On Sat, 8 May 2004 18:00:57 -0500 RandallM [EMAIL PROTECTED] wrote:
Any programs out there that watches changes to registry and can give an
alert?
Registry Prot and Autostart Viewer from DiamondCS Freeware
http://www.diamondcs.com.au/index.php?page=products
RegRun 3 Security Suite
Aditya, ALD [Aditya Lalit Deshmukh] wrote:
the common installation inserts and all programs have values that must be
inserted. If a watcher would have a data base to follow and any odd or
uncommon entries could be flagged. As far as I know all newly found viruses
insert registry entries and these
Greetings,
Personally if you are running with least privilege then simply make the
registry read-only ACL's can be applied to the registry too you know. I've
worked with a couple of companies where we have made everything but the
necessary HKCU keys read-only. This stops rogue installs and even
There exists a remotely exploitable heap overflow in Icecast 2.0.0.
The bug exists in the handling of base64 Authorization request.
This bug was found in about 40 seconds during a HTTP audit of the web
component of Icecast with the fuzzer SMUDGE
(http://felinemenace.org/~nd/SMUDGE/)
People
Microsoft Reward Program Helps Lead to Information Resulting in Arrest
Related to Sasser Internet Worm
http://www.microsoft.com/presspass/press/2004/may04/05-08SasserTelePR.asp
- Original Message -
From: Aditya, ALD [Aditya Lalit Deshmukh]
[EMAIL PROTECTED]
To: Poof [EMAIL
-2 doublepost
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Geoff Shively
Sent: zaterdag 8 mei 2004 20:28
To: Feher Tamas; [EMAIL PROTECTED]
Subject: RE: [Full-Disclosure] Victory day - Sasser surrenders
HANOVER, Germany (Reuters) - A tip from
[Full-Disclosure] Mailing List Charter
John Cartwright [EMAIL PROTECTED] and Len Rose [EMAIL PROTECTED]
Introduction Purpose
--
This document serves as a charter for the [Full-Disclosure] mailing
list hosted at lists.netsys.com.
The list was created on 9th July 2002 by
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200405-01
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - -
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200405-02
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
RandallM [EMAIL PROTECTED] writes:
Hi,
Any programs out there that watches changes to registry and can give an
alert?
RegMon from sysinternals.com. There are a whole load of useful Windows
tools at that site.
cheers,
Jamie
--
James Riden / [EMAIL PROTECTED] / Systems Security Engineer
Fellows
Looking for tools that measure security policy in an organizations
The only one I know is symentec enterprise security manager (ESM)
Any others??
Thanks in advance!!
-n
___
Full-Disclosure - We believe in it.
Charter:
Here's an oldie for a simple buffer overflow vuln.
Read more here: http://www.securityfocus.com/bid/9099/discussion/
If I've been correctly informed, the public exploit out there
only DoSes (I haven't tested it, so I really can't say). Anyway,
this one's an over-hacked reverse shellcode
/*
PaX w/ CONFIG_PAX_RANDMMAP for Linux 2.6.x DoS proof-of-concept
by Shadowinteger [EMAIL PROTECTED]
2004-05-04
Written after reading the security advisory posted by borg (ChrisR-) on
Bugtraq 2004-05-03 (my time). ChrisR - www.cr-secure.net
Acknowledgments: sabu (www.sabu.net)
Sunday, May 09, 2004
Outlook 2003 the premier mail client from the company
called 'Microsoft' certainly appears to have a lot of security
features built into it. Curosry examination shows excellent
thought into 'spam' containment, 'security' consideration and
many other little 'things'.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Cycom AB Security Advisory CSA-200402-1
www.cycom.se
Advisory: Previous Open Webmail vulnerability is exploitable
Date: Sat Feb 21 15:18:21 CET 2004,
updated: Thu May 6
If you had been subscribed to our iAlert services, you would have known
about this specific hacker threat months in advance, and known that only
the binary releases of KDE are safe to use.
As an agent of an commercial intelligence agency, I cannot stress how
important it is for all commercial
Guys,
Looking for a intrusion prevention system for personal use on my win xp box
Thanks in advance
-Kartik
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
Aloha, Richard.
I'm comfortable with I told you so. and have used it at times myself.
There may be something wrong with I could have told you so, if you had
paid me.
Secrets for dollars will always exist, but shouldn't we just do it and
shut up about it rather than try to make it seem like a
Please note that this is yet another troll:
Received: from securityfocus.bugtraq.org ([199.173.12.66])
by netsys.com (8.11.6p2-2003-09-16/8.11.6) with SMTP id i4A0od422402
for [EMAIL PROTECTED]; Sun, 9 May 2004 20:50:46 -0400
(EDT)
A hint: email from iDEFENSE employees typically comes from
You're kidding there, right?
no the person who made the statement below actually oversaw all the details of the
transfer!
.
~
And a few months ago, a large amount of money was transfered to his
account from a couple of popular antivirus vendors :)
I'd like to ask everyone who continues to post without
registering or posting from an unregistered addresses to
please register.
You are causing needless work for John and I and you
are introducing delays in your messages obviously since we
have to manually approve the message.
We are forced
21 matches
Mail list logo