On Sep 11, 2014, at 2:41 PM, Bill Terwilliger wrote:
> Based on this paragraph, it seems that she is not worthy of passing her
> background check:
>
> “””
> Barr maintains that she had been truthful throughout both interviews, and
> that “there was no material fact about these organizations f
two comments:
1. i don't know if you noticed that petraeus and paula were sharing a password
for a
gmail account and leaving drafts for each other.
so no actual mail transmitted the network.
so far the only factoid that has not leaked out is the content of the harassing
mail
that made paula a
my understanding (i'm not a lawyer) is if the search was legal, the
particularity rule means
they could look anywhere the specific evidence could be found, and anything
they happen to find in
those places (or is visible in plain view) is admissible.
On Jun 24, 2011, at 7:48 AM,
wrote:
> Hmmm
On Jun 11, 2011, at 10:08 AM, Larry Seltzer wrote:
> I understand that the Spanish have some experience in getting suspects to
> confess. Their chief weapon is surprise, surprise and fear, their two
> chief weapons
and, perhaps, a fanatical devotion to the pope?
>
> LJS
> ___
On Apr 26, 2011, at 5:30 PM, Rob, grandpa of Ryan, Trevor, Devon & Hannah wrote:
> http://www.theregister.co.uk/2011/04/26/sony_playstation_network_security_brea
> ch/
>
> This couldn't have happened to a nicer company. Really. It just couldn't.
>
the interesting blurb from
http://blog.us.p
it's interesting that they're going through the trouble of reading
people's email enough so they
can add verisimilitude to an otherwise lackluster narrative.
i don't think these are bots.
the key questions they have to get over are why they can't be reached
by phone and why they can't
recei
I can't believe Young Ones isn't in your list. One of the best ever.
-Mark Coleman
Jon Kibler wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
>
> Gadi Evron wrote:
>
>> Mentioning Monty Python's Flying Circus seems too out of date even for
&g
black, but with a white power adaptor.
On Aug 29, 2008, at 11:15 AM, Big R wrote:
> http://www.vnunet.com/vnunet/news/2224938/steve-jobs-obituary-mistakenly
>
> --
> RandallMan
> --
> "Never tell anyone how smart you are. If you do, they will believe
> only so much of what you have to s
see that little thing in there starting with 41.*? it's called an ip
address and it is your friend.
whois says it's from starcomms dialup in lagos, despite someone's
excellent english.
sify is a freemail provider. the reply-to address isn't even at sify
it's at myway,
despite what he says
i hope western union and moneygram are next.
as far as i can tell, they're just facilitators for crime.
On Jul 21, 2008, at 5:25 PM, Paul Ferguson wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
>
> Via PC World.
>
> [snip]
>
> E-Gold, an Internet-based payment service, and three owners
a few data points on this.
as a frequent traveler:
i recently had to show id in spain and france (but not in the uk) to
buy a prepaid sim.
in japan you need a govt issue id card (so you need a local citizen to
buy you a prepaid phone).
and as an infosec guy:
the bad guys are also buying v
a few data points on this.
as a frequent traveler:
i recently had to show id in spain and france (but not in the uk) to
buy a prepaid sim.
in japan you need a govt issue id card (so you need a local citizen to
buy you a prepaid phone).
and as an infosec guy:
the bad guys are also buying v
not that farfetched even now:
i have a friend whose hearing aid had a cold solder joint that was
doing diode detection on a christian
AM radio station (in berkeley, even)...
On Mar 29, 2008, at 7:47 PM, Imri Goldberg wrote:
> This reminds me of that pace-maker exploit.
> If we take it a bit
i think i can answer this question.
they submit clicking on the link as an attempt to download porn and
say this in a probable cause
affidavit for search warrant.
they consider this as similar to an attempt (even one which fails) to
purchase CP using a credit card.
i worked on a case where so
i think everyone has to agree this is among the coolest possible
attacks...
On Feb 22, 2008, at 5:29 AM, Richard M. Smith wrote:
http://www.nytimes.com/pages/technology/index.html
A Method for Critical Data Theft
___
Fun and Misc security discussion
15 matches
Mail list logo