Mikael Abrahamsson wrote:
On Wed, 27 Jul 2005, Matthew Sullivan wrote:
John Palmer wrote:
FYI: The IP address of the mail server that sends out NANOG list
messages
(198.108.1.26) is once again on most of the major RBLs.
Was a mistake and was removed promptly as soon as we were
Anyone with clue at Wanadoo UK, or can put me in touch with someone, will do
at this point.
Specifically to do with their website hosting arrangements.
Not sure if anyone has seen this, or not...
Via CircleID:
[snip]
Mozilla Foundation has announced changes to Firefox concerning
Internationalized Domain Names (IDN) to deal with homograph spoofing attacks.
According to the organization, Mozilla Foundation products now only display
IDNs in
Via the EE Times:
[snip]
A Republican senator will unveil a rewrite of U.S. telecommunications laws on
Wednesday (July 27).
Sen. John Ensign, R-Nev., said he will introduce the Broadband Consumer Choice
Act of 2005 during a Capitol Hill press conference.
The bill will improve consumers
On 27/07/05, Fergie (Paul Ferguson) [EMAIL PROTECTED] wrote:
The bill will improve consumers' access to communication technology by
rewriting
outdated telecommunications laws, Ensign's office said in a statement. One
of the
bill's goals is to reduce government obstacles to technological
Following up from yesterday, Roy Mark writes this
in internetnews.com:
[snip]
Voice over IP providers have another 30 days to inform customers of possible
E911 emergency calling limitations -- or pull the plug on their service.
After Aug. 30, VoIP providers will have to cut off subscribers
On Wed, 27 Jul 2005, Suresh Ramasubramanian wrote:
The bill will improve consumers' access to communication technology by
rewriting
outdated telecommunications laws, Ensign's office said in a statement.
One of the
bill's goals is to reduce government obstacles to technological
On Wed, 27 Jul 2005, Todd Vierling wrote:
Another page from the man himself about it:
http://ensign.senate.gov/issleg/issues/record.cfm?id=240526
Excuse me, this was a general statement from two weeks ago, but it carries
more loaded statements about the upcoming bill's sponsor with regard to
On 27 Jul 2005, at 11:17, Fergie (Paul Ferguson) wrote:
After Aug. 30, VoIP providers will have to cut off subscribers who
refuse to acknowledge the warning, according to the ruling by the
Federal Communications Commission (FCC).
... because if there's an emergency, a handset which gives
For those who like to keep abreast of security issues, there are
interesting developments happening at BlackHat with regards to Cisco
IOS and its vulnerability to arbitrary code executions.
I apologize for the article itself being brief and lean on technical
details, but allow me to say
http://www.woodynet.net/Message%20No.%20419.mp3
-Bill
For those who like to keep abreast of security issues, there are
interesting developments happening at BlackHat with regards to Cisco
IOS and its vulnerability to arbitrary code executions.
I apologize for the article itself being brief and lean on technical
details, but allow
On Jul 27, 2005, at 1:26 PM, James Baldwin wrote:
http://blogs.washingtonpost.com/securityfix/2005/07/
mending_a_hole_.html
Further information:
http://www.crn.com/sections/breakingnews/breakingnews.jhtml?
articleId=166403096
For what ot's worth, this story is running in the
popular trade press:
Cisco nixes conference session on hacking IOS router code
http://www.networkworld.com/news/2005/072705-cisco-ios.html
- ferg
-- Hannigan, Martin [EMAIL PROTECTED] wrote:
For those who like to keep abreast of security
Damn he sure did cause a shit storm AGAIN..
from the crn article it looks like they might have him pinned on an
NDA violation.. (taking a shot in the dark)
quote below.
Cisco respects and encourages the work of independent research
scientists; however, we follow an industry established
On Jul 27, 2005, at 4:48 PM, J. Oquendo wrote:
On Wed, 27 Jul 2005, Dan Hollis wrote:
This is looking like a complete PR disaster for cisco. They would
have
been better off allowing the talk to take place, and actually
fixing the
holes rather than wasting money on a small army of
From: James Baldwin
This had _nothing_ to do with the source code that was
stolen. I have dealt with Lynn professionally on many
occasions and he has shown himself to have more than a fair
share of integrity. It is uncalled for to take to disparate
events and place them together in a
...and Wired News is running this story:
Cisco Security Hole a Whopper
Excerpt:
[snip]
A bug discovered in an operating system that runs the majority of the world's
computer networks would, if exploited, allow an attacker to bring down the
nation's critical infrastructure, a computer
..and of course:
Cisco Denies Router Vulnerability Claims
[snip]
Cisco Systems is downplaying a news story that suggests new security flaws may
have been discovered in some of its routers.
[snip]
http://www.varbusiness.com/components/weblogs/article.jhtml?articleId=166403151
So, until the
and talk about closing the barn door after the horse has escaped!??
Haven't they just turned those 15 pages scanned as a pdf and
distributed over a p2p file sharing system like bit torrent into
likely one of the the most sought after documents on the planet?
How long before they show
Cisco's response thus far:
http://www.cisco.com/en/US/about/security/intelligence/MySDN_CiscoIOS.html
Jeff
Since the talk was actually delivered - does anyone have a transcript or a
torrent for audio/video?
- Dan
On 7/27/05 8:10 PM, Jeff Kell [EMAIL PROTECTED] wrote:
Cisco's response thus far:
http://www.cisco.com/en/US/about/security/intelligence/MySDN_CiscoIOS.html
Jeff
I have been searching the net since this morning, for “The Holy
Grail: Cisco IOS Shellcode Remote Execution”, or variations of such.
This seems to be - at the moment - the most thought after torrent ...
Stef
Network Fortius, LLC
On Jul 27, 2005, at 8:13 PM, Daniel Golding wrote:
Since
..and of course:
Cisco Denies Router Vulnerability Claims
[snip]
Of course. That's how a broken vuln system works. :-)
The major flaw is that the vendor decides who gets to know
about a vulnerability. This causes an insecurity in the system
because $vendor is dealing with people
24 matches
Mail list logo