Here's a couple... - Do all communications with customers need to be written and spoken in 1337 speak so that they know how cool we are? - If our monitoring software finds really "interesting" things on the client's computer, can I download a copy? - Do we hold contests to see who gets the World's #1 Hacker title?
;-) On Thu, Jan 21, 2010 at 5:34 PM, xgermx <[email protected]> wrote: > "You have successfully completed your Hacker For Hire Application! > > You will be notified a day and also an hour before your appointment. This > information will also be emailed to you." > > Just setup an appointment to do some more recon. I'll report back any > interesting information. > > What questions should I ask? > > On Thu, Jan 21, 2010 at 4:19 PM, Robin Wood <[email protected]> wrote: > >> This implies that spyware is installed by hand by an attacker directly >> from their own machine. That would make for a very dedicated, and >> pretty rubbish, attacker! >> >> 2010/1/21 Jim Halfpenny <[email protected]>: >> > Wow, defence in depth now includes unauthorised surveillance! >> > >> > Jim >> > >> > 2010/1/21 Butturini, Russell <[email protected]> >> >> >> >> You know, I really hate for this guy to keep popping up on the list, >> but >> >> they just keep feeding us infosec comedy fodder: >> >> >> >> >> >> >> http://ligattsecurity.com/index.php?option=com_content&view=article&id=2261:lsi-offers-boobytrap-a-service-that-detects-who-installed-spyware-on-a-persons-computer&catid=434:ligatt-press-releases >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> >> Russell Butturini, MCSE, CCSP, CEH >> >> >> >> Business Technology | Information Security >> >> Healthways World Headquarters >> >> 701 Cool Springs Boulevard >> >> Franklin, TN 37067 >> >> P (615) 614-4005 | C (615) 972-6296 >> >> >> >> >> >> >> >> >> >> >> ****************************************************************************** >> >> This email contains confidential and proprietary information and is not >> to >> >> be used or disclosed to anyone other than the named recipient of this >> email, >> >> and is to be used only for the intended purpose of this communication. >> >> >> >> >> ****************************************************************************** >> >> >> >> _______________________________________________ >> >> Pauldotcom mailing list >> >> [email protected] >> >> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom >> >> Main Web Site: http://pauldotcom.com >> > >> > >> > _______________________________________________ >> > Pauldotcom mailing list >> > [email protected] >> > http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom >> > Main Web Site: http://pauldotcom.com >> > >> _______________________________________________ >> Pauldotcom mailing list >> [email protected] >> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom >> Main Web Site: http://pauldotcom.com >> > > > _______________________________________________ > Pauldotcom mailing list > [email protected] > http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom > Main Web Site: http://pauldotcom.com > -- irc: Tadaka Twitter: Jason_Wood jwnetworkconsulting.com
_______________________________________________ Pauldotcom mailing list [email protected] http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom Main Web Site: http://pauldotcom.com
