On Wed, 4 Aug 2004, Andrew Farmer wrote:
Furthermore, mtrr_read doesn't seem to exist anywhere in the Linux
kernel, at least not by that name. The function in question would
probably exist in linux/arch/i386/kernel/cpu/mtrr/if.c, but there's
nothing of the sort in there. Heck, the kernel code
When I couldn't find a decent file wiping utility on my own
machine, I decided to write one. Yes, I did search the net
and came up with a few... but they seem to be poorly written
and overly complicated. So, in just 64 lines, I wrote one
that would be useful for me, that would work well, and
Exibar wrote:
Of course there are Feds at DefCon how else would we be able to play
Spot the Fed without the Feds? :-)
Well, given the horrific false-positive rate at previous events, I
doubt Defcon would need any actual feds to have a successful game of
Spot the Feds...
Regards,
GreyMagic Security Advisory GM#008-OP
=
By GreyMagic Software, 05 Aug 2004.
Available in HTML format at
http://www.greymagic.com/security/advisories/gm008-op/.
Topic: Location, Location, Location.
Discovery date: 19 Jul 2004.
Affected applications:
On Thu, 5 Aug 2004, M. Mohr wrote:
When I couldn't find a decent file wiping utility on my own
machine, I decided to write one. Yes, I did search the net
and came up with a few... but they seem to be poorly written
and overly complicated. So, in just 64 lines, I wrote one
that would be
Surely if the user is entering a passphrase then the same problem exists -
that of effectively eavesdropping that communication from the keyboard?
Ignoring the initial expense for a moment, wouldn't it have made a lot of
sense to include the keypad actually on the cards? Obviously, card
Toomas Soome wrote:
Lionel Ferette wrote:
Note that this is true for almost all card readers on the market, not
only for Datakey's. Having worked for companies using crypto smart
cards, I have conducted a few risk analysis about that. The
conclusion has always been that if the PIN must be
http://www.kaspersky.com/news?id=151142122
PDAs under attack
Kaspersky Labs has detected Backdoor.WinCE.Brador.a, the first
backdoor for PDAs running under PocketPC (based on Windows CE).
Brador is a classic Trojan backdoor program: it opens the infected
machine for remote administration.
In article
[EMAIL PROTECTED],
Forbes, Robert [EMAIL PROTECTED] wrote:
Really the Cadillac of IPS, it is designed for high load networks. We were
very impressed with it but it carries a hefty price tag for that
performance.
Tipping Point UnityOne Intrusion Prevention Systems (augh, -hate-
Thompson SpeedTouch Home ADSL Modem Predictable TCP ISN Generation
iDEFENSE Security Advisory 08.05.04
www.idefense.com/application/poi/display?id=120type=vulnerabilities
August 5, 2004
I. BACKGROUND
The Thompson (formerly Alcatel) SpeedTouch is an ADSL router for home
and business providing a
On 5 Aug 2004, at 01:07, M.. Mohr wrote:
When I couldn't find a decent file wiping utility on my own
machine, I decided to write one. Yes, I did search the net
and came up with a few... but they seem to be poorly written
and overly complicated.
shred(1)? It's in coreutils, for heavens' sake!
I'll
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Yo John!
On Thu, 5 Aug 2004, John Hall wrote:
Is this true for the servers that are doing the recursive lookups for
the clients on your networks?
Yes, for the clients. Much less so for the servers, but failover may
also cause the servers to
Is this true for the servers that are doing the recursive lookups
for
the clients on your networks? Seems somewhat risky, but it's true that
such setups would make RTT less useful. It's one of the problems with
making GLSB work well. Our experience with several large sites
indicates that the
Over the weekend I began writing an information paper on Microsoft
Security Bulletin MS04-025 and the three Internet Explorer issues it
addressed. The paper slowly went sideways and turned into a large rant
low on technical information but relevant about MS04-025, CERT, and other
random things
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200408-05
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Can anyone at Yahoo! with clues email me at
sqlsecatyahoo.com , so we can have this stupid DOS
bug fixed. I'm tired of emaling Yahoo! support and
Yahoo! security without getting a response. If i don't
get a response soon i won't spend one more second
trying to get this bug fixed and i will
We're starting to get way beyond answering the initial request and
into design decisions that are likely competitively useful, but I'll
try to answer what I can.
Nils Ketelsen wrote:
I do not know anyhting about 3-DNS apart from what I read in this thread, so
please excuse me if I get anything
I have encountered a few 802.11b public access points (I can't
remember the vendors, but they were for hotels) that seem to have
built-in ARP cache poisoning prevention. I found it nonetheless
impressive and am looking for solutions to implement it (presumably
with my own wireless card and hostap
18 matches
Mail list logo