-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Would you concider donating them to http://www.freetradecampus.com where we
would format and load linux on them to give away to needy students?
On Monday 12 July 2004 02:49 pm, amilabs wrote:
> I have a bunch of old computers I would like to donate.
h MS paint what a
waist of time there was no real hack involved and no access to any important
info.
just wondering if anybody else has encountered this nobody?
Adam
-
This mail sent through IMP: http://hor
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
who are you friggen Dr Evil?
On Friday 13 August 2004 07:04 pm, KF_lists wrote:
> Insert subject here ^
>
> -KF
>
> ___
> Full-Disclosure - We believe in it.
> Charter: http://lists.nets
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
I believe you missed user EDUCATION?
a tools weekest point is ,,, You!
as seen by the dork who was surfing the net on a box he was using as a server
On Monday 13 September 2004 11:59 am, Harlan Carvey wrote:
> > Network security -> application secur
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
I met Charlie and I found out his real last name, and that he's been in a lot
of very bad stuff not limited to IT and The Big One. (NAM)
Charles last name is Sheen just Google "Charlie Sheen" and you'll see what
exactly I mean
Ad
ht
they where being spied on by the US Gov" off the list it was an old MDK8.1
box I was trying to keep around just a minuet or two longer and didn't have
time to patch properly. (My Bad)
My 2 cents
Adam
On Thursday 13 November 2003 01:03 pm, Jeremiah Cornelius wrote:
> On T
ks if you do decide to send stories and if you cover your tracks
to well and win the 500.00 prize how are you going to recive the money??
I wonder if he would pay for a storie about defaceing defensivethinking.com
Warm reguards,
Adam
Call for Hackers from Kevin Mitnick
http://defensivethinking.com
Public forum ...
I smell a law suit even if it wasn't directed to anyone.
Not that I'm offended but there are girls.. >Ahumm< Women on this list.
Adam
On Monday 15 March 2004 03:03 pm, Bugtraq Security Systems wrote:
> Dear Starla,
>
> At Bugtraq Security Sys
working
again. The server didn't crash but paused for a second. Unable to duplicate
the previous results. The link had no affect on the server a second time.
Adam Richards
Network Administrator
WorldNet Communications, Inc.
318-213-9827 / Fax 318-213-8534
World Class Technology, Hometown Se
FYI - k-otik released a universal exploit that doesn't need 48 different
offsets. It uses 2. One for win2k and one for XP. ( In case noone noticed )
Adam Richards
Network Administrator
WorldNet Communications, Inc.
318-213-9827 / Fax 318-213-8534
World Class Technology, Hometown Se
longer get
to any websites. Checked all the settings and they are good. They can ping
outside there network and get email through outlook. Just can't browse any
websites? Anyone heard of this or why it is happening? Or how to fix it.
Any help would be greatly appreciated.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
I'm finding that the people who complane the most are usually the people who
have no business working with Virii and are only as good as there Outlook
updates
Sorry Gadi, but you where told a long time back to quit when you where only
marginally be
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
SO WTF dose this mean to me or you should IKEA now be a target?
I think that Ikea at least dose product tests and sells a stable product with
out security flaws or adds **Warnings** about who should use there products
and the issues around using pr
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Am I the only one who reads directions suppled? (Never A prob with Ikea other
than my wife wanting to buy to much when we go)
and realize that you get what you pay for (except for Opperating Systems)
On Wednesday 07 April 2004 06:34 am, Sean Crawfo
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
now this is going to help!
Will your hiding behind a yahoo email address then you post this filth to the
list and are you gay bashing "are you homophobic?" thats usually the first
clue to represion
I'm not gay I'm not afraid of gays and I don't fin
nt know how to look at
> incoming email headers from your AOL mail to see what
> ip im coming from.. btw are you hungry?
> ...theres plenty to go around
>
> -illwill
>
> --- Adam <[EMAIL PROTECTED]> wrote:
> > -BEGIN PGP SIGNED MESSAGE-
> > Hash: SHA1
reat tool for a project I'm doing and I would
personally at least passwd protect it with htaccess
so far I'm getting mixed reviews about the potential for using the info on
this URL
Thank you all for your input thus far.
Adam
On Friday 07 May 2004 11:38 am, you wrote:
> Hello Adam,
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
can some one tell me is this a good thing to leave in public?
http://recruiterdirect.com/module_sizes.html
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.4 (GNU/Linux)
iD8DBQFAml6QQEDQWvlbVLkRAnYlAJ9u8Ytl56oyhtreDj9qYfioAg9qKwCfTnWw
dmGdk8kiIyBXiI
Just because they're using mIRC, doesn't mean that they aren't unix/cisco tech geeks.
Ever consider that they might have run Windows on their workstations at work? And even so
using the clients that have been ported to Windows might be an even worse idea because of bugs
in the ported c
Do you really think that they would be using mIRC if they had unix on
their workstations anyways? Maybe reading comprehension isn't one of
your best skills.
Thanks Again!
On Mon, 24 May 2004, adam wrote:
Just because they're using mIRC, doesn't mean that they ar
;rm%20-rf%20coll*%3B%20%65%63%68%6F%20%5F%45%4E%44%5F&highlight=%2527.%70%61%73%73%74%68%72%75%28%24%48%54%54%50%5F%47%45%54%5F%56%41%52%53%5B%72%75%73%68%5D%29.%2527
HTTP/1.1"
-Adam
Herman Sheremetyev wrote:
My patched phpBB 2.0.11 running on FreeBSD 4.10 was exploited by a new
variatio
Some important issues I think that a lot of people are overlooking in
this case is that not everything that a person "owns" can be considered
estate to be passed on to their next of kin, especially in the case of
emails, letters, and other mediums of communication. One of the key
differences be
[EMAIL PROTECTED] wrote:
Citando Adam Laurie <[EMAIL PROTECTED]>:
i have just installed an adsl modem sold under the brand of Zoom X3
http://www.zoom.com/products/adsl_overview.html
and was apalled to find that an nmap scan of the external address
immediately came up with the following:
a wrote:
does it work with the latest version of mozilla ? 1.7 / 1.7.1 ?
Of course it does. Why shouldn't it?
Sz.
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
the user wishes. Most users (and IT
departments) would assume if they had screen locking enabled for their
screensaver that they would be safe.
iTunes is a registered trademark of Apple Computer Corp.
---
Adam Q Salter
[EMAIL PROTECTED]
___
Full-Disclo
#
## Advanced usage of system() function ##
#
1. Introduction
In a last few years a lot of new patches for kernel
which improve
security became ava
The majority of the list had nothing more than
alias $name $email
Only small parts had any more specific contact information. The emails
provided seem to all have been @nasa.gov anyways. (did not actually
search for exceptions on this other than eyeballing it) Most likely
any mail sent to these a
efore I could do anything malicious from Java appplication on
my phone).
I plan to release a research paper with all the details about the flaws
including
device specific information and some additional material that didn’t fit
into my
HITB talk, in a couple of months (1Q 2005).
Best Regards
ty.
This is like the (AT&T?) voice mail frauds that were costing people
thousands of dollars for choosing poor passwords for their voice
mail. Until it hits a certain level, its just revenue enhancement
through poor security.
Adam
--
"It is se
obvious benefit, we can send Schwartz to jail and break up
Symantec under RICO. ;)
Adam
--
"It is seldom that liberty of any kind is lost all at once."
-Hume
___
Full-Disclosure - We bel
Is privsep on in any of these systems?
Do the failed attempts show up in your logs?
And naturally, do you have some tcpdumps?
Adam
On Mon, Sep 15, 2003 at 01:48:34PM -0400, christopher neitzert wrote:
| More on this;
|
| The systems in question are FreeBSD, RedHat, Gentoo, and Debian all
| Is there a complete list of vulnerable versions of OpenSSH including
| the 2.x branches? In other words how far back does this issue go?
Just compare buffer_append_space() function in buffer.c in all versions you
are interested in...
--
Greets
adeon
There is also one little bug in the code, look below.
|
| void *
| buffer_append_space(Buffer *buffer, u_int len)
| {
| void *p;
|
| if (len > 0x10)
| fatal("buffer_append_space: len %u not supported", len);
|
| /* If the buffer is empty, start using it
not connected
directly to internet and doesnt relay mails. It doesn't use that
special offset as a trigger. We got so many "sys3" accounts in
/etc/passwd as many times we ran it plus those outgoing-mails que'd.
/Adam Balogh
__
Probably a scriptkiddie or some random idiot. The fun part was
it came up totally different offsets then i mean TOTALLY different
each time you ran it and if you gave it a offset it would "work"
no matter what. For those people who ran it.. change all your
passwords. :)
/Adam
Vit
Adam wrote:
> Probably a scriptkiddie or some random idiot. The fun part
> was it came up totally different offsets then i mean TOTALLY
> different each time you ran it and if you gave it a offset it
> would "work" no matter what. For those people who ran it..
> cha
Dnia nie 5. października 2003 18:50, J.A. Terranson napisał:
| On Sun, 5 Oct 2003, Eric Scher wrote:
| > I DID NOT SUBSCRIBE TO THIS LIST TO READ POLITICAL POSTS.
|
| Nobody gives a fuck what *you* signed up for. Don't like it? Get the fuck
| out.
|
| This is "Full Disclosure" - *Everything* is d
Dnia nie 5. października 2003 22:52, J.A. Terranson napisał:
|
| The so-called "charter" didn't exist when I subscribed. I signed on during
| Len's spam run announcement (when he sent, *UNSOLICITED*, every subscriber
| to bugtraq a notice that he was starting his little shindig).
But now, the ch
Dnia nie 5. października 2003 18:50, J.A. Terranson napisał:
| On Sun, 5 Oct 2003, Eric Scher wrote:
| > I DID NOT SUBSCRIBE TO THIS LIST TO READ POLITICAL POSTS.
|
| Nobody gives a fuck what *you* signed up for. Don't like it? Get the fuck
| out.
|
| This is "Full Disclosure" - *Everything* is d
This should be a fascinating get-together.
- Forwarded message from Lauren Gelman <[EMAIL PROTECTED]> -
Cybersecurity, Research & Disclosure
November 22, 2003
Stanford Law School
http://cyberlaw.stanford.edu/security/
Stanford Law School's Center for Internet and Society will host a day-
Hi!
Davide Del Vecchio wrote:
> I don`t know what you think about this, but in my opinion
> will never exist a method to REALLY protect CDs, just because
> I think that "if I can ear it, I can reproduce (and record) it".
> The dsp could be redirected to hd or this kind of stuff
> (just a stupid e
Jeroen Massar wrote:
You mean Sony&Philips selling music through their music labels
and also selling a *LOT* of CD and DVD writers ? :)
This, and more. Although, AFAIR Philips actually marketed the standalone
"audio CD-copy" machine where you had (?) to use special "raw audio CDs"
and these cost
Dnia pią 10. października 2003 00:08, Jeremiah Cornelius napisał:
| Ahhh... The wildest, satirical speculations on FullDisclosure come to
| fruition in a court of law. Let the games begin!
|
| http://www.theregister.co.uk/content/6/33322.html
| SunnComm to sue 'Shift key' student for $10m
| By To
Phillip R. Paradis wrote:
I agree that they do have a case. I think, however, their problems are
entirely of their own creation.
Yes.
2.) Offer added value. Good artists and managers have known this for a
long time. People will more likely buy a record which also has nice
artwork, exclusive con
any software such as ZA and
its brethern lately, so they might be doing some more magic that plugs
those holes -- but it seems likely that they cannot fix all of them
without patching a great deal of the OS)
Just my standard complaints. Cheers.
--
Adam Lydick
On Sat, 2003-10-18 at 08:19, Andriy
Program:mod_security (www.modsecurity.org)
Versions: 1.7RC1 to 1.7.1 (Apache 2 version)
Synopsis: malloc based buffer overflow
Author: Adam Dyga (adeon(at)o2.pl, ad(at)adsystems.com.pl)
URL:http://adsystems.com.pl/adg
wow, that's a dumb vendor, don't use their product" kind of
comments, so if you can hold back that would be great. But if you just can't, then I
can understand.
In the event someone from Oracle is listening, I'd love to be contacted in the event
Oracle th
/0,4149,1370707,00.asp
http://www.pcmag.com/article2/0,4149,646255,00.asp
http://www.pcmag.com/article2/0,4149,646256,00.asp
http://www.pcmag.com/article2/0,4149,55367,00.asp
One of the software ones in those articles must run on ME (hopefully)
--
adam
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
PureFTPd all versions vulnerability.
I. Entry.
Vuln are all version deamons PureFTP. There is DoS bug.
II. Vulnerability details.
Vulnerability function is displayrate(). There is simple
overflow bug (DoS):
"in file src/ftpd.c"
static void displayrate(const char *word, off_t size,
ed is
MAXPATHLEN) then function return ENAMETOOLONG. It indemnifies
before DoS.
Regards Adam Zabrocki (pi3).
---
Lenin wciąż żywy? http://film.wp.pl/p/film.html?id=8502
___
Full-Disclosure - We belie
folks,
please find attached a disclosure paper on bluetooth.
cheers,
Adam
--
Adam Laurie Tel: +44 (20) 8742 0755
A.L. Digital Ltd. Fax: +44 (20) 8742 5995
The Storeshttp://www.thebunker.net
2 Bath Road http://www.aldigital.co.uk
ices, an attitude that seems to have been taken with the Ericsson T610.
indeed. however, i'm puzzled as to what you mean about the T610, as we
have found it to be one of the vulnerable devices.
[snip]
cheers,
Adam
--
Adam Laurie Tel: +44 (20) 8742 0755
A.L. Digital Lt
and hosting for them because of the downtime probs and security issues that
nac.net is continually plagued with and I usually save the clients between 50
and 75 % of there yearly bill with better service.
I'm just righting this to poke the nose of nac.net.
Adam
On Tuesday 23 December 2
ode: 07054
> Country:US
>
>
> Am I missing something?
>
> -Original Message-
> From: Adam Hunt [mailto:[EMAIL PROTECTED]
> Sent: Wednesday, 24 December 2003 3:29
> To: [EMAIL PROTECTED]; Mauro Flores
> Cc: [EMAIL PROTECTED]
> Subject: Re: [Full-Disclosur
y states:
>
> OrgName:Net Access Corporation
> OrgID: NAC
> Address:1719 STE RT 10E
> Address:Suite 111
> City: Parsippany
> StateProv: NJ
> PostalCode: 07054
> Country:US
>
>
> Am I missing something?
>
> -Original Message-
Some companies consider reverse engineering to be a
violation of their product licensing, so doing this may be
going against their rules to begin with. I believe there
have been several legal cases relating to items like this
(decss being one of them in a sense of reverse
engineering). Considering
0verkill - little simple vulnerability.
I. Entry.
Vulnerability is game 0verkill. There is some little bugs in
clinet / server.
II. Vulnerability details.
a) client:
Vulnerability function is load_cfg(), save_cfg() and maybe
send_message().
There is simple buffer overflow bugs:
"
b hosting firm
that also pushed these "@-URLs" to customers telling them how cute it
would be to have the same web address as their email addy was... (like
http://[EMAIL PROTECTED]) I do not know how successful it was but hope
not very... have not seen the ad lately.
Regards:
Sz.
--
*
[While others have already commented, I cannot resist]
Stefan Esser wrote:
Ohh yes and I choose the word standard, because standard is not what
some RFC/paper dictates, but what the majority of people (or browsers)
use (support).
Huh. This is what's called an "industry standard" and does not hav
rhetorical question wrote:
Hello,
I *may* be wrong. But I do believe the "http://username:[EMAIL PROTECTED] " bit
has been around for some time. I remember finding that out a long time ago,
which was convient in regards to browsing FTP sites which require a login/
password. Was using Netscap
ee
http://www.apache-ssl.org/).
Credits
---
This vulnerability was found and reported by Wietse Venema.
cheers,
Adam
--
Adam Laurie Tel: +44 (20) 8742 0755
A.L. Digital Ltd. Fax: +44 (20) 8742 5995
The Storeshttp://www.thebunker.net
2 Bath Road
Tony Kava wrote:
Are you sure this is the default behaviour of a Red Hat installation? Your
advisory does not indicate any specific version(s) of Red Hat Linux. Is
this supposed to apply to RHL 7.2? 7.3? 8.0? 9.0? Fedora 1? In my previous
experience with the 'mysql-server' package on any Red Hat
Maybe I should know better, but I can't resist...
Bill Royds wrote:
Having a MS record would not eliminate spam coming from users validated on
the sending server, but it would identify the server that it comes from as
"knowing" the sender name. Compromised client boxes would need to use the
ISP
27;t think I need to say any more
about that...
Cheers,
Adam
On Thu, 2003-06-05 at 06:31, Shawn McMahon wrote:
> On Wed, Jun 04, 2003 at 08:37:50PM -0700, morning_wood said:
> >
> > you must have really crappy admin if you need per application blocking
> > ( hint: kill the p
gt; > lawyers
> > say some software has since been deleted from the company's servers,
> > but maintain that anything deleted would still be on backup tapes.
> >
> > It will be harder to delete Foundstone's tarnished reputation.
> > Ex-employees
> > are piling on, telling FORTUNE that Kurtz and McClure took credit for
> > other people's work and created an unusually harsh office environment.
> > (There are even allegations that Foundstone's Ultimate Hacking classes
> > were a ripoff of the Extreme Hacking classes its founders ran at Ernst
> > & Young in the 1990s.) In doing so, they are shedding light on a bunch
> > of executives who seem to have believed their press clips--Fast Company
> > recently named Kurtz one of its 50 champions of innovation--and somehow
> > got lost along the way.
> >
> >
> > .
> >
> >
> >
> >
> >
> > Concerned about your privacy? Follow this link to get
> > FREE encrypted email: https://www.hushmail.com/?l=2
> >
> > Free, ultra-private instant messaging with Hush Messenger
> > https://www.hushmail.com/services.php?subloc=messenger&l=434
> >
> > Big $$$ to be made with the HushMail Affiliate Program:
> > https://www.hushmail.com/about.php?subloc=affiliate&l=427
> > ___
> > Full-Disclosure - We believe in it.
> > Charter: http://lists.netsys.com/full-disclosure-charter.html
> >
--
Adam Lydick <[EMAIL PROTECTED]>
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
Roy S. Rapoport wrote:
On Tue, Jun 17, 2003 at 03:31:25AM +, Donnie Weiner wrote:
--
EXPL-NOTHCKR-A1-31337-2003-00010 exploitlabs.com Advisory 0010
--
the view he's taken on obvious
versus non-obvious pseudonyms.
Adam
--
"It is seldom that liberty of any kind is lost all at once."
-Hume
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
taken on the basis of the information provided
within. Dissemination of this information is granted
provided it is presented in its entirety. Modifications
may not be made without the explicit permission of
Novacoast.
Adam Gray
CTO
Novacoast, Inc.
[EMAIL PROTECTED]
http://www.nova
taken on the basis of the information provided
within. Dissemination of this information is granted
provided it is presented in its entirety. Modifications
may not be made without the explicit permission of
Novacoast.
Adam Gray
CTO
Novacoast, Inc.
[EMAIL PROTECTED]
http://www.nova
Jason Coombs wrote:
A closed source database application offering known good hashes and forensic
details of files published by vendors... These people are headed in a positive
direction, but the closed source part bothers me for some reason.
<...huge snip...>
Of course I was not surprised to see t
how easy traffic analysis is for them.
Is there a political motive? Are we about to see legal attacks on
high latency mixes?
Adam
--
"It is seldom that liberty of any kind is lost all at once."
-Hume
___
On Fri, Aug 22, 2003 at 06:28:26PM +0200, Rainer Gerhards wrote:
| > There is no exponential term in MIX traffic. That means that if you
| > try to ensure that all traffic leaves the network quickly (so you can
| > say, web browse), then your attacker only needs to analyze traffic
| > over a few s
madsaxon wrote:
The US military is considerably more rigorous than the civilian
government in this regard, but even then there are systems which
have slipped through the cracks. Evidence for this is the fact that
Web defacement mirrors still occasionally contain both .gov and
.mil entries.
Not to
Ron Stiemer wrote:
Hi List,
can anybody confirm this, or is it just an april's fool joke ?
Yes, I can confirm this. After all, I have been "on air" with such a
spoofed browser authentication :-) string for years now, making website
statistcs software cry and webmasters scratch their heads. (FWI
Kurt Seifried wrote:
If you're going to pull an Apil 1st hoax it's gotta be a bit less obvious
then this. Although I have no doubt this will send at least a few list
members into dizzying heights of excitement (I suppose it's cheaper then a
subscription to playboy ;).
Well if we are into folly any
Hello all,
As for the "Magic Lantern" stuff, yes AFAIR it was like your typical
malware, was delivered eg via email and did pretty much the same stuff
that today's keystroke-logging remote-controllable malware does. Nothing
truly exciting, not even at the time, but for the fact that it was the
Hello,
Thanks Tamas, I really got a kick out of the article. Especially your
last paragraph, which really underscores my previous point: no need to
go against the crypto head-on (although doing it anyway and suceeding is
certainly nice, even if you only find some unimportant info like the
love
Although this thread has now been more of a "full-discourse" :-) than
anything else, let me add a few points here:
The fact that there is some advanced technology that we know (and may be
some more that we don't know) about for text gathering and analysis and
the fact that huge databases can be
hggdh wrote:
Anyways... the report seems to indicate that Microsoft is the fastest
on solving security issues.
Comments?
While not reading the report does not allow me to make qualified
comments (and the statements for/by the press that are to be quoted in
the news headlines are to be taken with
Jeremiah Cornelius wrote:
"All because the Lady loves Milk Tray..." The BBC has an article about
users giving up their passwords for chocolate.
Hehehehe, I really got a kick outta this. It really goes a long way to
show why you do *not* need to go very fancy with technology to eg attack
strong c
Apache - all versions vulnerability in OLD procesors.
I. Entry.
Vulnerability in probably all versions of apache web server,
default
install (as of version 1.3.29).
II. Vulnerability details.
There are few scenarios, few calls leading to that
bug.
The first call is in mod_auth,
Richard Johnson wrote:
iDEFENSE: The Power of Intelligence : Current Intelligence Report
iSecurity Brief 05.10.04: Why OpenBSD is more secure than Linux
Author: Richard Johnson, the DataThief
<...>
Yawn. I hope Kurt enjoyed reading his years-old article under a
different person's name. Plagiaris
Aditya, ALD [Aditya Lalit Deshmukh] wrote:
are there any lawayers on the list who can confirm / deny this ? or any other list where i can ask this. this has started to get intresting from the legal point of view !
No specific comments on the USC section cited (because, although it is
often forgo
Michal Zalewski wrote:
On Fri, 4 Jun 2004 [EMAIL PROTECTED] wrote:
Anyone know anyone at weather.com?
No, but I must share that I am perhaps for the first time on this list
truly scared of what you might have discovered.
A weather control exploit?
No, I was first to discover this, but problem is
Eric Paynter wrote:
The sad part about this entire topic is the futility of attempting to copy
protect in the first place. So they install some software and Mac and
Win... then some Linux kiddie rips the CD and puts it on P2P and it's out
now for the whole world. All it takes is one person to break
Fetch, Brandon wrote:
Similarly - what's to keep someone from using their digital out form their
home audio equipment to send the bits to their digital in on their computer?
Viola! 'Correct' digital bit stream that is now on the PC to do with as
they wish.
I haven't verified this but would presume
Sandeep Sengupta wrote:
Sandeep Sengupta has invited you to open a free Gmail
account.
Thank you, thank you, thank you! It was very generous of you to think of
us! Perhaps the list indeed needs a gmail account... although given the
amount of drivel^H^H^H^Hdiscussion going on, we would probably
Barry Fitzgerald wrote:
Heh.
The article has the following quote:
"On other platforms, such as Linux, Unix and the Mac, Explorer is less
of a threat."
Uhh... yeah, you could say that it's less of a threat on GNU/Linux and
Unix... non-existance will do that.
Ummm, perhaps people have a short atte
s
that blackhole any incoming connections. this appears to work.
connexant list several other high profile retail modem manufacturers and
pc oems, so i leave it as an exercise for the reader to work out other
manufacturer/vulnerability combinations.
http://www.conexant.com/support/md_supportlinks.h
Hi,
[Since phishing seems to be all the rage today, I feel compelled to add...]
Babak Pasdar wrote:
We have uncovered a phishing scam. This is a perfect example of a
phishing scam. All indicators (that the recipient sees) show a valid and
legitimate e-mail from Wells Fargo. This e-mail tells the
Name: Atari800
Vendor URL: http://atari800.sourceforge.net/
Author: Adam Zabrocki <[EMAIL PROTECTED]>
Date: November 20, 2004
Issue:
Atari800 - free and portable Atari800/XL/XE/5200 emulator
Name: Atari800
Vendor URL: http://atari800.sourceforge.net/
Author: Adam Zabrocki <[EMAIL PROTECTED]>
Date: November 20, 2004
Issue:
Atari800 - free and portable Atari800/XL/XE/5200 emulator
rman and EU laws are relevant to MLNS?
Adam
that gets fixed. It is after all a voluntary patch. If you
do not think it is a vulnerability don't apply the patch. There are some
other nice enhancements in the ICSA Compliance kit that may be worth
looking into.
Adam Gray
On Wed, 2004-12-15 at 09:02 +1030, Geoff Vass wrote:
> Unp
Novacoast.
Adam Gray
CTO
Novacoast, Inc.
agray_at_novacoast.com
http://www.novacoast.com
signature.asc
Description: This is a digitally signed message part
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full
ces: T68, T68i, R520m, T610, Z1010, Z600
Motorola stated that they are committed to fixing the problem, but
further details are unknown.
Known affected devices: V80, V5xx, V6xx and E398.
I hope this is useful, and I wish you all a safe, happy and secure New Year!
cheers,
Adam
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
Title: Encrypted Messenger Remote DoS Vulnerability
Vendor Homepage: http://www.johnytech.com
Discovered by: Adam Baldwin ([EMAIL PROTECTED])
www.evilpacket.net\advisories\EP-000-0001.html
Discovery Date: 1.6.2005
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
University of Phoenix Outlook Express Unauthorized Configuration Manipulation
Vendor Homepage: http://www.phoenix.edu
Discovered by: Adam Baldwin ([EMAIL PROTECTED])
www.evilpacket.net\advisories\EP-000-0002.html
or of this mail
will take possible legal actions against the abuse.
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
Adam Hunt
Director FreeTradeCampus.org
[EMAIL PROTECTED]
___
t to a black hole.
If your ISP has shipped you one of these, *TELL* them! Maybe they have
enough purchasing power to get it sorted...
cheers,
Adam
--
Adam Laurie Tel: +44 (20) 7605 7000
The Bunker Secure Hosting Ltd. Fax: +44 (20) 7605 7099
Shepherds Building
1 - 100 of 108 matches
Mail list logo