For Christ's sake, implement a proper defense yourself and stop whining.
This is a security related list so I guess the list owner can expect a
little security awareness of the subs
On Fri, 2004-04-16 at 13:47, Rafel Ivgi, The-Insider wrote:
...
> 9. Nmap - as possibly evil tool
I always felt its evil aura. Glad that you told me, now I know...
> Rafel Ivgi, The-Insider.
Thank God we have such insiders on this list...
TW
___
Ful
> in 10 Jahren...).
> http://www.heise.de/security/news/meldung/46175
I'll swallow my mouse (wireless) if this is not an April's fool joke.
> sorry, text is in german
No problem.
regards,
Tobias
--
***
____ _
ox is
probably not recommended at all. General security and bug handling
hasn't reached a level acceptable for server use in my opinion yet. But
opinions and risk willingness differ.
regards,
Tobias W.
--
***
_
| _ \| | Tobi
the
Portage tree.
regards,
Tobias
--
***
_____
| _ \| | Tobias Weisserth
| | | | _| [EMAIL PROTECTED]|com|net|org]
_| |_| | |___ http://www.weisserth.org
(_)/|_|
Encrypted mail is welcome.
Key and finger
s list? Please.
This is ridiculous.
regards,
Tobias W.
--
***
____ _
| _ \| | Tobias Weisserth
| | | | _| [EMAIL PROTECTED]|com|net|org]
_| |_| | |___ http://www.weisserth.org
(_)/|_|
Encrypted mail is
g him about
this. I'd call this a lie about the state of the network.
This is reason enough for me not to trust MS with any version of Windows
more recent than Windows 2000.
regards,
Tobias W.
--
***
_
| _ \| |
the latest spreading mechanism for viruses - Full-Disclosure,
> I demand and immediate public announcement on what is going to be done
> about this problem.
Stop embarrassing yourself.
> Thank you,
You're welcome.
kind regards,
Tobias W.
--
*
Hi Martin,
Am Mo, den 15.03.2004 schrieb martin f krafft um 22:50:
> also sprach Tobias Weisserth <[EMAIL PROTECTED]> [2004.03.15.2208 +0100]:
> > Which means that he has to a little bit more work because he can't
> > *rely* on the distributor to supply patches
se of speed for these machines too, so the
users at the KUL won't mind using the newest kernel ;-)
cheers,
Tobias W.
--
***
_____
| _ \| | Tobias Weisserth
| | | | _| [EMAIL PROTECTED]|com|net|org]
_| |
Hi Alexander,
Am Mo, den 15.03.2004 schrieb Alexander Bartolich um 20:27:
> Tobias Weisserth wrote:
> > /tmp should always be mounted noexec. Add /home as well with noexec.
> > [...] This may be a trade-off, but the result is more security.
>
> On typical Linux distribution
might
already be fixed.
> > - grsec kernel
>
> why not use SELinux?
[kidding]Maybe he doesn't trust NSA? :-)[/kidding]
But I agree. SELinux looks promising.
...
> also sprach Tobias Weisserth <[EMAIL PROTECTED]> [2004.03.15.1933 +0100]:
> > If you want an up to d
it. It is a hardening
script that shuts down some unnecessary stuff.
Always remember though that an installation or configuration is always
safe at only a single moment in time. Security is a constant process of
adaptation. There is nothing like a safe base installation.
regards,
Tobias W.
--
Dear Valdis,
Am Mo, den 01.03.2004 schrieb [EMAIL PROTECTED] um 19:20:
> On Sun, 29 Feb 2004 01:54:51 +0100, Tobias Weisserth <[EMAIL PROTECTED]> said:
>
> (Note - although my name got dragged into this, I'm not at all privy to what
> the actual Trillian code looks like.
opriety products and don't
necessarily fall under the GPL. This whole mess could have been avoided
this way. A clean and complete documentation where code came from and
who donated it under what terms is essential. I don't have a glass ball
which tells me where which parts came from after all ;-)
kind regards,
Tobias Weisserth
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
Suppose someone starts another GPL project, using GAIM
code and he finds out you are using the same stuff but under a non-GPL
license? Does he have to go all the way back to the GAIM people and
verify where they got their code? A note inside the yahoo.c file should
be placed to inform people.
kind reg
Hi everybody,
Am Di, den 24.02.2004 schrieb Stefan Esser um 19:52:
> ...
>"What is Trillian?
>
> Trillian is a skinnable, interoperable instant messaging client.
> Grab the best IM client available on the Internet today!
> Trillian .74 is completely free, with no spyware and
led if the real link isn't hidden behind an image or a link
description.
I hate HTML mails anyway and don't let my mail client load images of the
Internet (thus HTML mails reach me in an ugly, naked form).
kind regards,
Tobias Weisserth
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
Hi Paul,
Am Fr, den 13.02.2004 schrieb Schmehl, Paul L um 22:22:
...
> > Drew Copley once said:
> >
> > > We should prepare for this now.
> >
> > Anyone care to comment how we can prepare for this?? Except
> > for moving from the Windows platform, I don't see how we can.
> > Please do not take
Hi,
Am Mo, den 26.01.2004 schrieb Exibar um 21:41:
> It sure didn't look like a normal folder to me either. I could edit the
> file and such and renaming the file to having an .HTM extension makes it
> look like a "normal" html file. Certainly not like a directory at all, but
> a simple file.
T
Hi Bill,
Am So, den 25.01.2004 schrieb Bill Royds um 05:01:
> One thing that is happening is that anti-virus scanners are blocking people
> from receiving them, so there is at least some protection for ordinary users
> using up-to-date virus schemes. Here is the McAfee message.
I noticed :-) I di
Hi everybody,
I just wanted to add another phishing scam to the "in the wild" list.
A fake Paypal email is pointing potential IE victims to a modified URL:
http://[EMAIL PROTECTED]/f/
The host 211.54.126.187 is up and running, the email address of the
administrator seems to be a fake, mail boun
Hi FD,
The German news channel ARD reports [1] that Ebay's seller information
feedback feature can be modified at will by sellers to influence their
credentials.
According to the ARD a seller uploads a Javascript along with his
description that replaces any real feedback information with faked
fe
Hi Greg,
Am Do, den 22.01.2004 schrieb Gregh um 07:21:
> ...
> That has nothing to do with ANYTHING. If I install a keylogger on YOUR
> computer and you DONT know about it and let's say your bank was at
> www.bank.com and your account name was BOB and password was 123ghqofc0
> right? Now you have
Hi Greg,
Am Do, den 22.01.2004 schrieb Gregh um 07:07:
...
> > I'm dieing to know...
> >
>
> What are you dieing? T-shirts? :)
Yes, foreign languages are hard to master. I guess "dieing T-shirts" is
in the process of learning them ;-)
Maybe we should continue this debate in German then. Or Dutc
Hi yossarian,
Am Do, den 22.01.2004 schrieb yossarian um 00:05:
> Have you noticed that you can put diesel in a normal car, cause the muzzle
> at the gas station is too thick?
When you open the lid it says on the inside which type of fuel you need.
When a user buys a computer he knows if he boug
Hi Paul,
a few last words since this is going into "repetitive mode" now ;-)
Am Do, den 22.01.2004 schrieb Schmehl, Paul L um 00:44:
...
> It's an impossible goal.
I know :-)
Of course it's impossible. It's as impossible as trying to change end
users.
Yet we have to try because it is still _ea
Hi yossarian,
Am Mi, den 21.01.2004 schrieb yossarian um 20:20:
> Mmmm, who forced them to use it?
Mmh. Nobody "forced" them to use it. They are kind of deceived into
using it. What choice do they have when they buy a new PC? Ever heard of
OEM vendor deals?!
And they might think they are able to
Dear Paul,
Am Mi, den 21.01.2004 schrieb Schmehl, Paul L um 19:23:
> ...Tobias wants to lay *all* the blame at
> Microsoft's feet, and I disagree.
_I_ must have made some mistakes expressing myself correctly because you
seem not to understand me :-) (See? I don't blame you. I blame myself
for bei
Hi Paul,
Am Di, den 20.01.2004 schrieb Schmehl, Paul L um 23:15:
...
> To a certain degree I agree with you, however my viewpoint isn't quite
> as bleak. I believe there are *some* things we can do to at least
> reduce the number engaged in this type of activity.
That is right. But it isn't reac
Hi Paul,
Am Mi, den 21.01.2004 schrieb Paul Schmehl um 06:53:
> ...
> > The two examples I gave in my initial answer to you actually contain
> > that. I wonder why you didn't comment on them. What's your opinion on an
> > enabled RPC port by default in consumer OSs?
>
> Precisely the same as my o
Hi yossarian,
Am Mi, den 21.01.2004 schrieb yossarian um 02:04:
...
> So, basically, you are blaming the MS people for building a UI that can be
> used by anyone.
You haven't understood. Basically _I'm_ blaming "the MS people" for
building a product that _can't_ be used by anyone but _is_ used by
Hi Ron,
Am Di, den 20.01.2004 schrieb Ron DuFresne um 23:03:
> > Up to now they rule the consumer OS market with more than 90% market
> > share. Any error they make regarding default settings in their OS
> > affects 90% of all end consumers. It is impossible to require that many
> > customers to a
Hi Greg,
Am Di, den 20.01.2004 schrieb Gregh um 21:48:
...
> In the same way as that, your computer today, may be as secure as anyone can
> make it, on the web and then tomorrow, someone finds another way in. Hell,
> MS may be the most attacked OS in the world for sure (it is the most used
> one s
Hi Mary,
Am Di, den 20.01.2004 schrieb Mary Landesman um 20:13:
> > not lose your keys on purpose
>
> Does anyone lose their keys on purpose? :-)
If you've got a stupid insurance company... :-) I don't know?
> As I stated originally, you can reduce the risk but you can never alleviate
> it enti
Hi Greg,
Am Di, den 20.01.2004 schrieb Gregh um 21:45:
...
> Let me paint you a hypothetical situation to show you where what you said is
> wrong:
I'm dieing to know...
> User receives keylogger attached to email as an exe and stupidly executes
> it.
You didn't understand this. Not one bit.
If
Hi Paul,
Am Di, den 20.01.2004 schrieb Schmehl, Paul L um 19:53:
> > This is too easy. It's the same with guns. People always
> > blame the people who pull the trigger but the fact that guns
> > are soo damn easy to get, even for minors doesn't startle
> > a soul...
> >
> This is a ludicrou
Hi Mary,
Am Di, den 20.01.2004 schrieb Mary Landesman um 18:12:
> On January 20, 2004 11:55 AM, "Tobias Weisserth" claimed:
>
> > And the blame goes on MS for this. Nobody else.
>
> There is absolutely nothing I can do to secure my home from break-in.
You could c
Hi Paul,
Am Di, den 20.01.2004 schrieb Schmehl, Paul L um 17:01:
> But the *real* problem isn't the OS, it's the users.
Actually, that's wrong.
Users are never the problem. It's always the software. When a user
doesn't understand something, then there's a problem with the software,
not the user
Hello everybody,
I have just been informed by F-Prot[1] that the newest signature files
will help detect the downloader as a virus. This hasn't been the case
when Michael posted the message.
cheers,
Tobias
[1] Arnar Thor Stefansson, F-Prot Antivirus Tech Support
Dear subscribers,
I have read an article in "Der Spiegel"[1] about a scam with a
webshop[2] I thought might arouse interest here.
The "owner" of this shop is supposed to be a woman from Munich, Germany.
She happens to know nothing about running a shop on the Internet and
reported this to the loca
Hi Valdis,
Am Sam, den 17.01.2004 schrieb [EMAIL PROTECTED] um 19:43:
...
This has been the most intelligent mail in this thread yet. Thank you
very much.
cheers,
Tobias
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-dis
Hi Jim,
Am Sam, den 17.01.2004 schrieb Jim Race um 19:20:
> Since the ping-pong game is far past 21 points...
:-)
> How safe would you consider:
>
> A WinXP box with all current patches
There is no such thing as a WinXP box with all current patches :-) Since
installing all patches that Microso
Hi Jan,
Let the ping-pong game begin ;-)
Am Sam, den 17.01.2004 schrieb [EMAIL PROTECTED] um 04:21:
> at the risk of sounding like a Win32 advocate...
No, you don't. :-)
> > I agree. But Windows isn't delivered in such a minimum state by default.
> > Instead all doors are open. When MS ships Wi
Hi "Exibar",
Am Fre, den 16.01.2004 schrieb Exibar um 22:40:
> I agree, it looked like I was melding the two together into "threats" and
> not keeping Viruses/worms separate. Phishing's a new term that's cropped up
> for these types of e-mail's.
I learnt something new here. I didn't know these
Hi "Exibar",
Am Fre, den 16.01.2004 schrieb Exibar um 21:23:
> > > Linux in the wild viruses that come to mind: Scalper, Ramen, Lion,
> > > Simile. I'm sure there are lots more as well.
> >
> > None of those was an e-mail virus. They were worms. An e-mail virus
> > scanner wouldn't have d
Oh for Christ's sake will you be quiet!
Get laid or read a book.
This is a mailing list and you're not moderating it.
You're not even brave enough to use a real name and you don't have the
balls to use a proper ISP to run you email.
Tobias W.
Am Fre, den 16.01.2004 schrieb [EMAIL PROTECTED] um
Hi "Exibar" (no realname?!),
Am Fre, den 16.01.2004 schrieb Exibar um 20:57:
...
> Ahhh, now there we go. That might just be the case. Off the top of my head
> I can't think of a Linux specific e-mail spreading virus. Unless you count
> "phishing" type e-mails that are completely OS independant
Hi David,
Am Fre, den 16.01.2004 schrieb David F. Skoll um 19:58:
...
> There are no self-propagating Linux e-mail viruses. The only Linux
> e-mail viruses are proof-of-concept programs that have never actually
> infected machines other than lab machines designed to test the
> proof-of-concept.
Hi Valdis,
Am Fre, den 16.01.2004 schrieb [EMAIL PROTECTED] um 21:20:
...
> 1) Staying up to date on patches
> 2) iptables
> 3) Hardening the system as per Center for Internet Security and/or other
> recommendations
> 4) tripwire (yes, I know this one is after-the-fact)
> 5) SElinux and/or simila
Hi Wes,
Am Fre, den 16.01.2004 schrieb Wes Noonan um 18:32:
> Did you really just propose that a viable solution is to remove network
> access?
For some systems: plain and simple yes. If the supplier of a software
fails to deliver it in a "secure by default" state and even cuts the
supply of patc
Hi Ron,
Am Don, den 15.01.2004 schrieb Ron DuFresne um 18:33:
> It seems all the sec experts here complaining about this initiative value
> their time far to much to donate it to those about them that might benefit
> from theit skills, advice, and a few helpful mouse clicks?
Actually I fail to se
Hi,
Am Don, den 15.01.2004 schrieb David F. Skoll um 21:37:
> > But not 100% safe though... there are Linux viruses,
>
> Such as ... ?
http://www.f-prot.com/virusinfo/unix.html
If those are POSIX they may be able to infect a buggy Linux box ;-)
http://www.sophos.com/search/index.cgi?scope=vi
Hi Ron,
Am Don, den 15.01.2004 schrieb Ron DuFresne um 18:28:
> cheap
There are cheap personal firewalls, no question about that. But there
also are cheap, yet secure end user operating systems which are better
serving the end users interest than a combination of an insecure
operating system, an
Hi Jan,
Am Die, den 13.01.2004 schrieb [EMAIL PROTECTED] um 20:41:
> Howdy,
>
> I basically have *no* time at the moment, so I just had a very very quick
> look at these things.
Thanks for that quick look! :-)
> > The biggest file you can find on this machine in this directory is a
> > gzippe
Hello everybody,
The SuSE security lists is having a little discussion about a possible
hacked SuSE 8.2 machine. The machine is running a pre-7 PHPNuke CMS
which could be the entryway for the injection. There is a rather big
chance the system has been injected a script which downloaded stuff from
78 matches
Mail list logo