[Full-Disclosure] Administrivia: A new home for FD

2005-03-06 Thread John Cartwright
ng-lasting one. Finally, I'd like to take the opportunity to officially thank Len Rose for all his efforts in making Full-Disclosure a success, and wish him well for the future. Cheers - - John -BEGIN PGP SIGNATURE- Version: GnuPG v1.2.6 (SunOS) Comment: http://www.grok

[Full-Disclosure] test

2005-03-02 Thread John Smart
test ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

Re: [Full-Disclosure] Awake a modem with AT commands

2005-02-24 Thread John Galt
gards John Galt On Tue, 22 Feb 2005 00:17:08 +0100, action09 <[EMAIL PROTECTED]> wrote: > Hi! > I'm looking for specially crafted Hayes AT commands to awake a computer > ( behind a firewall, connected to an internal LAN , but --also-- > connected to an external phone li

Re: [Full-Disclosure] IDS Signatures

2005-02-24 Thread John Galt
how I should be going about all this, especially the detection of unknown attacks? danke! regards John Galt On Tue, 22 Feb 2005 12:19:16 -0500, [EMAIL PROTECTED] <[EMAIL PROTECTED]> wrote: > On Tue, 22 Feb 2005 09:36:21 GMT, preeth k said: > > > I am designing a Network Intrus

Re: [Full-Disclosure] Please can some one help out.

2005-02-24 Thread John Galt
but I guess thats what they have 9 lives for! cheers John Galt On Wed, 23 Feb 2005 22:04:29 +, Michael Simpson <[EMAIL PROTECTED]> wrote: > this is really offtopic but quite intriguing > if these are coathangers then the bricks are really small > also the perspective seems wron

[Full-Disclosure] Knox Arkeia remote root/system exploit

2005-02-18 Thread John Doe
0day cuz i'm bored /* * Knox Arkeia Server Backup * arkeiad local/remote root exploit * Targets for Redhat 7.2/8.0, Win2k SP2/SP3/SP4, WinXP SP1, Win 2003 EE * Works up to current version 5.3.x * * --- * * Linux x86: * ./arksink2 * * Exports an xterm to the box of your choosing. Mak

[Full-Disclosure] Administrivia: Hosting Urgently Required

2005-02-17 Thread John Cartwright
Hi It looks as though my hosting plans have fallen through, with the result of this being that I have very little time to find a new home for the list. Anyone capable of offering support should contact me off-list ASAP, or I may have no choice but to take FD offline. Cheers - John

Re: [Full-Disclosure] Administrivia: List Compromised due to Mailman Vulnerability

2005-02-10 Thread John Cartwright
in the near future. Passwords should be changed from the auto-generated ones at members' earliest convenience. Cheers - John ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

[Full-Disclosure] Administrivia: List Compromised due to Mailman Vulnerability

2005-02-09 Thread John Cartwright
tallations running on web servers that don't strip extraneous slashes from URLs, such as Apache 1.3.x. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2005-0202 to this mailman issue. Cheers - John ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

[Full-Disclosure] List Charter

2005-02-09 Thread John Cartwright
[Full-Disclosure] Mailing List Charter John Cartwright <[EMAIL PROTECTED]> and Len Rose <[EMAIL PROTECTED]> Introduction & Purpose -- This document serves as a charter for the [Full-Disclosure] mailing list hosted at lists.netsys.com. The list was created

Re: [Full-Disclosure] Packet/Signature-based Firewall

2005-01-22 Thread John
Greg Leclercq wrote: The l7-filter isn't working. What do you mean by 'not working' ? What is pom? P-o-m is Patch O Matic. It provides additionnal features by patching netfilter. I'm not sure I understand what you want. Is 'signature-based firewall' an IPS (Intrusion Prevention System)

Re: [Full-Disclosure] Packet/Signature-based Firewall

2005-01-22 Thread John
The l7-filter isn't working. What is pom? I was wondering are there any Budget/OpenSource signature-based firewall around like the one Packeteer has? (packetshaper) If you want to make a linux-based solution, you can use Linux netfilter + l7-filter: http://l7-filter.sourceforge.net/. Check al

Re: [Full-Disclosure] Packet/Signature-based Firewall

2005-01-22 Thread John
product (maybe somewhat more than that but now a Firewall) Regards, Debasis Mohanty www.hackingspirits.com -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of John Sent: Saturday, January 22, 2005 11:31 AM To: full-disclosure@lists.netsys.com Subject: [

[Full-Disclosure] Packet/Signature-based Firewall

2005-01-21 Thread John
Hi I was wondering are there any Budget/OpenSource signature-based firewall around like the one Packeteer has? (packetshaper) Thanks. ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

[Full-Disclosure] BlackBerry PIN's are Not Confidential

2005-01-19 Thread John Costa
Is anyone aware of tools/techniques capable of sniffing/intercepting Blackberry PIN to PIN messages? Your input will be very much appreciated Thank you = J. C. Costa __ Post your free ad now! http://personals.yahoo.ca

[Full-Disclosure] List Charter

2005-01-09 Thread John Cartwright
[Full-Disclosure] Mailing List Charter John Cartwright <[EMAIL PROTECTED]> and Len Rose <[EMAIL PROTECTED]> Introduction & Purpose -- This document serves as a charter for the [Full-Disclosure] mailing list hosted at lists.netsys.com. The list was created

Re: [Full-Disclosure] Jami L Blume/BOARD/FRS is out of the office. (fwd)

2004-12-26 Thread John Cartwright
in the case of bounces to posters' messages, please do inform us off-list so that we can investigate. Merry Christmas to all, btw :) Cheers - John ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

RE: [Full-Disclosure] HOW TO BREAK XP SP2 POPUP BLOCKER: kick itin the nut !

2004-12-15 Thread John Omernik
My question is this... Are their GPO objects for firefox. I would love to deploy firefox, but being able to control the configuration via Group Policy is a must. -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Scott Renna Sent: Monday, December 13, 2004 1

[Full-Disclosure] [johnc@grok.org.uk: Administrivia: Hardware Failure]

2004-12-13 Thread John Cartwright
m is still undergoing maintenance so Len is uncontactable for the time being. Cheers - John - Forwarded message from John Cartwright <[EMAIL PROTECTED]> - Date: Sun, 12 Dec 2004 20:17:45 + From: John Cartwright <[EMAIL PROTECTED]> To: [EMAIL PROTECTED] Subject: Administrivia: Hardw

[Full-Disclosure] List Charter

2004-12-12 Thread John Cartwright
[Full-Disclosure] Mailing List Charter John Cartwright <[EMAIL PROTECTED]> and Len Rose <[EMAIL PROTECTED]> Introduction & Purpose -- This document serves as a charter for the [Full-Disclosure] mailing list hosted at lists.netsys.com. The list was created

[Fwd: RE: [Full-Disclosure] Remote Mercury32 Imap exploit]

2004-11-30 Thread John
This message was sent to me off list. JohnH --- Begin Message --- Re John, Then you're obviously not a "Whitehat" :) BUT, your point is taken, and I will not release any more half baked sploits into the wild. Cheers, Muts -Original Message- From: John [mailto:[

RE: [Full-Disclosure] Remote Mercury32 Imap exploit

2004-11-30 Thread John
The only point I see is, If you are going to do something you might as well do it correctly or not do it at all. If you get popular in the doing so, then so be it. John On Tue, 2004-11-30 at 14:06, muts wrote: > Re Johnh, > > If I'm not mistaken, the point isn't to get a *w

[Full-Disclosure] Fwd: Hi, It's Me !!!!!

2004-11-25 Thread john morris
-- Forwarded message -- From: [EMAIL PROTECTED] <[EMAIL PROTECTED]> Date: Wed, 24 Nov 2004 21:08:16 -0800 Subject: Hi, It's Me ! To: FROM THE DESK OF BARRISTER. Wisdom Joshua (ESQ). Dear, I am Wisdom Joshua Esq., a Senior Advocate of Nigeria . I am the legal Representative

Re: [Full-Disclosure] previledge password in cisco routers

2004-11-24 Thread john morris
enter the law enforcement module. there are better ways to say a thing. And hey u dnt have to be PRESSURISED ur health conditions bother me. chill out -- (FROM LINKS TO LINKS WE ARE ALL LINKED) cheers. morris ___ Full-Disclosure - We believe

Re: [Full-Disclosure] previledge password in cisco routers

2004-11-24 Thread john morris
Ooops.. i reframe my question. Is there a way to get the enable password remotely . Brute force is not my option (FROM LINKS TO LINKS WE ARE ALL LINKED) cheers. morris ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/

[Full-Disclosure] previledge password in cisco routers

2004-11-23 Thread john morris
Is there a quick and decent way to obtain the previledge password of a cisco router my version is as follows cisco 3640 (R4700) processor -- (FROM LINKS TO LINKS WE ARE ALL LINKED) cheers. morris ___ Full-Disclosure - We believe in it. Charter

[Full-Disclosure] scannig through public anonymous proxy

2004-11-23 Thread john morris
hey guys i am stuck here. would someone help how can i use port scanning tools to use the public anonymous proxy if some specific gui based windows tool exists please suggest. -- (FROM LINKS TO LINKS WE ARE ALL LINKED) cheers. morris ___ Full

[Full-Disclosure] Network Security in India

2004-11-23 Thread john morris
I had a brief stint Primus Telecom in delhi ( www.primus-direct.com). It has a flat network with absolutely no security. The routers as as vulnerable to any known exploit and the same applies to a few web servers they host. The basics such as patch management is never taken care of. This mail doesn

Re: [Full-Disclosure] HAPPY BIRTHDAY: Yahoo & AmericanGreetings.com

2004-11-23 Thread john morris
HAPPY BIRTHDAY TO ME. ANY E-GREETING FOR ME FELLAS (FROM LINKS TO LINKS WE ARE ALL LINKED) cheers. morris ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

Re: joe the "expert" (was Re: [Full-Disclosure] IE is just as safe as FireFox )

2004-11-21 Thread john morris
Hey Guys this is reallly getting on to ur egoes. loyality pays royality at times.after all we all play with what pays. its high time we realise most of the vendor certifications are over rated and dnt guarantee the depth of knowledge. The HR people are a real piece of morons all over if atall certi

Re: [Full-Disclosure] IE is just as safe as FireFox

2004-11-19 Thread john morris
Dear Joe, So many out there use MS OS doesnt make it the best just as so many people go to McDonalds doesnt mean they make the best food -- (FROM LINKS TO LINKS WE ARE ALL LINKED) cheers. morris ___ Full-Disclosure - We believe in it. Char

Re: [Full-Disclosure] controversial shadowcrew site hacked by secret service?

2004-11-16 Thread John Waller
isclosure - We believe in it. > Charter: http://lists.netsys.com/full-disclosure-charter.html > -- John Waller [EMAIL PROTECTED] ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

Re: [in] Re: [Full-Disclosure] IE is just as safe as FireFox

2004-11-14 Thread john morris
Firefox avoids several fundamental design flaws of IE, in that: -Firefox is not integrated into Windows, and thus closes holes allowing access to the OS. -Firefox does not support ActiveX JavaVM or VBScript, three Microsoft proprietary technologies that are responsible for many security holes. -

[Full-Disclosure] List Charter

2004-11-08 Thread John Cartwright
[Full-Disclosure] Mailing List Charter John Cartwright <[EMAIL PROTECTED]> and Len Rose <[EMAIL PROTECTED]> Introduction & Purpose -- This document serves as a charter for the [Full-Disclosure] mailing list hosted at lists.netsys.com. The list was created

RE: [Full-Disclosure] Security (for the common people) in electronic vote?

2004-11-04 Thread Airey, John
tatives. Three, it bears no relevance to computer security. Granted it's about putting excessive trust in computerised systems, but that's an issue that's way outside the purpose of this list. Thank you. -- John Airey, BSc (Jt Hons), CNA, RHCE Internet systems support officer, IT

Re: [Full-Disclosure] =?unknown-8bit?q?=5B?==?unknown-8bit?q?moderator!=5D_Re=3A_Versandbest=E4tigun?==?unknown-8bit?q?g?= : AW : Re: [SPAM] Fw: [Full-Disclosure] Joke.cpl ???

2004-10-29 Thread John Cartwright
s to it and responds again... Cheers - John ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

RE: [Full-Disclosure] Possibly a stupid question RPC over HTTP

2004-10-26 Thread Airey, John
> -Original Message- > From: Kyle Maxwell [mailto:[EMAIL PROTECTED] > Sent: 25 October 2004 04:30 > To: Airey, John > Cc: [EMAIL PROTECTED] > Subject: Re: [Full-Disclosure] Possibly a stupid question RPC > over HTTP > >[snip] > > You're talking abou

RE: [Full-Disclosure] Windows Time Synchronization - Best Practices

2004-10-26 Thread Airey, John
this stupidity in your next version of Windows. It will annoy your users to begin with, but a number of time synch issues will be solved in one fell swoop. All the three letter codes are publicly available and understood by your end users. -- John Airey, BSc (Jt Hons), CNA, RHCE Internet system

RE: [Full-Disclosure] Possibly a stupid question RPC over HTTP

2004-10-22 Thread Airey, John
> -Original Message- > From: Kyle Maxwell [mailto:[EMAIL PROTECTED] > Sent: 21 October 2004 17:57 > To: Airey, John > Cc: [EMAIL PROTECTED] > Subject: Re: [Full-Disclosure] Possibly a stupid question RPC > over HTTP > > > On Thu, 21 Oct 2004 13:21:10

Re: [Full-Disclosure] Will a vote for John Kerry be counted by a HartInterCivic eSlate3000 in Honolu

2004-10-21 Thread John Creegan
x27;s IT [EMAIL PROTECTED] wrote on 10/20/2004 08:24:59 PM: > I just voted for John Kerry at a walk-in absentee ballot polling > place in Honolulu County using an eSlate3000 (unit serial number > A05A0B) made by Hart Intercivic: http://www.hartintercivic.com > > I was told

RE: [Full-Disclosure] Possibly a stupid question RPC over HTTP

2004-10-21 Thread Airey, John
te force to break the SSL encryption. Two (and it's entirely possible that the security services have this already) come up with a mathematical way to factor large primes rapidly. I cannot believe that no-one has pointed this out yet. -- John Airey, BSc (Jt Hons), CNA, RHCE Internet systems suppor

[Full-Disclosure] List Charter

2004-10-09 Thread John Cartwright
[Full-Disclosure] Mailing List Charter John Cartwright <[EMAIL PROTECTED]> and Len Rose <[EMAIL PROTECTED]> Introduction & Purpose -- This document serves as a charter for the [Full-Disclosure] mailing list hosted at lists.netsys.com. The list was created

Re: [Full-Disclosure] "tired of spam? time to fight back!" or fightspam.nm.ru

2004-09-23 Thread John Kinsella
Cute idea, but basically illegal...it's a DDOS just the clients are compromised via social engineering not some nifty leet hack. John On Thu, Sep 23, 2004 at 03:10:55PM -0400, The Devilous Angel wrote: > Greetings list! > > I've just hit this url and i think it's a p

Re: [Full-Disclosure] Scandal: IT Security firm hires the author of Sasser worm

2004-09-20 Thread John Galt
r.html - -- The Internet must be a medium for it is neither Rare nor Well done! mailto:[EMAIL PROTECTED]">John Galt -BEGIN PGP SIGNATURE- Version: GnuPG v1.2.5 (GNU/Linux) Comment: Made with pgp4pine 1.76 iD8DBQFBT7J2+TX+nYGFQPs

Re: [Full-Disclosure] Severe exploit found, all UNIX are affected!

2004-09-20 Thread John Galt
a medium for it is neither Rare nor Well done! mailto:[EMAIL PROTECTED]">John Galt -BEGIN PGP SIGNATURE- Version: GnuPG v1.2.5 (GNU/Linux) Comment: Made with pgp4pine 1.76 iD8DBQFBT6LU+TX+nYGFQPsRAuX+AJ42LAHVMaPbVYzEw8wHWvCJMRt94gCgkpo4 6x2WRw2ZfiSRJ6P/4FyMISk= =iGh5

Re: [Full-Disclosure] win2kup2date.exe ?

2004-09-10 Thread John Galt
troopers versus Redshirts to the death. Who is John Galt? [EMAIL PROTECTED], that's who!

Re: [Full-Disclosure] OT: gmail invites

2004-09-10 Thread John Kinsella
On Fri, Sep 10, 2004 at 05:19:41PM +0200, Doc Nielsen wrote: > On Fri, 10 Sep 2004 14:12:28 +0200, Fredrik Leijon <[EMAIL PROTECTED]> wrote: > > Alt J wrote: > > >I have a few gmail invites. > > >Please reply off list if you're interested. > ditto ... got 4 invitez and no friends :D damn i am a bas

[Full-Disclosure] List Charter

2004-09-09 Thread John Cartwright
[Full-Disclosure] Mailing List Charter John Cartwright <[EMAIL PROTECTED]> and Len Rose <[EMAIL PROTECTED]> Introduction & Purpose -- This document serves as a charter for the [Full-Disclosure] mailing list hosted at lists.netsys.com. The list was created

RE: [Full-Disclosure] Where to submit a suspected trojan or virus?

2004-09-03 Thread John LaCour
p files to everyone on my distribution list. If anyone knows of any others, I'd appreciate the info. -John > -Original Message- > From: Scenobro [mailto:[EMAIL PROTECTED] > Sent: Thursday, September 02, 2004 9:00 PM > To: [EMAIL PROTECTED] > Subject: [Full-Disclosure] W

[Full-Disclosure] Multi-vendor AV scanning without sending a sample

2004-09-03 Thread John LaCour
p://housecall.trendmicro.com/housecall/start_corp.asp Regards, John ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

Re: [Full-Disclosure] U.S. National Security Awareness Day (NSAD)

2004-08-30 Thread John Galt
s versus Redshirts to the death. Who is John Galt? [EMAIL PROTECTED], that's who! ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

[Full-Disclosure] new email virus?

2004-08-25 Thread John Nagro
uot; Content-Transfer-Encoding: base64 Content-Disposition: attachment; filename="1.gif" NDU0NTEyMTI= --fthllkqoljuvkhyckltf-- ---- -- John Nagro [EMAIL PROTECTED] ___ F

RE: [Full-Disclosure] Unsecure file permission of ZoneAlarm pro.

2004-08-20 Thread John LaCour
files against unauthorized changes, there are additional integrity checks and other protection mechanisms implemented for all policy configuration files. Should any policy configuration files fail integrity checks, the firewall will fail closed. Again, no issue. - -- John LaCour Security Services

Re: [Full-Disclosure] National Database of Variants with Fixes-non-vendor specific

2004-08-11 Thread John Hall
se, the devil is always in the details. I hope you have your tinfoil hat firmly mounted and calibrated. Thanks for the links though. It's fun to see a poorly conceived government fantasy get crucified in the press. JMH Gary E. Miller wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Y

Re: [Full-Disclosure] National Database of Variants with Fixes-non-vendor specific

2004-08-11 Thread John Hall
thers from using the same methodology to shield their malware? RGDS GARY - --- Gary E. Miller Rellim 20340 Empire Blvd, Suite E-3, Bend, OR 97701 [EMAIL PROTECTED] Tel:+1(541)382-8588 Fax: +1(541)382-8676 -- John Hall

RE: [Full-Disclosure] AV Naming Convention

2004-08-11 Thread John . Airey
ren't enough, since even updating hourly still leave 59 minutes of vulnerability. The speed at which viruses are now spreading means that organisations have to have automated patching too. Of course, whatever you do each working day is more and more like russian roulette (except there appears to be only

Re: [Full-Disclosure] National Database of Variants with Fixes-non-vendor specific

2004-08-10 Thread John Hall
GARY - --- Gary E. Miller Rellim 20340 Empire Blvd, Suite E-3, Bend, OR 97701 [EMAIL PROTECTED] Tel:+1(541)382-8588 Fax: +1(541)382-8676 -- John Hall Test Manager - Switch Team F5 Networks

[Full-Disclosure] List Charter

2004-08-09 Thread John Cartwright
[Full-Disclosure] Mailing List Charter John Cartwright <[EMAIL PROTECTED]> and Len Rose <[EMAIL PROTECTED]> Introduction & Purpose -- This document serves as a charter for the [Full-Disclosure] mailing list hosted at lists.netsys.com. The list was created

Re: [Full-Disclosure] waa waa (was Finally the truth slips out)

2004-08-06 Thread John Creegan
I thought this list was originally meant to focus primarily on "computer hardware/software" types of security issues. Malware, discovered exploitables, etc. >>> Barry Fitzgerald <[EMAIL PROTECTED]> 08/06/04 03:05PM >>> Paul Schmehl wrote: > No, it's not excellent. There are tons of places on t

Re: FW: [Full-Disclosure] Question for DNS pros

2004-08-05 Thread John Hall
mers, right? If I happen to have a /8 I might receive 5592405 Probe packets a second per 3-DNS group. I would call that significant. No. The total probe packet generation capacity of a 3-DNS group is limited. Nils JMH -- John Hall Test Manag

Re: FW: [Full-Disclosure] Question for DNS pros

2004-08-05 Thread John Hall
y serve. JMH Gary E. Miller wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Yo John! On Wed, 4 Aug 2004, John Hall wrote: Just about any response is useful for RTT/reachability measurement as long as we can associate it back to the correct probe. My name servers a

Re: FW: [Full-Disclosure] Question for DNS pros

2004-08-04 Thread John Hall
topic. E-Mail me off list if you want to discuss that topic further. Regards, Mark -- John Hall Test Manager - Switch Team F5 Networks, Inc. ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

Re: FW: [Full-Disclosure] Question for DNS pros

2004-08-04 Thread John Hall
ou may still want to see these alerts anyway, since those 3-DNS probes could come from a BIG-IP which is also configured to NAT traffic for an entire network behind it. You wouldn't be able to distinguish the 3-DNS probes from the probes of a machine behind the BIG-IP. Thought anyone? (If anyone is

Re: FW: [Full-Disclosure] Question for DNS pros

2004-08-04 Thread John Hall
Ron DuFresne wrote: Still following here... adding oneself to the list John mentioned might be the eaisier tack in this situation, and make it so one is not hit by new implimentations, as long as BIG-IP sites are not able to configure themselves out of the do-not-probe listing as well; 3-DNS does

Re: [Full-Disclosure] Defcon spelled half backwards is Fedcon and you dumfucks walked into a trap

2004-08-03 Thread John Galt
it. > Charter: http://lists.netsys.com/full-disclosure-charter.html > - -- Customer: "I'm running Windows '98" Tech: "Yes." Customer: "My computer isn't working now." Tech: "Yes, you said that." Who is John Galt? [

Re: FW: [Full-Disclosure] Question for DNS pros

2004-08-03 Thread John Hall
Responses in-line... Frank Knobbe wrote: Hello John, glad to see you guys are keeping up with all the current stuff going on in lists ;) I had sent a dump earlier. It is attached again below. The TCP SYN packets do indeed start with IPID 1 and move up to 3. However, these all come from the same IP

Re: FW: [Full-Disclosure] Question for DNS pros

2004-08-03 Thread John Hall
some sort of probe to see if a host that contacted them before is still alive. Paul Schmehl ([EMAIL PROTECTED]) Adjunct Information Security Officer The University of Texas at Dallas AVIEN Founding Member http://www.utdallas.edu/ir/security/ -- John Hall

Re: [Full-Disclosure] Cool Web Search

2004-07-30 Thread John Kinsella
what...8 times IIRC? So, in theory, one "format C:" can be undone. ;) John ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

RE: [Full-Disclosure] Redhat 9 PHP 4.2.2 update for the memory_li mit vulnerability

2004-07-26 Thread John . Airey
9 is no longer supported by Red Hat. Try www.fedoralegacy.org for updates now. However, this site depends on people making and testing the updates for them, so don't hold your breath. -- John Airey, BSc (Jt Hons), CNA, RHCE Internet systems support officer, ITCSD, Royal National Institute of

[Full-Disclosure] Progress and Challenges

2004-07-23 Thread John Dowling
Due to the lag time in posts appearing to the list, this may have already been mentioned, and if so, I apologize. Also, if you could care less what this report has to say, I apologize as well. Dept of Homeland Security has released an audit of security within the dept. In his report 'Progress and

[Full-Disclosure] [OT] redirection exploit in FD

2004-07-22 Thread John Dowling
This is no hoax! I hate hoax warnings, but this one is important. If a man comes to your front door and says he is conducting a survey and asks you to show him your ass, DO NOT show him your ass. This is a scam; he only wants to see your ass. I wish I'd gotten this yesterday. I feel so s

RE: [Full-Disclosure] A Popup! In Mozilla!

2004-07-21 Thread John Dowling
I disagree. Initially, the image used in that popup actually comes from a different server, but that's trivial. What I see as a bigger issue is that blocking the image from the server leaves the user with an empty div block covering the page, and blocking the site serving the div content could es

Re: [Full-Disclosure] A Popup! In Mozilla!

2004-07-21 Thread John Dowling
James, That's a natural workaround to allow the site to continue to generate impressions of popups they sell. This tag allows a 'chromeless window' to appear at z-index 3, floating above the normal browser window. As this image is a capture from a winXP box with default color scheme, this trick

RE:[Full-Disclosure] IE

2004-07-20 Thread John Dowling
Not to return to the original post or anything, but was anyone able to identify the registry keys that will sucessfully modify the user-agent string? There seem to be many keys other than HKLM>software>MS>windows>current_version>internet_settings And the key at HKLM>software>MS>windows>current_ve

Re: [Full-Disclosure] No shell => secure?

2004-07-12 Thread John Creegan
In one sense I agree this would protect you from any virus, considering that /bin is in the path environment variable, and that the system startup scripts use it. Without making changes to all those, you wouldn't have much of a system. Without /bin in the path, a lot of stuff is gonna break.

RE: [Full-Disclosure] Microsoft laxed security is threat to inter net

2004-07-12 Thread John . Airey
nyway. Anyone who trusts critical infrastructure to it needs to be sacked. How ironic it is though that many cash machines in the UK are Windows terminals. If it were so easy to fix these problems then most of us who are employed and reading this list would be out of work. It isn't easy, and a

[Full-Disclosure] List Charter

2004-07-09 Thread John Cartwright
[Full-Disclosure] Mailing List Charter John Cartwright <[EMAIL PROTECTED]> and Len Rose <[EMAIL PROTECTED]> Introduction & Purpose -- This document serves as a charter for the [Full-Disclosure] mailing list hosted at lists.netsys.com. The list was created

Re: Re: [Full-Disclosure] The "Drew Copley is a prick" Poll update [Time to Grow Up]

2004-07-04 Thread Merkur John Maclang
On Sat, 03 Jul 2004 22:33:15 -0700, Syke <[EMAIL PROTECTED]> wrote: > > > Thomas Ryan wrote: > > >The lack of professionalism from Team Bugtraq Security is getting to be > >annoying, openly showing their ignorance with defamatory remarks towards > >Drew Copley and eEye. It's quite obvious you do

Re: [Full-Disclosure] Successful in blocking all known exploits

2004-07-03 Thread Merkur John Maclang
great news..now share the wealth On Sat, 3 Jul 2004 10:25:57 -0500, RandallM <[EMAIL PROTECTED]> wrote: > After a number of years, much thought,and long nights I have developed a > systematic method to prevent and thwart exploits on my system! > > NEVER REBOOT! > > I have been up and running fo

RE: Betr.: Re: [Full-Disclosure] Fix for IE ADODB.Stream vulnerability is out

2004-07-03 Thread Mr. John
It is OK, but it causes security alert on some machines because of "unsafe component". It isn't good for us. But it is interesting that only on some machines, this security alert prompted, on most winXP, cmd.exe will run without any prompt. What is your idea? --- Jelmer <[EMAIL PROTECTED]> wrote:

Re: RE: SUPER SPOOF DELUXE Re: [Full-Disclosure] Microsoft and Security

2004-07-02 Thread John Sage
Thu, 1 Jul 2004 22:35:17 -0700 > > Yeah, yeah, maybe so, but he's not a pussy who hides his identity > behind his forged email address. As the alleged father of a newborn daughter, I sincerly hope you'll have learned to abandon such adolescent derogatories as "pussy" be

RE: [Full-Disclosure] Presidential Candidates' Websites Vulnerabl e

2004-07-02 Thread John . Airey
changing votes would be relatively easy. For those reasons I would be opposed to electronic ballot machines whoever makes them. I think though that this is way off-topic now, so I'll quit while I'm ahead. -- John Airey, BSc (Jt Hons), CNA, RHCE Internet systems support officer, ITCSD, Ro

RE: [Full-Disclosure] PIX vs CheckPoint

2004-07-01 Thread John . Airey
but has lots of subtle differences that will byte you when > you least expect > it. > Can you name one? I find it a pain the other way round, like not being able to "write mem" when in configuration. -- John Airey, BSc (Jt Hons), CNA, RHCE Internet systems support officer, ITCSD

Re: [Full-Disclosure] Tools for checking for presence of adware remotely

2004-06-30 Thread John Lampe
for a dll, exe, or registry entry, you'll need to configure Nessus with a domain, account, and passwd. John Lampe jwlampe -at- nessus.org http://f00dikator.aceryder.com/ "Truth is one, but error proliferates. Man tracks it down and cuts it up into little pieces hoping to turn it into grains

Re: [Full-Disclosure] PIX vs CheckPoint

2004-06-29 Thread John Kinsella
for you like always allow DNS traffic through, even if you have no > port 53 rule and a deny all policy. How helpful! Sounds like somebody needs to learn how to run FW-1. There's several "implied" rules which are set from Global Properties, and are only displayed/logged if

Re: [Full-Disclosure] PIX vs CheckPoint

2004-06-29 Thread John Kinsella
ltiple companies for MSPs) with FW-1 and P-1 than anything I've seen from Cisco. Personally I was scarred by some bugs in various 5.x versions of PIX software. (oh and to echo the point of another person, PLEASE, for the love of (insert 1+ diety) do not run a firewa

[Full-Disclosure] DoS in popclient 3.0b6

2004-06-29 Thread John Cartwright
DoS in popclient 3.0b6 -- Release Date: 29th June 2004 Discovery: Dean White <[EMAIL PROTECTED]> Research: John Cartwright <[EMAIL PROTECTED]> Overview "popclient is a Post Office Protocol compliant mail retrieval client which supports both POP2

Re: [Full-Disclosure] Vulnerability Disclosure Technics

2004-06-22 Thread Mr. John
these testing, but I don't have any IDEA about that. Regards. Mr. John   -- "[EMAIL PROTECTED]" <[EMAIL PROTECTED]> wrote: There are several ways to search for vulnerabilities in applications. If you have the sourcecode, you can d

[Full-Disclosure] Vulnerability Disclosure Technics

2004-06-19 Thread Mr. John
, ... for this purpose, for finding a vulnerability in a software? Thanks John __ Do you Yahoo!? New and Improved Yahoo! Mail - Send 10MB messages! http://promotions.yahoo.com/new_mail ___ Full-Disclosure

Re: [Full-Disclosure] Possible First Crypto Virus Definitely Disc overed!

2004-06-10 Thread John Sage
. Can't anyone resist posting to this thread? Oh, WTF. OK, me too.. Happy now? - John -- 10 print "Home" 20 print "Sweet" 30 goto 10 ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

[Full-Disclosure] List Charter

2004-06-09 Thread John Cartwright
[Full-Disclosure] Mailing List Charter John Cartwright <[EMAIL PROTECTED]> and Len Rose <[EMAIL PROTECTED]> Introduction & Purpose -- This document serves as a charter for the [Full-Disclosure] mailing list hosted at lists.netsys.com. The list was created

Re: [Full-Disclosure] Out of Office

2004-06-04 Thread John Galt
derek holzer > > ___ > Full-Disclosure - We believe in it. > Charter: http://lists.netsys.com/full-disclosure-charter.html > - -- The Internet must be a medium for it is neither Rare nor Well done! mailto:[EMAIL PROTECTED]">John Galt -BEGIN PGP SIGNAT

Re: [Full-Disclosure] Re: Support the Sasser-author fund started

2004-05-18 Thread John Galt
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On Tue, 18 May 2004 [EMAIL PROTECTED] wrote: > well, i just donated $10 USD long live the criminals May Roger Ebert spit on you for eternity... (google for Boulder Pledge) > - Original Message - > From: "John Galt" <[

Re: [Full-Disclosure] Re: Support the Sasser-author fund started

2004-05-17 Thread John Galt
ut only 4 muscles to work the trigger of a good sniper rifle. Who is John galt? [EMAIL PROTECTED], that's who! -BEGIN PGP SIGNATURE- Version: GnuPG v1.2.4 (GNU/Linux) Comment: Made with pgp4pine 1.76 iD8DBQFAqZWF+TX+nYGFQPsRAu9UAJ9NKSY5NE8cT0dGaDiO0ji2LF4DQACfT4Zn Cq4DBsCfyI+P2d5gTO

RE: [Full-Disclosure] Orkut fake in the wild

2004-05-14 Thread John LaCour
whois registrations for both sites seem to be the same. The ip addresses of both servers are 66.28.205.19 and .22 respectively. I'm inclined to think that it's legit and they've simply taken steps to stop what you believe is happening. > -Original Message- > From: Nico Golde [mailto:[EMA

RE: [Full-Disclosure] Support the Sasser-author fund started

2004-05-13 Thread Duquette, John
.. > > he is correct when he says that Microsoft will say it's > completely the > worm writer's fault. BUT i think Microsoft should be punished too for > having so many security holes. they had to patch it faster. > Why not punish all the admins/users who failed to patch their systems in time

RE: [Full-Disclosure] leaking

2004-05-12 Thread Duquette, John
Unfortunately in a controlled environment it's not always possible to avoid MUA's. Novell's announcement is good news in any event. However, if you do use outlook HTML mail can be disabled via a registry key. Create HKEY_CURRENT_USER\Software\Microsoft\Office\10.0\Outlook\Options\Mail\ReadAs Pl

[Full-Disclosure] List Charter

2004-05-09 Thread John Cartwright
[Full-Disclosure] Mailing List Charter John Cartwright <[EMAIL PROTECTED]> and Len Rose <[EMAIL PROTECTED]> Introduction & Purpose -- This document serves as a charter for the [Full-Disclosure] mailing list hosted at lists.netsys.com. The list was created

Re: [Full-Disclosure] morning_wood is really a blackhat

2004-05-05 Thread John Sage
accounts for 90% of the email addresses in my procmail Luz3rz_L1zt rule (now at +30 and counting). It's gotten to the point that I don't even read this list that often any more for having to wade through all the crap. Of course, the down side is that when I try to catch up, the crap is j

[Full-Disclosure] viruses welcome, one and all

2004-04-30 Thread John Lalla
much to fear from such rot, and careful consideration of your responses leads me to agree with your philosophy on the matter. p.s. I would have included the complete headers had I not already sent them the way of /dev/null. My mistake. Regards, -- John Lalla Santa Barbara, CA

  1   2   3   4   >