ng-lasting one.
Finally, I'd like to take the opportunity to officially thank Len Rose
for all his efforts in making Full-Disclosure a success, and wish him
well for the future.
Cheers
- - John
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.6 (SunOS)
Comment: http://www.grok
test
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
gards
John Galt
On Tue, 22 Feb 2005 00:17:08 +0100, action09 <[EMAIL PROTECTED]> wrote:
> Hi!
> I'm looking for specially crafted Hayes AT commands to awake a computer
> ( behind a firewall, connected to an internal LAN , but --also--
> connected to an external phone li
how I should be going
about all this, especially the detection of unknown attacks?
danke!
regards
John Galt
On Tue, 22 Feb 2005 12:19:16 -0500, [EMAIL PROTECTED]
<[EMAIL PROTECTED]> wrote:
> On Tue, 22 Feb 2005 09:36:21 GMT, preeth k said:
>
> > I am designing a Network Intrus
but I guess thats what
they have 9 lives for!
cheers
John Galt
On Wed, 23 Feb 2005 22:04:29 +, Michael Simpson
<[EMAIL PROTECTED]> wrote:
> this is really offtopic but quite intriguing
> if these are coathangers then the bricks are really small
> also the perspective seems wron
0day cuz i'm bored
/*
* Knox Arkeia Server Backup
* arkeiad local/remote root exploit
* Targets for Redhat 7.2/8.0, Win2k SP2/SP3/SP4, WinXP SP1, Win 2003 EE
* Works up to current version 5.3.x
*
* ---
*
* Linux x86:
* ./arksink2
*
* Exports an xterm to the box of your choosing. Mak
Hi
It looks as though my hosting plans have fallen through, with the
result of this being that I have very little time to find a new home
for the list. Anyone capable of offering support should contact me
off-list ASAP, or I may have no choice but to take FD offline.
Cheers
- John
in the near future. Passwords should be changed from the
auto-generated ones at members' earliest convenience.
Cheers
- John
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
tallations running on web servers
that don't strip extraneous slashes from URLs, such as Apache 1.3.x.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CAN-2005-0202 to this mailman issue.
Cheers
- John
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
[Full-Disclosure] Mailing List Charter
John Cartwright <[EMAIL PROTECTED]> and Len Rose <[EMAIL PROTECTED]>
Introduction & Purpose
--
This document serves as a charter for the [Full-Disclosure] mailing
list hosted at lists.netsys.com.
The list was created
Greg Leclercq wrote:
The l7-filter isn't working.
What do you mean by 'not working' ?
What is pom?
P-o-m is Patch O Matic. It provides additionnal features by patching
netfilter.
I'm not sure I understand what you want.
Is 'signature-based firewall' an IPS (Intrusion Prevention System)
The l7-filter isn't working.
What is pom?
I was wondering are there any Budget/OpenSource signature-based firewall
around like the one Packeteer has? (packetshaper)
If you want to make a linux-based solution, you can use Linux netfilter
+ l7-filter: http://l7-filter.sourceforge.net/. Check al
product (maybe somewhat more than
that but now a Firewall)
Regards,
Debasis Mohanty
www.hackingspirits.com
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of John
Sent: Saturday, January 22, 2005 11:31 AM
To: full-disclosure@lists.netsys.com
Subject: [
Hi
I was wondering are there any Budget/OpenSource signature-based firewall
around like the one Packeteer has? (packetshaper)
Thanks.
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
Is anyone aware of tools/techniques capable of
sniffing/intercepting Blackberry PIN to PIN messages?
Your input will be very much appreciated
Thank you
=
J. C. Costa
__
Post your free ad now! http://personals.yahoo.ca
[Full-Disclosure] Mailing List Charter
John Cartwright <[EMAIL PROTECTED]> and Len Rose <[EMAIL PROTECTED]>
Introduction & Purpose
--
This document serves as a charter for the [Full-Disclosure] mailing
list hosted at lists.netsys.com.
The list was created
in the case of bounces to
posters' messages, please do inform us off-list so that we can
investigate.
Merry Christmas to all, btw :)
Cheers
- John
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
My question is this...
Are their GPO objects for firefox. I would love to deploy firefox, but being
able to control the configuration via Group Policy is a must.
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Scott Renna
Sent: Monday, December 13, 2004 1
m is still undergoing maintenance so Len
is uncontactable for the time being.
Cheers
- John
- Forwarded message from John Cartwright <[EMAIL PROTECTED]> -
Date: Sun, 12 Dec 2004 20:17:45 +
From: John Cartwright <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
Subject: Administrivia: Hardw
[Full-Disclosure] Mailing List Charter
John Cartwright <[EMAIL PROTECTED]> and Len Rose <[EMAIL PROTECTED]>
Introduction & Purpose
--
This document serves as a charter for the [Full-Disclosure] mailing
list hosted at lists.netsys.com.
The list was created
This message was sent to me off list.
JohnH
--- Begin Message ---
Re John,
Then you're obviously not a "Whitehat" :)
BUT, your point is taken, and I will not release any more half baked sploits
into the wild.
Cheers,
Muts
-Original Message-
From: John [mailto:[
The only point I see is, If you are going to do something you might as
well do it correctly or not do it at all. If you get popular in the
doing so, then so be it.
John
On Tue, 2004-11-30 at 14:06, muts wrote:
> Re Johnh,
>
> If I'm not mistaken, the point isn't to get a *w
-- Forwarded message --
From: [EMAIL PROTECTED] <[EMAIL PROTECTED]>
Date: Wed, 24 Nov 2004 21:08:16 -0800
Subject: Hi, It's Me !
To:
FROM THE DESK OF BARRISTER. Wisdom Joshua (ESQ).
Dear,
I am Wisdom Joshua Esq., a Senior Advocate of
Nigeria . I am the legal Representative
enter the law enforcement module. there are better ways to say a
thing. And hey u dnt have to be PRESSURISED ur health conditions
bother me. chill out
--
(FROM LINKS TO LINKS WE ARE ALL LINKED)
cheers.
morris
___
Full-Disclosure - We believe
Ooops.. i reframe my question. Is there a way to get the enable
password remotely . Brute force is not my option
(FROM LINKS TO LINKS WE ARE ALL LINKED)
cheers.
morris
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/
Is there a quick and decent way to obtain the previledge password of a
cisco router my version is as follows
cisco 3640 (R4700) processor
--
(FROM LINKS TO LINKS WE ARE ALL LINKED)
cheers.
morris
___
Full-Disclosure - We believe in it.
Charter
hey guys i am stuck here.
would someone help how can i use port scanning tools to use the
public anonymous proxy if some specific gui based windows tool exists
please suggest.
--
(FROM LINKS TO LINKS WE ARE ALL LINKED)
cheers.
morris
___
Full
I had a brief stint Primus Telecom in delhi ( www.primus-direct.com).
It has a flat network with absolutely no security. The routers as as
vulnerable to any known exploit and the same applies to a few web
servers they host. The basics such as patch management is never taken
care of.
This mail doesn
HAPPY BIRTHDAY TO ME. ANY E-GREETING FOR ME FELLAS
(FROM LINKS TO LINKS WE ARE ALL LINKED)
cheers.
morris
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
Hey Guys this is reallly getting on to ur egoes. loyality pays
royality at times.after all we all play with what pays. its high time
we realise most of the vendor certifications are over rated and dnt
guarantee the depth of knowledge. The HR people are a real piece of
morons all over if atall certi
Dear Joe,
So many out there use MS OS doesnt make it the best just as so many
people go to McDonalds doesnt mean they make the best food
--
(FROM LINKS TO LINKS WE ARE ALL LINKED)
cheers.
morris
___
Full-Disclosure - We believe in it.
Char
isclosure - We believe in it.
> Charter: http://lists.netsys.com/full-disclosure-charter.html
>
--
John Waller
[EMAIL PROTECTED]
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
Firefox avoids several fundamental design flaws of IE, in that:
-Firefox is not integrated into Windows, and thus closes holes
allowing access to the OS.
-Firefox does not support ActiveX JavaVM or VBScript, three Microsoft
proprietary technologies that are responsible for many security holes.
-
[Full-Disclosure] Mailing List Charter
John Cartwright <[EMAIL PROTECTED]> and Len Rose <[EMAIL PROTECTED]>
Introduction & Purpose
--
This document serves as a charter for the [Full-Disclosure] mailing
list hosted at lists.netsys.com.
The list was created
tatives.
Three, it bears no relevance to computer security. Granted it's about putting
excessive trust in computerised systems, but that's an issue that's way outside the
purpose of this list.
Thank you.
--
John Airey, BSc (Jt Hons), CNA, RHCE
Internet systems support officer, IT
s to it and responds again...
Cheers
- John
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
> -Original Message-
> From: Kyle Maxwell [mailto:[EMAIL PROTECTED]
> Sent: 25 October 2004 04:30
> To: Airey, John
> Cc: [EMAIL PROTECTED]
> Subject: Re: [Full-Disclosure] Possibly a stupid question RPC
> over HTTP
>
>[snip]
>
> You're talking abou
this stupidity in your next version of Windows.
It will annoy your users to begin with, but a number of time synch
issues will be solved in one fell swoop. All the three letter codes are
publicly available and understood by your end users.
--
John Airey, BSc (Jt Hons), CNA, RHCE
Internet system
> -Original Message-
> From: Kyle Maxwell [mailto:[EMAIL PROTECTED]
> Sent: 21 October 2004 17:57
> To: Airey, John
> Cc: [EMAIL PROTECTED]
> Subject: Re: [Full-Disclosure] Possibly a stupid question RPC
> over HTTP
>
>
> On Thu, 21 Oct 2004 13:21:10
x27;s IT
[EMAIL PROTECTED] wrote on 10/20/2004 08:24:59 PM:
> I just voted for John Kerry at a walk-in absentee ballot polling
> place in Honolulu County using an eSlate3000 (unit serial number
> A05A0B) made by Hart Intercivic: http://www.hartintercivic.com
>
> I was told
te force to break the SSL encryption. Two (and
it's entirely possible that the security services have this already) come up with a
mathematical way to factor large primes rapidly.
I cannot believe that no-one has pointed this out yet.
--
John Airey, BSc (Jt Hons), CNA, RHCE
Internet systems suppor
[Full-Disclosure] Mailing List Charter
John Cartwright <[EMAIL PROTECTED]> and Len Rose <[EMAIL PROTECTED]>
Introduction & Purpose
--
This document serves as a charter for the [Full-Disclosure] mailing
list hosted at lists.netsys.com.
The list was created
Cute idea, but basically illegal...it's a DDOS just the clients are
compromised via social engineering not some nifty leet hack.
John
On Thu, Sep 23, 2004 at 03:10:55PM -0400, The Devilous Angel wrote:
> Greetings list!
>
> I've just hit this url and i think it's a p
r.html
- --
The Internet must be a medium for it is neither Rare nor Well done!
mailto:[EMAIL PROTECTED]">John Galt
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.5 (GNU/Linux)
Comment: Made with pgp4pine 1.76
iD8DBQFBT7J2+TX+nYGFQPs
a medium for it is neither Rare nor Well done!
mailto:[EMAIL PROTECTED]">John Galt
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.5 (GNU/Linux)
Comment: Made with pgp4pine 1.76
iD8DBQFBT6LU+TX+nYGFQPsRAuX+AJ42LAHVMaPbVYzEw8wHWvCJMRt94gCgkpo4
6x2WRw2ZfiSRJ6P/4FyMISk=
=iGh5
troopers versus Redshirts to the death.
Who is John Galt? [EMAIL PROTECTED], that's who!
On Fri, Sep 10, 2004 at 05:19:41PM +0200, Doc Nielsen wrote:
> On Fri, 10 Sep 2004 14:12:28 +0200, Fredrik Leijon <[EMAIL PROTECTED]> wrote:
> > Alt J wrote:
> > >I have a few gmail invites.
> > >Please reply off list if you're interested.
> ditto ... got 4 invitez and no friends :D damn i am a bas
[Full-Disclosure] Mailing List Charter
John Cartwright <[EMAIL PROTECTED]> and Len Rose <[EMAIL PROTECTED]>
Introduction & Purpose
--
This document serves as a charter for the [Full-Disclosure] mailing
list hosted at lists.netsys.com.
The list was created
p files to everyone
on my distribution list.
If anyone knows of any others, I'd appreciate the info.
-John
> -Original Message-
> From: Scenobro [mailto:[EMAIL PROTECTED]
> Sent: Thursday, September 02, 2004 9:00 PM
> To: [EMAIL PROTECTED]
> Subject: [Full-Disclosure] W
p://housecall.trendmicro.com/housecall/start_corp.asp
Regards,
John
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
s versus Redshirts to the death.
Who is John Galt? [EMAIL PROTECTED], that's who!
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
uot;
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="1.gif"
NDU0NTEyMTI=
--fthllkqoljuvkhyckltf--
----
--
John Nagro
[EMAIL PROTECTED]
___
F
files against
unauthorized changes, there are additional integrity checks and other
protection mechanisms implemented for all policy configuration
files. Should any policy configuration files fail integrity
checks, the firewall will fail closed.
Again, no issue.
- --
John LaCour
Security Services
se, the devil is always
in the details.
I hope you have your tinfoil hat firmly mounted and calibrated.
Thanks for the links though. It's fun to see a poorly conceived
government fantasy get crucified in the press.
JMH
Gary E. Miller wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Y
thers from using the same methodology to shield their malware?
RGDS
GARY
- ---
Gary E. Miller Rellim 20340 Empire Blvd, Suite E-3, Bend, OR 97701
[EMAIL PROTECTED] Tel:+1(541)382-8588 Fax: +1(541)382-8676
--
John Hall
ren't enough, since even
updating hourly still leave 59 minutes of vulnerability. The speed at which
viruses are now spreading means that organisations have to have automated
patching too. Of course, whatever you do each working day is more and more
like russian roulette (except there appears to be only
GARY
- ---
Gary E. Miller Rellim 20340 Empire Blvd, Suite E-3, Bend, OR 97701
[EMAIL PROTECTED] Tel:+1(541)382-8588 Fax: +1(541)382-8676
--
John Hall Test Manager - Switch Team F5 Networks
[Full-Disclosure] Mailing List Charter
John Cartwright <[EMAIL PROTECTED]> and Len Rose <[EMAIL PROTECTED]>
Introduction & Purpose
--
This document serves as a charter for the [Full-Disclosure] mailing
list hosted at lists.netsys.com.
The list was created
I thought this list was originally meant to focus primarily on "computer
hardware/software" types of security issues. Malware, discovered exploitables, etc.
>>> Barry Fitzgerald <[EMAIL PROTECTED]> 08/06/04 03:05PM >>>
Paul Schmehl wrote:
> No, it's not excellent. There are tons of places on t
mers, right?
If I happen to have a /8 I might receive 5592405 Probe packets a second per
3-DNS group. I would call that significant.
No. The total probe packet generation capacity of a 3-DNS group is limited.
Nils
JMH
--
John Hall Test Manag
y
serve.
JMH
Gary E. Miller wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Yo John!
On Wed, 4 Aug 2004, John Hall wrote:
Just about any response is useful for RTT/reachability measurement as long
as we can associate it back to the correct probe.
My name servers a
topic. E-Mail me off list if you want to
discuss that topic further.
Regards,
Mark
--
John Hall Test Manager - Switch Team F5 Networks, Inc.
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
ou may still want to see these alerts anyway, since those 3-DNS probes
could come from a BIG-IP which is also configured to NAT traffic for an
entire network behind it. You wouldn't be able to distinguish the 3-DNS
probes from the probes of a machine behind the BIG-IP.
Thought anyone? (If anyone is
Ron DuFresne wrote:
Still following here...
adding oneself to the list John mentioned might be the eaisier tack in
this situation, and make it so one is not hit by new implimentations, as
long as BIG-IP sites are not able to configure themselves out of the
do-not-probe listing as well;
3-DNS does
it.
> Charter: http://lists.netsys.com/full-disclosure-charter.html
>
- --
Customer: "I'm running Windows '98" Tech: "Yes." Customer:
"My computer isn't working now." Tech: "Yes, you said that."
Who is John Galt? [
Responses in-line...
Frank Knobbe wrote:
Hello John,
glad to see you guys are keeping up with all the current stuff going on
in lists ;)
I had sent a dump earlier. It is attached again below. The TCP SYN
packets do indeed start with IPID 1 and move up to 3. However, these all
come from the same IP
some sort of probe to see if a host that contacted them before is
still alive.
Paul Schmehl ([EMAIL PROTECTED])
Adjunct Information Security Officer
The University of Texas at Dallas
AVIEN Founding Member
http://www.utdallas.edu/ir/security/
--
John Hall
what...8 times IIRC? So, in theory, one "format C:" can be undone. ;)
John
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
9 is no longer supported by Red Hat. Try www.fedoralegacy.org for
updates now. However, this site depends on people making and testing the
updates for them, so don't hold your breath.
--
John Airey, BSc (Jt Hons), CNA, RHCE
Internet systems support officer, ITCSD, Royal National Institute of
Due to the lag time in posts appearing to the list,
this may have already been mentioned, and if so, I
apologize. Also, if you could care less what this
report has to say, I apologize as well.
Dept of Homeland Security has released an audit of
security within the dept. In his report 'Progress and
This is no hoax!
I hate hoax warnings, but this one is important.
If a man comes to your front door and says he is
conducting a survey and
asks you to show him your ass, DO NOT show him your
ass. This is a scam; he
only wants to see your ass.
I wish I'd gotten this yesterday. I feel so s
I disagree.
Initially, the image used in that popup actually comes
from a different server, but that's trivial. What I
see as a bigger issue is that blocking the image from
the server leaves the user with an empty div block
covering the page, and blocking the site serving the
div content could es
James,
That's a natural workaround to allow the site to
continue to generate impressions of popups they sell.
This tag allows a 'chromeless window' to appear
at z-index 3, floating above the normal browser
window. As this image is a capture from a winXP box
with default color scheme, this trick
Not to return to the original post or anything, but
was anyone able to identify the registry keys that
will sucessfully modify the user-agent string?
There seem to be many keys other than
HKLM>software>MS>windows>current_version>internet_settings
And the key at
HKLM>software>MS>windows>current_ve
In one sense I agree this would protect you from any virus, considering that /bin is
in the path environment variable, and that the system startup scripts use it. Without
making changes to all those, you wouldn't have much of a system. Without /bin in the
path, a lot of stuff is gonna break.
nyway. Anyone
who trusts critical infrastructure to it needs to be sacked. How ironic it
is though that many cash machines in the UK are Windows terminals.
If it were so easy to fix these problems then most of us who are employed
and reading this list would be out of work. It isn't easy, and a
[Full-Disclosure] Mailing List Charter
John Cartwright <[EMAIL PROTECTED]> and Len Rose <[EMAIL PROTECTED]>
Introduction & Purpose
--
This document serves as a charter for the [Full-Disclosure] mailing
list hosted at lists.netsys.com.
The list was created
On Sat, 03 Jul 2004 22:33:15 -0700, Syke <[EMAIL PROTECTED]> wrote:
>
>
> Thomas Ryan wrote:
>
> >The lack of professionalism from Team Bugtraq Security is getting to be
> >annoying, openly showing their ignorance with defamatory remarks towards
> >Drew Copley and eEye. It's quite obvious you do
great news..now share the wealth
On Sat, 3 Jul 2004 10:25:57 -0500, RandallM <[EMAIL PROTECTED]> wrote:
> After a number of years, much thought,and long nights I have developed a
> systematic method to prevent and thwart exploits on my system!
>
> NEVER REBOOT!
>
> I have been up and running fo
It is OK, but it causes security alert on some
machines because of "unsafe component". It isn't good
for us. But it is interesting that only on some
machines, this security alert prompted, on most winXP,
cmd.exe will run without any prompt.
What is your idea?
--- Jelmer <[EMAIL PROTECTED]> wrote:
Thu, 1 Jul 2004 22:35:17 -0700
>
> Yeah, yeah, maybe so, but he's not a pussy who hides his identity
> behind his forged email address.
As the alleged father of a newborn daughter, I sincerly hope you'll
have learned to abandon such adolescent derogatories as "pussy" be
changing votes would be
relatively easy. For those reasons I would be opposed to electronic ballot
machines whoever makes them.
I think though that this is way off-topic now, so I'll quit while I'm ahead.
--
John Airey, BSc (Jt Hons), CNA, RHCE
Internet systems support officer, ITCSD, Ro
but has lots of subtle differences that will byte you when
> you least expect
> it.
>
Can you name one? I find it a pain the other way round, like not being able
to "write mem" when in configuration.
--
John Airey, BSc (Jt Hons), CNA, RHCE
Internet systems support officer, ITCSD
for a dll, exe, or registry entry, you'll need to configure Nessus with a
domain, account, and passwd.
John Lampe
jwlampe -at- nessus.org
http://f00dikator.aceryder.com/
"Truth is one, but error proliferates. Man tracks it down and cuts it up
into little pieces hoping to turn it into grains
for you like always allow DNS traffic through, even if you have no
> port 53 rule and a deny all policy. How helpful!
Sounds like somebody needs to learn how to run FW-1. There's several
"implied" rules which are set from Global Properties, and are only
displayed/logged if
ltiple companies for MSPs) with FW-1 and P-1 than anything I've
seen from Cisco.
Personally I was scarred by some bugs in various 5.x versions of PIX
software.
(oh and to echo the point of another person, PLEASE, for the love of
(insert 1+ diety) do not run a firewa
DoS in popclient 3.0b6
--
Release Date: 29th June 2004
Discovery: Dean White <[EMAIL PROTECTED]>
Research: John Cartwright <[EMAIL PROTECTED]>
Overview
"popclient is a Post Office Protocol compliant mail retrieval client
which supports both POP2
these testing,
but I don't have any IDEA about that.
Regards.
Mr. John
--
"[EMAIL PROTECTED]" <[EMAIL PROTECTED]> wrote:
There are several ways to search for vulnerabilities
in applications.
If you have the sourcecode, you can d
, ... for this purpose, for finding a
vulnerability in a software?
Thanks
John
__
Do you Yahoo!?
New and Improved Yahoo! Mail - Send 10MB messages!
http://promotions.yahoo.com/new_mail
___
Full-Disclosure
. Can't anyone resist posting to this thread?
Oh, WTF.
OK, me too..
Happy now?
- John
--
10 print "Home"
20 print "Sweet"
30 goto 10
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
[Full-Disclosure] Mailing List Charter
John Cartwright <[EMAIL PROTECTED]> and Len Rose <[EMAIL PROTECTED]>
Introduction & Purpose
--
This document serves as a charter for the [Full-Disclosure] mailing
list hosted at lists.netsys.com.
The list was created
derek holzer
>
> ___
> Full-Disclosure - We believe in it.
> Charter: http://lists.netsys.com/full-disclosure-charter.html
>
- --
The Internet must be a medium for it is neither Rare nor Well done!
mailto:[EMAIL PROTECTED]">John Galt
-BEGIN PGP SIGNAT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On Tue, 18 May 2004 [EMAIL PROTECTED] wrote:
> well, i just donated $10 USD long live the criminals
May Roger Ebert spit on you for eternity...
(google for Boulder Pledge)
> - Original Message -
> From: "John Galt" <[
ut
only 4 muscles to work the trigger of a good sniper rifle.
Who is John galt? [EMAIL PROTECTED], that's who!
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.4 (GNU/Linux)
Comment: Made with pgp4pine 1.76
iD8DBQFAqZWF+TX+nYGFQPsRAu9UAJ9NKSY5NE8cT0dGaDiO0ji2LF4DQACfT4Zn
Cq4DBsCfyI+P2d5gTO
whois registrations for both sites seem to be the same.
The ip addresses of both servers are 66.28.205.19 and .22
respectively.
I'm inclined to think that it's legit and they've
simply taken steps to stop what you believe is
happening.
> -Original Message-
> From: Nico Golde [mailto:[EMA
..
>
> he is correct when he says that Microsoft will say it's
> completely the
> worm writer's fault. BUT i think Microsoft should be punished too for
> having so many security holes. they had to patch it faster.
>
Why not punish all the admins/users who failed to patch their systems in
time
Unfortunately in a controlled environment it's not always possible to avoid
MUA's. Novell's announcement is good news in any event.
However, if you do use outlook HTML mail can be disabled via a registry key.
Create
HKEY_CURRENT_USER\Software\Microsoft\Office\10.0\Outlook\Options\Mail\ReadAs
Pl
[Full-Disclosure] Mailing List Charter
John Cartwright <[EMAIL PROTECTED]> and Len Rose <[EMAIL PROTECTED]>
Introduction & Purpose
--
This document serves as a charter for the [Full-Disclosure] mailing
list hosted at lists.netsys.com.
The list was created
accounts for 90% of the
email addresses in my procmail Luz3rz_L1zt rule (now at +30 and
counting).
It's gotten to the point that I don't even read this list that often
any more for having to wade through all the crap.
Of course, the down side is that when I try to catch up, the crap is
j
much to fear from such rot, and careful consideration of your
responses leads me to agree with your philosophy on the matter.
p.s. I would have included the complete headers had I not already sent
them the way of /dev/null. My mistake.
Regards,
--
John Lalla
Santa Barbara, CA
1 - 100 of 354 matches
Mail list logo