Hi Ali,
Steve did no such thing (I also read that article.)
Steve wrote a 'spybot', to connect to the ddos net he found and invisibly
log all conversations.
He did NOT however have any software analysing these conversations.
What the .gov is thinking of doing now is meant for extremely large netw
Official standpoint from M$ on beta/RC naming:
Beta releases do not necessarilly contain same functionality as the final
release RC DOES contain same functionality as final release (no more
functionality changes are planned)
So it's not a question of reliability but functionality ...
Just my 2c
Of course you can see that on the SENDING end ...
Not on the receiving end though ...
-Original Message-
From: Nico Golde [mailto:[EMAIL PROTECTED]
Sent: donderdag 26 februari 2004 14:36
To: [EMAIL PROTECTED]
Subject: Re: [Full-Disclosure] a question about e-mails
Hallo Chris,
* Chris
Yeah yeah yeah yada yada yada ...
Well this BOZO here managed to scan and print both the older dutch money and
the new euro using an HP scanner, HP 4500 printer and drivers from 2003.
I also used photoshop 7 on it to rotate the picture about 1 degree... None
of these devices / software gave me any
I've actually tried that BOMB thing at the airport
Just before getting into the plane I was asked if the device on my belt was
my walkman ...
I was tupid enough to want to make a joke and said 'Nope, it's my BOMB'. I
got a VERY angry look and got asked if I thought that was supposed to be
funn
Well ...
Xfteam.net resolves fine for me ...(IP 69.56.243.146)
There's a website with a few files for download ... One of them was detected
as a linux virus by my NAV :)
There's a folder 'forum' which looks like a portugese hackers hideout ...
Not very much posted there though ...
My 2c.
-Or
But does the software actually check if it's a 'valid' pgp signature ?
Coz lots of spam these days have 'bogus pgp signatures', exactly BECAUSE a
lot of anti spam software flags them as 'non-spam'... So they use something
that LOOKS like a signature to fool the anti spam software
Sorry about m
Euhm .. I think he was asking for SOURCE code of this very publicly
available exploit.
-Original Message-
From: . [mailto:[EMAIL PROTECTED]
Sent: vrijdag 31 oktober 2003 16:05
To: [EMAIL PROTECTED]
Subject: Re: [Full-Disclosure] pipeupadmin
try on google
it's easy
http://content.443.ch
Hmm ... I think I missed the part where you explain your subject line ?
-Original Message-
From: Georgi Guninski [mailto:[EMAIL PROTECTED]
Sent: woensdag 22 oktober 2003 16:50
To: [EMAIL PROTECTED]
Subject: [Full-Disclosure] Sylpheed-claws format string bug, yet still
sylpheed much bette