Here's a couple...

- Do all communications with customers need to be written and spoken in 1337
speak so that they know how cool we are?
- If our monitoring software finds really "interesting" things on the
client's computer, can I download a copy?
- Do we hold contests to see who gets the World's #1 Hacker title?

;-)

On Thu, Jan 21, 2010 at 5:34 PM, xgermx <[email protected]> wrote:

> "You have successfully completed your Hacker For Hire Application!
>
> You will be notified a day and also an hour before your appointment. This
> information will also be emailed to you."
>
> Just setup an appointment to do some more recon. I'll report back any
> interesting information.
>
> What questions should I ask?
>
> On Thu, Jan 21, 2010 at 4:19 PM, Robin Wood <[email protected]> wrote:
>
>> This implies that spyware is installed by hand by an attacker directly
>> from their own machine. That would make for a very dedicated, and
>> pretty rubbish, attacker!
>>
>> 2010/1/21 Jim Halfpenny <[email protected]>:
>> > Wow, defence in depth now includes unauthorised surveillance!
>> >
>> > Jim
>> >
>> > 2010/1/21 Butturini, Russell <[email protected]>
>> >>
>> >> You know, I really hate for this guy to keep popping up on the list,
>> but
>> >> they just keep feeding us infosec comedy fodder:
>> >>
>> >>
>> >>
>> http://ligattsecurity.com/index.php?option=com_content&view=article&id=2261:lsi-offers-boobytrap-a-service-that-detects-who-installed-spyware-on-a-persons-computer&catid=434:ligatt-press-releases
>> >>
>> >>
>> >>
>> >>
>> >>
>> >>
>> >>
>> >> Russell Butturini, MCSE, CCSP, CEH
>> >>
>> >> Business Technology | Information Security
>> >> Healthways World Headquarters
>> >> 701 Cool Springs Boulevard
>> >> Franklin, TN 37067
>> >> P (615) 614-4005 | C (615) 972-6296
>> >>
>> >>
>> >>
>> >>
>> >>
>> ******************************************************************************
>> >> This email contains confidential and proprietary information and is not
>> to
>> >> be used or disclosed to anyone other than the named recipient of this
>> email,
>> >> and is to be used only for the intended purpose of this communication.
>> >>
>> >>
>> ******************************************************************************
>> >>
>> >> _______________________________________________
>> >> Pauldotcom mailing list
>> >> [email protected]
>> >> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
>> >> Main Web Site: http://pauldotcom.com
>> >
>> >
>> > _______________________________________________
>> > Pauldotcom mailing list
>> > [email protected]
>> > http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
>> > Main Web Site: http://pauldotcom.com
>> >
>> _______________________________________________
>> Pauldotcom mailing list
>> [email protected]
>> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
>> Main Web Site: http://pauldotcom.com
>>
>
>
> _______________________________________________
> Pauldotcom mailing list
> [email protected]
> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
> Main Web Site: http://pauldotcom.com
>



-- 

irc: Tadaka
Twitter:  Jason_Wood
jwnetworkconsulting.com
_______________________________________________
Pauldotcom mailing list
[email protected]
http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
Main Web Site: http://pauldotcom.com

Reply via email to