Neevr Seen Sexy Caroton Wehors

2004-08-13 Thread Software L. Obsessively
Allow me :) Please :) New Fucking Toons A friend who is near and dear may in time bmocee as useelss as a relative. Uuf widrelu-ega d,R

Do you wanna talk?

2004-08-13 Thread compressor Josue
Hey, my name is Lisa. I'm currently a freshman in college, and I think I'm going to be a psychology major, but who knows! I'm on the girls tennis team and I signed up to be photo editor for our campus newspaper. I'm single at the moment cause the right guy hasn't come along yet!! Hopefully

We should meet up sometime

2004-08-13 Thread falloff borden
Hey, my name is Lisa. I'm currently a freshman in college, and I think I'm going to be a psychology major, but who knows! I'm on the girls tennis team and I signed up to be photo editor for our campus newspaper. I'm single at the moment cause the right guy hasn't come along yet!! Hopefully

RE: First Time Big Srceen Dwnlooadable Video

2004-08-13 Thread Intersperse H. Bewaring
Darlin! :) Hot High Rseolution DVD movies New arts dtsreoy the odl.Mo o a u,p

Mala direta por e-mail - As melhores listas de email

2004-08-13 Thread Erica Silveira
Mala direta por e-mail. Cadastros selecionados. As melhores listas de e-mails selecionados por estados, atividades e profissões. Listas atualizadas para mala direta via e-mail marketing. Visite http://www.promonet.mx.gs Cadastros altamente selecionados para divulgação de produtos por email

2-Refinance as low as 2.9%

2004-08-13 Thread Danial Elkins
Hi Would you REFlNANCE if you knew you'd SAVE TH0USANDS? We'll get you lnterest as low as 2.90%. Don't believe me? Fill out our small online form and we'll show you how. Get the house and/or car you always wanted, it only takes 2 minutes of your time: http://www.infostead.biz

95-Refinance rates to 2.98%

2004-08-13 Thread Deanna A. Pratt
Hi Would you REFlNANCE if you knew you'd SAVE TH0USANDS? We'll get you lnterest as low as 2.99%. Don't believe me? Fill out our small online questionaire and we'll show you how. Get the house and/or car you always wanted, it only takes 2 minutes of your time: http://www.infostead.biz

Notification of U.S. Bank Internet Banking Unauthorized Account Access

2004-08-13 Thread service
Dear U.S. Bank customer, We recently reviewed your account, and suspect that your U.S. Bank Internet Banking account may have been accessed by an unauthorized third party. Protecting the security of your account and of the U.S. Bank network is our primary concern. Therefore, as a

Re: Forensics on PDAs, notes from the field

2004-08-13 Thread Thomas Shaddack
On Thu, 12 Aug 2004, Thomas Shaddack wrote: The NIST CDROM also doesn't seem to include source code amongst its sigs, so if you compile yourself, you may avoid their easy glance. A cool thing for this purpose could be a patch for gcc to produce unique code every time, perhaps using

Re: Forensics on PDAs, notes from the field

2004-08-13 Thread Morlock Elloi
A cool thing for this purpose could be a patch for gcc to produce unique code every time, perhaps using some of the polymorphic methods used by viruses. The purpose would be that they do not figure out that you are using some security program, so they don't suspect that noise in the file or

Re: Forensics on PDAs, notes from the field

2004-08-13 Thread Thomas Shaddack
On Fri, 13 Aug 2004, Morlock Elloi wrote: A cool thing for this purpose could be a patch for gcc to produce unique code every time, perhaps using some of the polymorphic methods used by viruses. The purpose would be that they do not figure out that you are using some security program,

Re: Forensics on PDAs, notes from the field

2004-08-13 Thread Sunder
On Fri, 13 Aug 2004, Morlock Elloi wrote: The purpose would be that they do not figure out that you are using some security program, so they don't suspect that noise in the file or look for stego, right? The last time I checked the total number of PDA programs ever offered to public in

Re: Forensics on PDAs, notes from the field

2004-08-13 Thread Thomas Shaddack
On Fri, 13 Aug 2004, Sunder wrote: If you're suspected of something really big, or you're middle eastern, then you need to worry about PDA forensics. Otherwise, you're just another geek with a case of megalomania thinking you're important enough for the FedZ to give a shit about you. In

Re: Cute Bitch Ejaculating

2004-08-13 Thread Pinkish T. Jettisoned
Hi tereh! Wet Girly gushing loads Psreesd into service means pesrsed out of shape. Kashilpewo nawa q,C

Re: Forensics on PDAs, notes from the field

2004-08-13 Thread Tyler Durden
Sunder wrote... And PGP won't stand out because ? Just wondering. Is it possible to disguise a PGP'd message as a more weakly encrypted message that then decrypts to something other than the true message? OK...perhaps we stego an encrypted message, then encrypt that photo using something

Re: Micorsfot SQL Sevrer 2000 Enterprzie Ediiton reacted

2004-08-13 Thread Jim Rudolph
tera peregrinationis eorum prae multitudine gregum habitavitque et habebunt capita aurea sed bases argenteas delendam universam carnem eritque arcus in nubibus

Joux found a collision for SHA-0 !

2004-08-13 Thread R. A. Hettinga
--- begin forwarded text Delivered-To: [EMAIL PROTECTED] From: Pascal Junod [EMAIL PROTECTED] Organization: EPFL - LASEC To: [EMAIL PROTECTED] Subject: Joux found a collision for SHA-0 ! Date: Fri, 13 Aug 2004 15:32:29 +0200 User-Agent: KMail/1.6.2 Sender: [EMAIL PROTECTED] Hi ! This has

personnel

2004-08-13 Thread Gil May
Adeline Buchanan,* ,mushy ,bergamot .: G ovenment don't want me to sell.* Under ground C D !Check Your spouse and staff,* Investigates anyone own cREDIT-HISTORY,} hacking someone P C !Get a new passport!! Dis appear in your city.# C D. You must have, http://mgcbmrn.holdtiff.com/amite/CD3/

yes, they look for stego, as a Hacker Tool

2004-08-13 Thread Major Variola (ret)
A cool thing for this purpose could be a patch for gcc to produce unique code every time, perhaps using some of the polymorphic methods used by viruses. The purpose would be that they do not figure out that you are using some security program, so they don't suspect that noise in the file or

Re: Forensics on PDAs, notes from the field

2004-08-13 Thread Major Variola (ret)
At 01:46 PM 8/13/04 -0400, John Kelsey wrote: From: Major Variola (ret) [EMAIL PROTECTED] Obvious lesson: Steganography tool authors, your programs should use the worm/HIV trick of changing their signatures with every invocation. Much harder for the forensic fedz to recognize your tools. (As

Re: Forensics on PDAs, notes from the field

2004-08-13 Thread Major Variola (ret)
On Fri, 13 Aug 2004, Thomas Shaddack wrote: In the world of industrial espionage and divorce lawyers, the FedZ aren't the only threat model. At 03:06 PM 8/13/04 -0400, Sunder wrote: Right, in which case GPG (or any other decent crypto system) is just fine, or you wouldn't be looking for

RE: Wet Lady wants to see you

2004-08-13 Thread Intrinsic M. Candling
Hi teerh! Real Lady cheating A posren is neevr happy till their vague strivings has itlsef marekd out its poeprr limitations. Hnoeah i,Q

Dripping 30 to 40 girls wants a date

2004-08-13 Thread Freeman M. Perpetrator
Of wohm do I have the hnoour? :) Beautiful MILF wants a date The habit of looking on the bset side of every event is wotrh more than a thousand pounds a years.Nanoshoot'en' la W,N

0FFICE XP $100; XP PR0 $5O; 0FFICE 2003 $8O. AD0BE PH0TOSH0P $8O, NORT0N 2004 $15 would was what

2004-08-13 Thread Lieselotte Nikia
Cheap softtwares for you, all are Original Genuine!Major titles from MICR0S0FT and AD0BE for Rock Bottom prriiceGreat Bargaain Sa1e! Variety discoount softtwares at wholesale chaeap pricing! Micros0ft Wind0ws XP PR0fessional - my price: $50 ; normal : $299.00 ; you saave $249.00 Ad0be

Re: yes, they look for stego, as a Hacker Tool

2004-08-13 Thread Thomas Shaddack
On Sat, 14 Aug 2004, Thomas Shaddack wrote: polymorphic or encrypted, but then they would be in the unknown category, along with user-created files. And programs :-) To be manually inspected by a forensic dude. Run a tool for signature changing preemptively, on *all* the files in

Bush backs banks' appeal of Calif's financial privacy law

2004-08-13 Thread R. A. Hettinga
http://www.kesq.com/global/story.asp?s=2163114ClientType=Printable KESQ NewsChannel 3 Palm Springs, CA: Bush backs banks' appeal of Calif's financial privacy law SACRAMENTO The Bush administration stepped into a lawsuit challenging California's landmark financial privacy law today. The

Re: yes, they look for stego, as a Hacker Tool

2004-08-13 Thread Major Variola (ret)
At 01:48 AM 8/14/04 +0200, Thomas Shaddack wrote: Then you have the forest where every tree is marked and the leprechaun is laughing. Love that story. But the self-watermarking you later mention is a problem. Even if you map a particular hash into one of a million known-benign values, which

Re: yes, they look for stego, as a Hacker Tool

2004-08-13 Thread Thomas Shaddack
On Fri, 13 Aug 2004, Major Variola (ret) wrote: Even if you map a particular hash into one of a million known-benign values, which takes work, there are multiple orthagonal hash algorithms included on the NIST CD. (Eg good luck finding values that collide in MD5 SHA-1 SHA-256

XP PR0 $5O; 0FFICE XP $100. NORT0N 2004 $15; 0FFICE 2003 $8O; AD0BE PH0TOSH0P $8O shut expect gentleman

2004-08-13 Thread Velva Thora
Cheap softtwares for you, all are Original Genuine!Major titles from MICR0S0FT and AD0BE for Rock Bottom prriiceGreat Bargaain Sa1e! Variety discoount softtwares at wholesale chaeap pricing! Micros0ft Wind0ws XP PR0fessional - my price: $50 ; normal : $299.00 ; you saave $249.00 Ad0be

Don't sit at home this evening . This is the place where youll find that person you want . . susan repairman

2004-08-13 Thread Mary Corcoran
Have a blast this evening "For less than the cost of gas youll be able to visit all of our lon e ly ladies. They're are ready and ready now. This this the top alternative dating site for 2004. We will never stop growing and always hope you will check out what an amazing serv ice we're

Surplus Machinery

2004-08-13 Thread Kevin Murphy
JUST PURCHASED !! These are some machine we just purchased. Many of them have not been moved yet. Call now for special prior to moving price.Call or EmailKevin Murphy for Specs and Photos. 513-771-2111,[EMAIL PROTECTED] COORDINATE MEASURING MACHINE ZEISS

Re: Cryptome on ABC Evening News?

2004-08-13 Thread Tyler Durden
To keep the nation secure the web site is not named. Google search appears to do it based on hate mail coming in. How 'bout posting those hate email addresses on Cryptome! (You might also recommend that they use an anonymous remailer next time!) -TD

Re: Cryptome on ABC Evening News?

2004-08-13 Thread R. A. Hettinga
At 12:49 AM +0200 8/13/04, Thomas Shaddack wrote: Can somebody record it in MPEG or DivX, please? :) It's difficult to get ABC News across the Atlantic without a dish. I didn't see anything. But, like an idiot, I surfed out of it. ADD's a bitch. :-). Anyone see the whole show? Cheers, RAH --

Cryptome on ABC Evening News?

2004-08-13 Thread R. A. Hettinga
There's a teaser for tonight's 6:30 news about a wesite that publishes pipeline maps and the names and addresses of government employees. The horror. :-) Cheers, RAH -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/

Re: Cryptome on ABC Evening News?

2004-08-13 Thread Thomas Shaddack
Can somebody record it in MPEG or DivX, please? :) It's difficult to get ABC News across the Atlantic without a dish. On Thu, 12 Aug 2004, R. A. Hettinga wrote: There's a teaser for tonight's 6:30 news about a wesite that publishes pipeline maps and the names and addresses of government

Re: Cryptome on ABC Evening News?

2004-08-13 Thread John Young
There a text version of the report on abcnews.com and a video is available to subscribers. To keep the nation secure the web site is not named. Google search appears to do it based on hate mail coming in.

RE: 2+2=5 and mention of cryptome

2004-08-13 Thread Tyler Durden
Nah. They wanted to cock-block Kerry and his high visibility as a result of the DNC. As for inconveniencing this New Yorker, it was barely worse than it usually is going down to Wall Street. The RNC will be another story altogether, however. -TD From: Sunder [EMAIL PROTECTED] To: [EMAIL

Re: Forensics on PDAs, notes from the field

2004-08-13 Thread Major Variola (ret)
Quoth Thomas Shaddack [EMAIL PROTECTED] Obvious lesson: Steganography tool authors, your programs should use the worm/HIV trick of changing their signatures with every invocation. Much harder for the forensic fedz to recognize your tools. (As suspicious, of course). It should be enough to

Too Much Information?

2004-08-13 Thread R. A. Hettinga
http://abcnews.go.com/sections/WNT/US/internet_sensitive_info_040812.html Too Much Information? Web Site Raises Questions About Public Access to Sensitive Government Info By JakeTapper ABCNEWS.com Aug. 12, 2004- John Young, a 69-year-old architect, was contacted a few weeks ago by Department

Re: Forensics on PDAs, notes from the field

2004-08-13 Thread Sunder
On Fri, 13 Aug 2004, Morlock Elloi wrote: The purpose would be that they do not figure out that you are using some security program, so they don't suspect that noise in the file or look for stego, right? The last time I checked the total number of PDA programs ever offered to public in

Re: Forensics on PDAs, notes from the field

2004-08-13 Thread Sunder
Right, in which case GPG (or any other decent crypto system) is just fine, or you wouldn't be looking for stego'ing it inside of binaries in the first place. --Kaos-Keraunos-Kybernetos--- + ^ + :Our enemies are innovative and resourceful, and so are

Re: Forensics on PDAs, notes from the field

2004-08-13 Thread Morlock Elloi
A cool thing for this purpose could be a patch for gcc to produce unique code every time, perhaps using some of the polymorphic methods used by viruses. The purpose would be that they do not figure out that you are using some security program, so they don't suspect that noise in the file or

Re: Forensics on PDAs, notes from the field

2004-08-13 Thread Thomas Shaddack
On Fri, 13 Aug 2004, Sunder wrote: If you're suspected of something really big, or you're middle eastern, then you need to worry about PDA forensics. Otherwise, you're just another geek with a case of megalomania thinking you're important enough for the FedZ to give a shit about you. In

Re: Forensics on PDAs, notes from the field

2004-08-13 Thread Thomas Shaddack
On Fri, 13 Aug 2004, Tyler Durden wrote: And it seems to me to be a difficult task getting ahold of enough photos that would be believably worth encrypting. Homemade porn?

Re: Forensics on PDAs, notes from the field

2004-08-13 Thread Tyler Durden
Sunder wrote... And PGP won't stand out because ? Just wondering. Is it possible to disguise a PGP'd message as a more weakly encrypted message that then decrypts to something other than the true message? OK...perhaps we stego an encrypted message, then encrypt that photo using something

Re: Forensics on PDAs, notes from the field (your teenage son's homemade porn)

2004-08-13 Thread Major Variola (ret)
At 10:07 PM 8/13/04 +0200, Thomas Shaddack wrote: On Fri, 13 Aug 2004, Tyler Durden wrote: And it seems to me to be a difficult task getting ahold of enough photos that would be believably worth encrypting. Homemade porn? Your 16 year old son's homemade porn. [google on Heidl rape; a deputy

Re: Forensics on PDAs, notes from the field

2004-08-13 Thread Major Variola (ret)
At 01:46 PM 8/13/04 -0400, John Kelsey wrote: From: Major Variola (ret) [EMAIL PROTECTED] Obvious lesson: Steganography tool authors, your programs should use the worm/HIV trick of changing their signatures with every invocation. Much harder for the forensic fedz to recognize your tools. (As

Re: Forensics on PDAs, notes from the field

2004-08-13 Thread Major Variola (ret)
On Fri, 13 Aug 2004, Thomas Shaddack wrote: In the world of industrial espionage and divorce lawyers, the FedZ aren't the only threat model. At 03:06 PM 8/13/04 -0400, Sunder wrote: Right, in which case GPG (or any other decent crypto system) is just fine, or you wouldn't be looking for

Re: Forensics on PDAs, notes from the field

2004-08-13 Thread Major Variola (ret)
At 02:11 PM 8/13/04 -0400, Sunder wrote: If you're suspected of something really big, or you're middle eastern, then you need to worry about PDA forensics. Otherwise, you're just another geek with a case of megalomania thinking you're important enough for the FedZ to give a shit about you.

Joux found a collision for SHA-0 !

2004-08-13 Thread R. A. Hettinga
--- begin forwarded text Delivered-To: [EMAIL PROTECTED] From: Pascal Junod [EMAIL PROTECTED] Organization: EPFL - LASEC To: [EMAIL PROTECTED] Subject: Joux found a collision for SHA-0 ! Date: Fri, 13 Aug 2004 15:32:29 +0200 User-Agent: KMail/1.6.2 Sender: [EMAIL PROTECTED] Hi ! This has

Re: yes, they look for stego, as a Hacker Tool

2004-08-13 Thread Thomas Shaddack
On Fri, 13 Aug 2004, Major Variola (ret) wrote: Any jpg which looks like noise will be of interest. And any stego program will make them look at your images (etc) more closely :-) Most of the programs they've hashed is so the forensic pigs can discount them. But they would find

yes, they look for stego, as a Hacker Tool

2004-08-13 Thread Major Variola (ret)
A cool thing for this purpose could be a patch for gcc to produce unique code every time, perhaps using some of the polymorphic methods used by viruses. The purpose would be that they do not figure out that you are using some security program, so they don't suspect that noise in the file or