does anyone remember the great german hax0r Kim Schmitz (alias
kimble)? ;-)
this n3td3v-story reminds me of it, although kimble acted a lot more
professional.
D-vice schrieb:
Fuck, I can't get enough of the lulz from this
On Thu, Aug 27, 2009 at 1:32 PM, Joey Kilmore jkilmo...@yahoo.de
n3td3v is neither black-, white-, purple- or anything -hat, just a troll.
i follow this list since 4 years and everything i read about n3td3v was
just a bunch of crap.
just like the kids in school that have no friends and keep bugging
others for their lost live.
so stop trolling with your
dont feed the troll ;)
Andrew Kuriger schrieb:
Dude really?
Nice signature: Be Yourself @ mail.com!
Choose From 200+ Email Addresses
Get a Free Account at www.mail.com!
Nobody cares. I just find it funny.
On Tue, 18 Aug 2009 14:43:15 -0500, someone lawyer some...@lawyer.com
wrote:
On Fri, Jul 11, 2008 at 5:58 PM, n3td3v [EMAIL PROTECTED] wrote:
I'm downplaying this vulnerability on purpose because I know its
overhyped
snip
You've generated so much traffic on this list about it that you've
actually hyped the issue up FOR them. Make sure you're collecting a
commission,
Free beer is the best kind of beer.
P.S. - Whoops, sorry for that double-port, Larry.
On Thu, Mar 27, 2008 at 9:36 PM, Larry Seltzer [EMAIL PROTECTED] wrote:
Moving beyond the old partisan politics, a cause we can all get behind.
Larry Seltzer
eWEEK.com Security Center Editor
That single UDP datagram is definitely faster. Compare the Code Red
worm to Sapphire (SQL Slammer), for instance:
Previous scanning worms, such as Code Red, spread via many threads,
each invoking connect() to probe random addresses. Thus each thread's
scanning rate was limited by network latency,
No, but if you're querying the services for data you do.
On 3/5/08, Dmitry [EMAIL PROTECTED] wrote:
dude, you don't need the entire handshake for tcp scanning.
___
Full-Disclosure - We believe in it.
Charter:
Application:The Everything Development System
Version(s): = Pre-1.0 (current version at time of release)
Author: sub [EMAIL PROTECTED]
Released: 2/1/2008
There exists a vulnerability in The Everything Development Engine that
allows a user to inject their own SQL to modify
Sub_level mass-defacing! (by miseo and DEREK_X)
put www. before:
ACESCRITORES.COM.
ACESCRITORES.NET.
ACESCRITORES.ORG.
AMIGOSMUSEOPRADO.ORG.
APPICE.NET.
APPICE.ORG.
COMAETILICO.COM.
CYRTEK.COM.
DIGITALLOFTSTUDIO.COM.