> > YOUR VOTE DID NOT COUNT. And if you contend otherwise, PROVE IT.
>
> Let me challenge YOU. Prove that my vote did not count. Show me absolute,
> proof beyond a doubt that
> my vote did not count.
Depending on your state/county/whatever, your vote did count a LOT LESS
than other votes. It a
On Mon, Oct 20, 2003 at 03:28:02AM -0700, [EMAIL PROTECTED] wrote:
> There is absolutely no justification for the public disclosure
> of an exploit for this issue. It's been recognised as a security
On the other hand, a working exploit might convince some admins to
patch faster... Such is life.
_
On Sun, Aug 31, 2003 at 10:28:32AM -0400, Richard M. Smith wrote:
> first place. If three guys in Poland can find a buffer overflow in DCOM
> without access to Windows source code, why can't Microsoft?
And what about the flaws MS probably found during the code audit and that
were never published?
On Sat, Jul 19, 2003 at 05:25:09PM +0300, Georgi Guninski wrote:
> you'd better check your facts before spreading misinformation.
> vim developers and vendor-sec list were notified as it is written in my
> advisory. it was a long thread with all of them. the advisory quotes solar
Guninski is rig
On Sun, Apr 20, 2003 at 08:37:40AM -0500, Ed Carp wrote:
> > It's a little difficult to completely avoid US products in the
> > encryption field. And if your response is along the lines of "Open
> > Source, can't hide anything", I'll save time and summarize my rebuttal
> > now; DES, Differential C
On Sat, Apr 19, 2003 at 05:51:50PM -1000, Jason Coombs wrote:
> Those who participate in this endeavor are now exposing themselves to
> potential jail time rather than the more benign risk of time spent in court,
> in depositions, in meetings with attorneys, and then maybe in the poor house.
Wait