--On April 3, 2008 12:27:35 AM -0400 Mary Landesman <[EMAIL PROTECTED]>
wrote:
> Referring to oneself in the third person can be a symptom of identity
> confusion or identity alteration, a subset or trait of dissociation. In
> ancient times, it was referred to as demonic possession.
>
> Self-obje
Referring to oneself in the third person can be a symptom of identity
confusion or identity alteration, a subset or trait of dissociation. In
ancient times, it was referred to as demonic possession.
Self-objectification is also a trait of narcissism, perhaps because
narcissists love and feel empow
Am I the only one who is getting annoyed by n3td3v speaking in the
third-person like he's an entity, rather than a single person? I
suggest we all take a moment to psycho-analyze this, rather than
taking time out of our day to do our real jobs. ;)
On Wed, Apr 2, 2008 at 10:17 PM, <[EMAIL PROTECTE
On Wed, 02 Apr 2008 23:33:50 BST, n3td3v said:
> the big main mailing lists a day or so before. What happens is, folks who
> are good at security, and are subscribed to all the mailing lists, get an
> inbox flooded with duplicate security conference spam, and people aren't
> even interested.
You o
you are the one bragging about making a difference, all i see is you being
annoying. but i don't know ur full history on the mailing list, but from
what i see, its not very positive.
and am i annoying everyone? or just you. speaking about stopping the storm
worm and trying to stop the storm worm
lets look at it from a marketing point of view. not everyone is going
to be on the conference mailing list. more people are going to be on
security mailing lists. i understand your point of view, but it just
wont work. Use common sense.
On Wed, Apr 2, 2008 at 6:56 PM, n3td3v <[EMAIL PROTECTED]
Imagine if n3td3v post to *every* mailing list and not just *one*, would you
not get tired and frustrated?
Sorry mate, I already am.
Want to talk about SPAM? I have about 12 emails from YOU this morning, and
every single one of them is talking about how you're busy contributing to
this and that a
===
Ubuntu Security Notice USN-598-1 April 02, 2008
cupsys vulnerabilities
CVE-2008-0047, CVE-2008-0053, CVE-2008-0882, CVE-2008-1373
===
A security issue affects the follow
On Wed, Apr 2, 2008 at 11:46 PM, Ureleet <[EMAIL PROTECTED]> wrote:
> you like him because he posts ur articles.
>
> you can have him.
>
> stop trolling.
I'm the one at the forefront of security trying to make a difference,
and what are you? He supports me because of my cause to stop the Storm
W
On Wed, Apr 2, 2008 at 11:42 PM, Ureleet <[EMAIL PROTECTED]> wrote:
> "Full-Disclosure, I want action taken on the *growing* amount of
> security conference spam."
>
> u do know that just because you demand or want action taken that it
> doesn't mean that such will take place right?
>
> stop tr
you like him because he posts ur articles.
you can have him.
stop trolling.
On Wed, Apr 2, 2008 at 5:17 PM, n3td3v <[EMAIL PROTECTED]> wrote:
> On Wed, Apr 2, 2008 at 10:08 PM, Paul Schmehl <[EMAIL PROTECTED]> wrote:
> > --On Wednesday, April 02, 2008 21:26:03 +0100 n3td3v <[EMAIL PROTECTED]>
>
"Full-Disclosure, I want action taken on the *growing* amount of
security conference spam."
u do know that just because you demand or want action taken that it
doesn't mean that such will take place right?
stop trolling.
___
Full-Disclosure - We believ
I don't want people to get angry about this, this is actually a serious
issue that n3td3v has noticed, and those security guys who are subscribed to
more than one mailing list will understand. Full-Disclosure, I want action
taken on the *growing* amount of security conference spam. It used to be
ac
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200804-02
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
===
Ubuntu Security Notice USN-588-2 April 02, 2008
mysql-dfsg-5.0 regression
https://launchpad.net/bugs/209699
===
A security issue affects the following Ubuntu releases:
I'm noticing a disturbing trend of vulnerable versions of Flash (among
other runtimes) being distributed with lots of different software, and
the list now includes vendors such as Microsoft and -- Adobe.
Adobe AIR up through the last Windows beta bundled a known-vulnerable
version of Flash. I see
On Wed, Apr 2, 2008 at 10:08 PM, Paul Schmehl <[EMAIL PROTECTED]> wrote:
> --On Wednesday, April 02, 2008 21:26:03 +0100 n3td3v <[EMAIL PROTECTED]>
> wrote:
> >
>
> > No, it was sending signals to important people to take action to get
> > it further pushed up the ladder. In no way do I expect m
--On Wednesday, April 02, 2008 21:26:03 +0100 n3td3v <[EMAIL PROTECTED]>
wrote:
>
> No, it was sending signals to important people to take action to get
> it further pushed up the ladder. In no way do I expect my e-mail to be
> directly looked at by the white house. Through signal intelligence,
>
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2008:081
http://www.mandriva.com/security/
___
On Wed, Apr 2, 2008 at 12:41 PM, Jeff Stebelton
<[EMAIL PROTECTED]> wrote:
> you don't need to fill up
> people's inboxes with rants and rambling calls for action from the White
> House (that one split my side laughing). "In the Presidents Early Bird
> briefings today is yet another serious cyb
Or that this is off-topic, maybe?
Sent from my BlackBerry® smartphone with SprintSpeed
-Original Message-
From: "T Biehn" <[EMAIL PROTECTED]>
Date: Wed, 2 Apr 2008 15:52:55
To:"Razi Shaban" <[EMAIL PROTECTED]>
Cc:full-disclosure@lists.grok.org.uk,"[EMAIL PROTECTED]" <[EMAIL PROTECTED]>
S
That you're a douche maybe.
On Wed, Apr 2, 2008 at 1:20 PM, Razi Shaban <[EMAIL PROTECTED]> wrote:
> Quick question:
> What does any of this have to do with "Full Disclosure"?
> Are any of you disclosing anything?
>
> --
> Razi
>
>
>
> On 4/2/08, [EMAIL PROTECTED] <[EMAIL PROTECTED]> wrote:
>
###
Luigi Auriemma
Application: LANDesk Management Suite
http://www.landesk.com/products/ldms/index.aspx
Versions: <= 8.80.1.1
Platforms:Windows
Bug: directory travers
Quick question:
What does any of this have to do with "Full Disclosure"?
Are any of you disclosing anything?
--
Razi
On 4/2/08, [EMAIL PROTECTED] <[EMAIL PROTECTED]> wrote:
>
>
> The atrocities in Canaan reported about places like Jericho and Ai happened
> something like 3 millennia ago now; time
Folks,
Following information/research provided by Alexander Klink, a new
release is out, fixing a low priority security issue as detailed below.
The release is on the primary Apache-SSL ftp server and should hit the
mirrors over the next few hours, according to their schedules.
See http://www.
The atrocities in Canaan reported about places like Jericho and Ai happened
something like 3 millennia ago now; time to
get over them, and remember there may be statements in the Bible which are not
divinely inspired. In fact the Bible says
there are. See for example Jeremiah 8:8 which I have see
http://www.allfordmustangs.com/photopost/data/3243/Lambo-Doors-So-Played-Out.jpg
That's all I got.
On Wed, Apr 2, 2008 at 5:02 AM, Micheal Turner <[EMAIL PROTECTED]>
wrote:
> Once upon a time in toy town, I offered to contract
> the services of a professional hit-man to have n3td3v
> executed -
On 4/2/08, Cassidy MacFarlane <[EMAIL PROTECTED]> wrote:
> "Youre playing with fire. Fire that cannot be put out with words but
> only inflame the situation of which you are misinformed."
> - n3td3v
>
lolz
and the classic:
Hello Mi5, Mi6, Symantec
I have information regarding Yahoo
Reference
"Youre playing with fire. Fire that cannot be put out with words but
only inflame the situation of which you are misinformed."
- n3td3v
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of
Micheal Turner
Sent: 02 April 2008 11:03
To: n3td3v; [EMAIL PROTECTED];
++ + +
+ + +
+ +
\ /
+ _- _+_ - ,__
_=..:.
Actually, they are getting on with their business, keeping thousands of
network security professionals informed and updated. What they aren't
doing is engaging in childish postings to listservs, silly braggadocio,
and generally making a fool of themselves. When you are good at what
you do, y
Once upon a time in toy town, I offered to contract
the services of a professional hit-man to have n3td3v
executed - in part a joke, my black humour. However, I
have received so many donations from various gmail.com
addresses that I have just been able to purchase my
first car with the left-over ch
Nipper is a network infrastructure parser. It processes configuration files
from network devices and produces a report including a security audit of the
device, configuration settings and other relevant information.
Nipper currently supports the following device types:
* Cisco IOS-based route
33 matches
Mail list logo