You have got to be kidding me. Is that site for real? I mean he really
makes money off animal based cartoon characters doing porn? WTF has this
world come to.
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Matt Burnett
Sent: Tuesday, August 15, 2006
Have you paid attention to the internet for the past 15 years? People
pay plenty of money to watch people fuck real animals and insert
champagne bottles in to their orifices. Anyways i guess I have to
question why anybody pays for pron, of any type.
On Aug 15, 2006, at 1:04 AM, y0himba
Jain, Siddhartha wrote:
The phishing apart, how can a userid be spoofed on Yahoo Messenger? Is
this something trivial? I thought Yahoo fixed the issue with Y!Messenger
5.0.
If I have your Yahoo ID and password it is indeed trivial to spoof you.
Schanulleke
Dude VanWinkle wrote:
What? you can dish it but you cant take it?
No, I just filter. I suspect a lot fewer people will be reading your
e-mails, Dude.
--
Hawaiian Astronomical Society: http://www.hawastsoc.org
HAS Deepsky Atlas: http://www.hawastsoc.org/deepsky
you just can't grasp the idea of fd can you matt.
it is _so_ easy not to read these messages. what the fuck is your problem?
don't you remember the simpsons?
*just don't look, just don't look*
-- mic
___
Full-Disclosure - We believe in it.
Charter:
Jain, Siddhartha wrote:
The phishing apart, how can a userid be spoofed on Yahoo Messenger? Is
this something trivial? I thought Yahoo fixed the issue with Y!Messenger
5.0.
U -- unless I'm missing something here (and as I've already said
I'm NOT a YIM expert), in any system (like YIM)
On 8/15/06, Matt Burnett [EMAIL PROTECTED] wrote:
What the fuck is my problem? I had to dl ~1MB of shitty porn, which
prevents me from having 1.5 seconds more of decent high quality porn.
Thats my fucking problem.
Now the real question is what the fuck is your problem? If its so
easy to not
What the fuck is my problem? I had to dl ~1MB of shitty porn, which
prevents me from having 1.5 seconds more of decent high quality porn.
Thats my fucking problem.
Now the real question is what the fuck is your problem? If its so
easy to not read these messages they why the fuck do you
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- --
Debian Security Advisory DSA 1151-1[EMAIL PROTECTED]
http://www.debian.org/security/ Martin Schulze
August 15th, 2006
l4m3rs!!!
Matt Burnett wrote:
What the fuck is my problem? I had to dl ~1MB of shitty porn, which
prevents me from having 1.5 seconds more of decent high quality porn.
Thats my fucking problem.
Now the real question is what the fuck is your problem? If its so easy
to not read these messages
yeah,
if some one has ur friends id and password he can send you such
message then u will enter ur password and it goes to ur friends and
continue
-CF
-
http://www.secgeeks.com
-
On 8/15/06, Nick FitzGerald
This list is full of little punk ass kids who think they are blackhat l33t h4x0rs but are nothing but script kiddyz with no skillz. That is what the problem is with this list.
On 8/14/06, Time 4 [EMAIL PROTECTED] wrote:
LOL THIS IS PORN FOR BERNAL AND THE WHITEHATSBERNAL CANNOT STOP FULL
On 8/15/06, Peter Besenbruch [EMAIL PROTECTED] wrote:
Dude VanWinkle wrote: What? you can dish it but you cant take it?No, I just filter. I suspect a lot fewer people will be reading youre-mails, Dude.You do know I didnt send out the pr0n right?
Just trying to make light of the situation
I'm glad somebody said it. I'm fed up of the whole if you don't like
them, don't read them crap.
It is a security list, last week I got 1200 e-mails from FD. I think I
found around 90-100 that weren't spam/n3td3v/pr0n/assorted bullshit.
These people take the piss and generally fuck things up for
yeah, that's a good one.
first: spam a security list of some
disgusting and sick porno shit
second: pretend you did
not
third: pretend we believe
you
- Original Message -
From:
Dude
VanWinkle
To: Peter Besenbruch
Cc: full-disclosure
Sent: Tuesday,
Back in the old BBS days it was an old trick already.
Oh, it wasn´t me. My friend/cousing/dog/pel llama used my computer and
sent those lucky charm chain mails and all the get rich fast schemes,
please do not ban me from your BBS
On Tue, 15 Aug 2006 14:30:07 +0200
... [EMAIL PROTECTED] wrote:
full dis emergency exploits no porno acceptableemergency exploits only full disgovernment and business need full dis important reason-gs
Stay in the know. Pulse on the new Yahoo.com. Check it out.
___
Full-Disclosure - We believe in
On 8/15/06, ... [EMAIL PROTECTED] wrote:
yeah, that's a good one.
first: spam a security list of some disgusting and sick porno shit
Ok, what makes you think Bea Arthur is Porno?
second: pretend you did not
I sent out Pictures of Bea Arthur, not the Animal Porno you stupid idiot
On 8/15/06, cardoso [EMAIL PROTECTED] wrote:
Back in the old BBS days it was an old trick already.Oh, it wasn´t me. My friend/cousing/dog/pel llama used my computer andsent those lucky charm chain mails and all the get rich fast schemes,please do not ban me from your BBS
Damn you busted me, I am
Please learn English !
vodka hooch wrote:
full dis emergency exploits no porno acceptable
emergency exploits only full dis
government and business need full dis important reason
-gs
Stay in the know. Pulse on
What's truly impressive is that they know about your llama... I wonder
if you're under surveillance? ;)
Dude VanWinkle wrote:
On 8/15/06, *cardoso* [EMAIL PROTECTED]
mailto:[EMAIL PROTECTED] wrote:
Back in the old BBS days it was an old trick already.
Oh, it wasn´t me. My
hi,
i have gaim 1.5.0 installed.previously it was working fine but today
its crashing when it is getting the msn cookie on startup.
is anyone else is facing this problem?
--
ting ding ting ding ting ding
ting ding ting ding ding
i m crazy frog :)
oh yeah oh yeah...
another wannabe, in
Aaron Gray [EMAIL PROTECTED] wrote:Please learn English !sir full disbecome trolltraq no sense subjectmust stop pornoporno no good-gs
Do you Yahoo!?
Get on board. You're invited to try the new Yahoo! Mail Beta.___
I'd still argue... If the malicious code is a known variant and
recides in the computer exploiting the stated flaw, here are ppl.
argueing the AV will catch it during execution anyways. BUT there are
many scenerios when ADVANCE HERCULES SCAN, suspecious activity scans
etc are only (mostly)
Hi List,
I've been receiving this traffic for a while from the same IP address.
Does anyone have any idea what type of traffic this might be. Neither the
source IP or the target IP have any ports associated with them in this event.
Any ideas would be appreciated. I haven't looked into
On Monday 14 August 2006 09:23, Antoine SANTO wrote:
http://www.cs.ucl.ac.uk/staff/M.Handley/papers/fragmentation.pdf
Have seen it before but cannot make code work. Had no time to rewrite or make
it work. Anyone else?
Tõnu
___
Full-Disclosure - We
Adriel T. Desautels wrote:
Hi List,
I've been receiving this traffic for a while from the same IP address. Does
anyone \
have any idea what type of traffic this might be. Neither the source IP or the
target \
IP have any ports associated with them in this event. Any ideas would be
for an instance, I thought it wasa ping sweep varitionin occurance..snort logs s/have some more info .. were thesrc and dst IP'srandom or static.. ?
On 8/15/06, Richard Bejtlich [EMAIL PROTECTED] wrote:
Adriel T. Desautels wrote: Hi List, I've been receiving this traffic for a while from the same
Here's another separate issue that typically causes fault on memory access
to website-influenced memory access:
http://lcamtuf.coredump.cx/ffoxdie3.html
This is separate from the previously presented example (which, remarkably,
also had a tendency to trigger an unrelated call stack overflow due
Dude VanWinkle,
snip
-
Looks to me like they are using port 0.
http://www.grc.com/port_0.htm
-JP
*NEVER TRUST* Steve Gibson. I bet he smokes crack. See
http://attrition.org/errata/charlatan.html#gibson for more details.
Best regards,
Julio Cesar Fort
Recife, PE,
On 8/15/06, Julio Cesar Fort [EMAIL PROTECTED] wrote:
Dude VanWinkle,
snip
-
Looks to me like they are using port 0.
http://www.grc.com/port_0.htm
-JP
*NEVER TRUST* Steve Gibson. I bet he smokes crack. See
http://attrition.org/errata/charlatan.html#gibson for
Well,
There's something to the traffic that I am seeing. The payloads are
always changing and contain significantly different data. One of the
payloads was packed full of X'es, the other was packed full of |'s.
Check it out.
Event: ICMP Destination Unreachable Port Unreachable
Category:
Dude,
In case you've failed to notice, this is an ICMP port unreachable message. It's sent in response to a UDP packet destined for an unavailable UDP port. The port '0' referenced in the event source/destination is meaningless as ICMP doesn't use source and destination ports (it is always '0').
Darren,
I did notice what type of packet it was and I also know what the
packet signifies. The issue that I am having is that there has never
been any outbound UDP activity to the host that is replying to this
network. The payloads of the ICMP packets are a bit weird too,
containing either
Hi,
Today i tried to run the Gaim version 1.5.0 win32 port and it crashed
while getting the cookie after authentication , if there is any change
done with MSN protocol ?? because i tried it on two seperate machines
with two different versions of gaim and result was a crash.
I cannot remember the
Adriel,
I was replying to Dude VanWinkle, who's been chasing down the src/dst port 0 unnecessarily.
On 8/15/06, Adriel T. Desautels [EMAIL PROTECTED] wrote:
Darren, I did notice what type of packet it was and I also know what thepacket signifies. The issue that I am having is that there has never
Lazy Authorization Forcer
http://www.gnucitizen.org/projects/javascript-authorization-forcer/
This is an idea I am still developing but here you go POC is available
and it works. The malicious JavaScript presented here will try to
guess URLs that contain credentials. It is sort of Basic
common mistakeOn Aug 15, 2006, at 7:24 PM, Darren Bounds wrote:I'm confused about a couple things: 1) You say you knew the nature of the packet yet in your original message you stated "Neither the source IP or the target IP have any ports associated with them in this event. Any ideas would be
Darren, my apologies. ;]
Darren Bounds wrote:
Adriel,
I was replying to Dude VanWinkle, who's been chasing down the src/dst
port 0
unnecessarily.
On 8/15/06, Adriel T. Desautels [EMAIL PROTECTED] wrote:
Darren,
I did notice what type of packet it was and I also know what the
packet
Darren,
My responses are below:
Darren Bounds wrote:
I'm confused about a couple things:
1) You say you knew the nature of the packet yet in your original message
you stated Neither the source IP or the target IP have any ports
associated
with them in this event. Any ideas would be
starting to think that, there's an awful lot of traffic tho.
[EMAIL PROTECTED] wrote:
On Tue, 15 Aug 2006 18:53:09 EDT, Adriel T. Desautels said:
Darren,
I did notice what type of packet it was and I also know what the
packet signifies. The issue that I am having is that there has
On 8/15/06, Darren Bounds [EMAIL PROTECTED] wrote:
Adriel,
I was replying to Dude VanWinkle, who's been chasing down the src/dst port 0
unnecessarily.
Nah, I realized after the 4th post it was an ICMP packet and was just
curious about port 0
Only TCP/UDP have ports, I know that :-)
-JPone
On Tue, 15 Aug 2006 20:23:30 EDT, Adriel T. Desautels said:
starting to think that, there's an awful lot of traffic tho.
[EMAIL PROTECTED] wrote:
Backscatter reply to a spoofed packet source address?
You think *you* got a lot of traffic, think about the site that sent you the
ICMP - if
On Tue, 15 Aug 2006 18:53:09 EDT, Adriel T. Desautels said:
Darren,
I did notice what type of packet it was and I also know what the
packet signifies. The issue that I am having is that there has never
been any outbound UDP activity to the host that is replying to this
network.
Anti-Spam SMTP Proxy (ASSP) get?file Traversal Vulnerability
Release Date:
August 15, 2006
Notice:
This is a known flaw, and has been since the implementation of an
enhanced web interface for ASSP, since at least 2003. I do not
normally test for security vulnerabilities or address them
I've seen an identical issue, and I've tested it on a number of machines and Gaim versions. You aren't alone. Garth
On 8/16/06, naveed
[EMAIL PROTECTED] wrote:Hi,Today i tried to run the Gaim version 1.5.0
win32 port and it crashedwhile getting the cookie after authentication , if there is any
You really think this would be hard to design. Think about how most
spam solutions work, if you get 25 posts in hour with 100k
attachments from a new user, do you think they are talking about
security or are they posting porn. Anything a spam filter would
consider suspicous could be flaged
quoth the Matt Burnett:
You really think this would be hard to design. Think about how most
spam solutions work, if you get 25 posts in hour with 100k
attachments from a new user, do you think they are talking about
security or are they posting porn. Anything a spam filter would
consider
Matt Burnett wrote:
You really think this would be hard to design. Think about how most spam
solutions work, if you get 25 posts in hour with 100k attachments from a
new user, do you think they are talking about security or are they
posting porn. Anything a spam filter would consider
i discovered this first!
well, maybe. but the site where i talked about it is now gone :)
anyway, it really doesn't need to be so complicated with creating a
new 'style' section; just use the a:visited selector.
style
a { margin-left: 1px; }
a:visited { margin-left: 2px; }
/style
then check
50 matches
Mail list logo