RE: [Full-Disclosure] How big is the danger of IE?

2004-07-08 Thread Yaakov Yehudi
smime.p7m Description: S/MIME encrypted message

RE: [Full-Disclosure] RE: HijackClick 3

2004-07-15 Thread Yaakov Yehudi
smime.p7m Description: S/MIME encrypted message

RE: [Full-Disclosure] SNMP Broadcasts

2004-07-19 Thread Yaakov Yehudi
smime.p7m Description: S/MIME encrypted message

RE: [Full-Disclosure] "Fud, lies and libel" against (type any name here, I'll use mi2g)

2004-07-24 Thread Yaakov Yehudi
smime.p7m Description: S/MIME encrypted message

RE: Re: [Full-Disclosure] Cool Web Search

2004-08-01 Thread Yaakov Yehudi
BHO Demon 2.0 http://www.definitivesolutions.com/bhodemon.htm -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Todd Towles Sent: Friday, July 30, 2004 18:00 To: 'Rmuge NineFive '; 'Disclosure Full' Subject: RE: Re: [Full-Disclosure] Cool Web Search There

RE: !SPAM! RE: [OT] Re: [Full-Disclosure] lame bitching about xpsp2

2004-08-19 Thread Yaakov Yehudi
The hardware is warranted, which was the requirement - there was no mention of supporting the OS as well. YY -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Esler, Joel - Contractor Sent: Wednesday, August 18, 2004 20:42 To: [EMAIL PROTECTED] Subject: !SP

RE: !SPAM! Re: [OT] Re: [Full-Disclosure] lame bitching about xpsp2

2004-08-19 Thread Yaakov Yehudi
Important: From which direction is the wind coming? ;-) -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of KF_lists Sent: Thursday, August 19, 2004 01:53 To: Invicticide X Cc: [EMAIL PROTECTED] Subject: !SPAM! Re: [OT] Re: [Full-Disclosure] lame bitching abou

RE: !SPAM! RE: [Full-Disclosure] The 'good worm' from HP

2004-08-23 Thread Yaakov Yehudi
Yes it can.  See the docs. From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of The Central ScroutinizerSent: Monday, August 23, 2004 16:29To: [EMAIL PROTECTED]Subject: !SPAM! RE: [Full-Disclosure] The 'good worm' from HP >It's called WindowsUpdate? That cannot be used locally

RE: !SPAM! [Full-Disclosure] Automated ssh scanning

2004-08-26 Thread Yaakov Yehudi
In spite of many reports to the contrary, Linux is _not_ secure by default. Did you harden it? There is a lot of documentation on the web as to how to go about it. YY -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Richard Verwayen Sent: Thursday, Augus

RE: !SPAM! RE: [Full-Disclosure] m$ realizes it loses the bug war? :)

2004-08-31 Thread Yaakov Yehudi
Note that there already _was_ a fix for Firefox... Whereas for IE? -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Choe Sung Cont. PACAF CSS/SCHP Sent: Monday, August 30, 2004 23:25 To: '[EMAIL PROTECTED] ' Cc: '[EMAIL PROTECTED] ' Subject: !SPAM! RE: [Ful

RE: !SPAM! Re: [Full-Disclosure] Bootable Memorystick?

2004-08-31 Thread Yaakov Yehudi
Why is the 8-in-1 less suitable, in your opinion? I'm sure that I can't think of a good reason. YY >Hello, > >I don't know any BIOSes able to boot on a 8-in-1 card reader. >USB flash disk is more suitable. > >Regards, > >___ >Arnaud Jacques >Consultant Sécurité >Secur

RE: [Full-Disclosure] Response to comments on Security and Obscurity

2004-09-02 Thread yaakov yehudi
A firewall is more akin to a specialized filter medium, but filter mediums aren't used as the entrance or exit to a military base. It is probably possible to find analogies between the information security world and physical - but only on a piecemeal basis, and that is simply irrelevant and po

RE: [Full-Disclosure] Viral infection via Serial Cable

2004-09-02 Thread yaakov yehudi
I remember having one modem that didn't use a cable to connect to the computer, but that was only because it attached directly to the RS232 port. Certainly RS232 was the usual mode of connection! YY -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of [EMAIL

RE: [Full-Disclosure] Security & Obscurity: First-time attacks and lawyer jokes

2004-09-05 Thread Yaakov Yehudi
Dave wrote... > The flaw in your specific example [about a software program freezing up it is attacked] is that every program can be run as > many times as you need to "attack" it. You would never need more than > one copy. Peter replies... First, there are times when you cannot attack

RE: [Full-Disclosure] Security & Obscurity: physical-world analogies

2004-09-05 Thread Yaakov Yehudi
ECTED] Sent: Thursday, September 02, 2004 18:25 To: Yaakov Yehudi; [EMAIL PROTECTED] Subject: [Full-Disclosure] Security & Obscurity: physical-world analogies Here are arguments for why it is useful to think systematically about the relationship between computer- and physical-securi

RE: [Full-Disclosure] Empirical data surrounding guards and firewalls.

2004-09-05 Thread Yaakov Yehudi
James said... > As far as I can see it the only difference is scaling, you can make > many many millions of requests before a flood warning appears, whereas > you only need to refuse to leave a few times before the police are > called. I guess humans have less patience than computers. > > Of cou

RE: [Full-Disclosure] win2kup2date.exe ?

2004-09-05 Thread Yaakov Yehudi
It seems to me that the argument that it is wisest not to spread the virus too widely is yet another argument that _sometimes_ security by obscurity is a "Good Thing"[tm]. Stir that pot! YY -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Nick FitzGerald

RE: [Full-Disclosure] Security & Obscurity: physical-worldanalogies

2004-09-05 Thread Yaakov Yehudi
On Thu, 2004-09-02 at 11:24, Peter Swire wrote: > I think there is a strong analytic similarity between a firewall and > physical settings where guards are deciding whether to let > people/trucks/etc. through a gate. > [...] > In both cases, there is "filtering" by the defenders. S

RE: [Full-Disclosure] Empirical data surrounding guards and firewalls.

2004-09-09 Thread Yaakov Yehudi
While you are quite correct that AI and the marvel which is the human body are incomparable, that does not mean that a computer may not satisfy a dictionary definition of sentience [requirements for such being very simple and basic indeed]. Best Regards, YY -Original Message- From: [EMAI

RE: [Full-Disclosure] Re: open telnet port

2004-09-09 Thread Yaakov Yehudi
Removing all components which are not required is a wonderful idea. Closing all ports which are not required is another. These are essential components in hardening a computer, regardless of the OS. YY -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of [EMA

RE: [Full-Disclosure] WinXP SP2 comments (was: Internet explorer 6 execution of arbitrary code)

2004-06-07 Thread Yaakov Yehudi
>BTW. Uninstalling a service pack isn't 100% supported. It's recommended to wipe and reinstall. Where does that statement come from? Microsoft? I'd be interested to see any references you might be able to provide. Thanks! ___ Full-Disclosure - We be

[Full-Disclosure] How big is the danger of IE?

2004-07-08 Thread Yaakov Yehudi
I would be interested to hear just how big the danger of IE is. How could it affect the privacy of big business?, or any business for that matter? or what about the Government - could information leak from govenrment employees computers? They do something to stop that right? Bob Palliser