Release: TA-Mapper v1.1
Brief Overview: Time and Attack Mapper (alternatively known as TA-Mapper) is
an effort estimator tool for blackbox security assessment (or Penetration
Testing) of applications. This tool provides more accurate estimation when
compared to rough estimation. Penetration
A bit late post...
There are several instances where application stakeholders struggle hard to
identify necessary security SDLC activities for their applications and
products. Apparently cost has always been a key deciding factor while
engaging security activities at various stages of SDLC.
Happy New Year To All!
Time and Attack Mapper (alternatively known as TA-Mapper) is an effort
estimator tool for blackbox security assessment (or Penetration Testing) of
applications. This tool provides more accurate estimation when compared to
rough estimation. Penetration testers who always has
Having not found one (except msf) that reliably works against my own setup
thought of writing my own MS08-067 exploit piece. Plugged the shellcode for
win2k and win2k3[sp2]. No plans for updating the xp shellcode.
Grab the python here:
http://www.hackingspirits.com/vuln-rnd/vuln-rnd.html
-d
[mailto:[EMAIL PROTECTED]
Sent: 17 November 2008 08:46
To: Debasis Mohanty
Cc: [EMAIL PROTECTED]
Subject: Re: [Full-disclosure] Microsoft Windows Server Service (MS08-067)
Exploit
not really fair to say All the vulnerabilities/exploits listed here are
all researched and discovered by me. on your page
Since past few weeks I was busy forking adobe stuffs, it didn't took me more
than few hours to come up with this exploit. Thanks to coresecurity folks
for their technical details which made my job easy.
Grab it here...
http://hackingspirits.com/vuln-rnd/vuln-rnd.html
-d
Although can't release the exploit code for obvious reasons but thought of
putting a video will be a good thing.
Check for a bindshell exploit demo for RealPlayer ierpplug.dll ActiveX
Control BO (CVE-2007-5601) vulnerability:
http://coffeeandsecurity.com/resources.aspx
-d
Acrobat Reader Download/Exec Exploit Demo Video
http://coffeeandsecurity.com/resources.aspx
Due to hosting space/bandwidth constrain, I'll not keep the original version
for longso grab it before it is gone. :) Don't forget to archive it
-d
No offence intended but if you take a little more effort of validating your
work before posting publicly then you can save yourself from embarrassment.
I don't see anything in the script that can bypass zone security and run
successfully from internet zone. I am sure you have tested it locally
On Sat, 04 Aug 2007 01:17:36
Interesting! I thought time machine only appears in movies :)
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Joey Mengele
Sent: 02 August 2007 22:41
To: full-disclosure@lists.grok.org.uk; [EMAIL PROTECTED];
[EMAIL
Hence kindly do not entertain any more bogus from secniche, also i
don't understand
what in the world are the CVE maintainers doing.
this is not first time a CVE been assigned to a fake claims. Since FD
has become a short cut to fame, history has proven that many clowns in
the past had their
didn't find this in your list. Work for their online demo site not
sure if it works in actual deployment -
comments inline
At this stage,
ideally the session should be disabled and should be enabled only after
the user re-authenticates himself. However, the session associated with
SID and LSID cookies remain alive at the server side.
That *certainly* doesn't prove a threat. It is by-design and
What program(s) do you use in static code analysis? It doesn't matter if
you are a hardcore grep+editor researcher or if you use complex
frameworks: Tell me (and also the rest of the list) about it.
Secure code review is one of the most mis-guided field where many
security folks talks only
Last month while I was fuzzing an application using Jasper, I got this -
The error message is Error 500: Request processing failed; nested
exception is net.sf.jasperreports.engine.JRRuntimeException:
net.sf.jasperreports.engine.JRException: Error executing SQL statement
for :
the funny part is I hit this issue everytime I assess an application
configured with tomcat and was under the impression that it is already
a known issue... :)
On 6/19/07, Mark Thomas [EMAIL PROTECTED] wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
CVE-2007-1358: Apache Tomcat XSS
priceless!!
On 5/18/07, David Maynor [EMAIL PROTECTED] wrote:
dear lists,
I've noticed a lot of people posting MD5 hashes on other mailing lists such
as DailyDave to prove that they had an idea first. I'd like to lay down a
claim that Robert and I thought up after our talk this weekend at
- [Section 3] Two more methods to fix are added under the Permanent
Fix Details.
- [Section 4] Added fix details for FireFox
Disabling GDS Desktop Link Integration in Google Pages
Download Link - http://hackingspirits.com/vuln-rnd/vuln-rnd.html
Regards,
-d
-Original Message-
From: Debasis
So you can't make the statement that nothing happend with FF.
Don't bother about Firefox, they did bothered to take care of basic security
issues before creating the browser.
Accessing the clipboard via a web page is a pretty old well known bad design
issue with IE. Try this link with your IE4
It is sometimes interesting to see how typos can change the meaning.
Correction - they did bother
-Original Message-
From: Rod Trent [mailto:[EMAIL PROTECTED]
Sent: Friday, March 16, 2007 12:39 AM
To: 'Debasis Mohanty'; [EMAIL PROTECTED]; [EMAIL PROTECTED];
full-disclosure
GDS Desktop Link and Google.com Integration -
Bad Design or Necessary Evil?
The recent security advisory on Google Desktop Search (GDS) published by
Watchfire did not really surprised me as I was expecting more like this in
past 2 years. However, the fact that intrigued me to write this article
it becomes a matter of time before another vector of exploit (either
through the browser or web application) allows similar access.
There are already plenty out there for exploiting GDS, just that they are
not disclosed.
I found a similar one nearly a year ago where one can retrieve the
Some lame methods to defeat a lame attempt to *prevent* Piracy or illegal
usage of software -
http://hackingspirits.com/vuln-rnd/vuln-rnd.html
-d
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Google AdWords Multiple HTTP response splitting (aka CRLF Injection)
vulnerabilities
http://hackingspirits.com/vuln-rnd/vuln-rnd.html
regards,
-d
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
More than a year Old (3rd August, 2005) -
Defeating CITI-BANK Virtual Keyboard Protection
http://archives.neohapsis.com/archives/fulldisclosure/2005-08/0142.html
http://hackingspirits.com/vuln-rnd/Defeat-CitiBank-VK.zip
http://xforce.iss.net/xforce/xfdb/21727
Regards,
-d
-Original
-Original Message-
From: Gadi Evron [mailto:[EMAIL PROTECTED]
Sent: Monday, November 27, 2006 2:35 PM
To: Debasis Mohanty
Cc: full-disclosure@lists.grok.org.uk
Subject: Re: [Full-disclosure] Defeating Image-Based Virtual Keyboards
andPhishing Banks (fwd)
On Mon, 27 Nov 2006, Debasis
Finally MS released the fix for CVE-2006-3014 along with others -
http://www.microsoft.com/technet/security/bulletin/ms06-069.mspx
Regards,
-d
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On
Behalf Of Debasis Mohanty
Sent: Friday, October 06, 2006 1:02 AM
Lol !! I was just about to point out the same Erik ...
Seen this couple of times in the past and a known technique :)
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Knud Erik
Højgaard
Sent: Thursday, November 09, 2006 6:01 AM
To: 李继辉
Cc:
I found a similar one long back in the Expect header but did not bother to
post... However, this bug is not associated with the paypal application but
rather with the Apache server *version* on which it is hosted. This kind of
XSS are usually called as - Unfiltered Header Injection in Apache.
VI. Credits:
Debasis Mohanty (aka Tr0y)
www.hackingspirits.com
For more vulnerabilities visit -
http://hackingspirits.com/vuln-rnd/vuln-rnd.html
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Matthew Flaschen [EMAIL PROTECTED] to Peter, full-disclosure
Aren't cross-zone urls disallowed by default, though?
I agree with Matthew Brian. If cmd.exe can be run from a browser
using file:// irrespective of cross-zone security boundaries then
there are *much* other urgent things to be
An xtreamly neat work muts !! :)
-d
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of muts
Sent: Sunday, October 01, 2006 6:56 PM
To: full-disclosure@lists.grok.org.uk
Subject: [Full-disclosure] McAfee EPO Buffer Overflow
Looks like everyone ON for openssl bug feast!! ;-) Is this different from
SSL_get_shared_ciphers() buffer overflow (CVE-2006-3738)??
-d
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Martin Pitt
Sent: Thursday, September 28, 2006 8:30 AM
To: [EMAIL
How about a subject line??
-d
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Raphael
BarkiSent: Monday, July 24, 2006 11:56 AMTo:
full-disclosure@lists.grok.org.ukCc:
[EMAIL PROTECTED]Subject: [Full-disclosure] (no
subject)
Hi,
We are pleased to inform you that
the
IS YOUR *caps lock* DAMAGED BEYOND REPAIR??
-d
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of AMIT
SECURITY
Sent: Friday, June 30, 2006 10:45 PM
To: full-disclosure@lists.grok.org.uk
Subject: [Full-disclosure] Advisory from AMIT concern BANTOWNE
/ 2006 -Public disclosure
For more details visit - http://hackingspirits.com/vuln-rnd/vuln-rnd.html
VI. CREDITS
Debasis Mohanty (aka Tr0y)
www.hackingspirits.com
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full
:
0192e7dc 668b10 mov dx,[eax]
ds:0023:=
For more vulnerabilities : http://hackingspirits.com/vuln-rnd/vuln-rnd.html
Credits:
Debasis Mohanty (aka Tr0y)
www.hackingspirits.com
___
Full-Disclosure - We believe in it.
Charter
:
0192e7dc 668b10 mov dx,[eax]
ds:0023:=
For more vulnerabilities : http://hackingspirits.com/vuln-rnd/vuln-rnd.html
Credits:
Debasis Mohanty (aka Tr0y)
www.hackingspirits.com
___
Full-Disclosure - We believe in it.
Charter: http
://hackingspirits.com/vuln-rnd/vuln-rnd.html
Credits:
Debasis Mohanty (aka Tr0y)
www.hackingspirits.com
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http
Singnature based analysis doesn't apply well incase of script based worms /
virii. The issues here seems to be lack of feature to do an appropriate
analysis of script based worms.
Symantec is able to block it because, in addition to signature matching it
is also trying to figure out what the
PRODUCTS
I have only tested this for PhpMyChat 0.14.5 but I guess the previous
versions might also be affected.
V. VENDOR
http://phpmychat.sourceforge.net
http://www.phpheaven.net/rubrique4.html
VI. CREDITS
Debasis Mohanty
www.hackingspirits.com
Sure !! With the credits intact ;o)
- Deb
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Dave Korn
Sent: Thursday, February 16, 2006 12:46 AM
To: full-disclosure@lists.grok.org.uk
Subject: [Full-disclosure] Re: Re: Fun with Foundstone
Debasis Mohanty
be
downloaded from -
http://www.hackingspirits.com/eth-hac/papers/whitepapers.asp
Feel free to mail me for any kind of queries or suggestions at - debasis
[at] hackingspirits.com or debasis_mty [at] yahoo.com
Regards,
Debasis Mohanty
www.hackingspirits.com
Although I am not much familiar
with myspace and have never used it but the samy's outbreak was really
interesting and dragged my attention a little towards such worms.
It seems 'samy' is not alone in
this field and there are couple of bots seems to be still exploiting myspace.
PROTECTED]
Sent: Saturday, January 07, 2006 1:30 AM
To: Debasis Mohanty
Cc: full-disclosure@lists.grok.org.uk
Subject: Re: [Full-disclosure] FW: myspace - add hundreds of friends
instantly and automatically with this awesome tool
Debasis,
it looks like the 'bot' simply automates the process
] [mailto:[EMAIL PROTECTED] On Behalf Of Gaurav Kumar
Sent: Thursday, December 22, 2005 8:52 AM
To: Debasis Mohanty
Cc: full-disclosure@lists.grok.org.uk; [EMAIL PROTECTED]
Subject: Re: [WEB SECURITY] RE: [Full-disclosure] new attack technique?
using JavaScript+XML+OWSPost Data
On 12/22/05, Debasis
?
Is this a new topic ?? I mean are you done with your firewall and some
weired trojan design :P
- D
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Gaurav Kumar
Sent: Thursday, December 22, 2005 10:23 PM
To: Debasis Mohanty
Cc: full-disclosure
/security-jobs/2003/Oct/0156.html
hahaha Ethical Hacker omfg. You trying to be next fadia or wat ? Do you
want me to post ur lame Firewall bypass vulnerabilities links which have been
already founded years before?Basically u are an asshole. So
stfu.
On 12/22/05, Debasis
Mohanty [EMAIL PROTECTED
hursday, December 22, 2005 10:23 PM
To: Debasis Mohanty Cc: full-disclosure@lists.grok.org.uk
Subject: Re: [Full-disclosure] new attack technique? using
_javascript_+XML+OWSPost Data typo- i am 22 and YOU
ARE 27, so i am 5 years kidder than u. On 12/22/05,
Gaurav Kumar [EM
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Gaurav Kumar
Sent: Thursday, December 22, 2005 11:10 PM
To: full-disclosure@lists.grok.org.uk
Subject: Re: [Full-disclosure] new attack technique?
usingJavaScript+XML+OWSPost Data
All I have to say is that
;o)
I'll publish it sometime on my site - www.hackingspirits.com
- D (aka T)
-Original Message-
From: Xavier [mailto:[EMAIL PROTECTED]
Sent: Tuesday, December 20, 2005 1:36 AM
To: Debasis Mohanty
Cc: full-disclosure@lists.grok.org.uk
Subject: Re: [Full-disclosure] about that new
Hi,
I read your blog. Find my comments inline -
- Original Message -
From: Xavier [EMAIL PROTECTED]
To: full-disclosure@lists.grok.org.uk
Sent: Sunday, December 18, 2005 8:19 AM
Subject: [Full-disclosure] about that new MySpace XSS worm
1) There is a XSS vulnerability in MySpace.com,
for
vulnerabilities in Flash versions 6.X and 7.X. (See BugtraqID 15332) In
other words, the "worm" creates a link to the malicious flash file in your
MySpace profile. Whenever someone views your profile with a vulnerable version
of Flash they become infected and the "worm" g
From: H D Moore
Sent: Saturday, December 10, 2005 12:48 AM
To: full-disclosure@lists.grok.org.uk
Subject: [Full-disclosure] McAfee VirusScan vs Metasploit Framework v2.x
Looks like some overzealous idiot at McAfee added Trojan signatures for
202 files in the latest version of the Metasploit
-Original Message-
From: On Behalf Of Frank Knobbe
Sent: Friday, December 02, 2005 11:05 PM
To: [EMAIL PROTECTED]
Cc: full-disclosure@lists.grok.org.uk
Subject: re: [Full-disclosure] Most common keystroke loggers?
Why wait for a click? The attacker can just record all screen activity in
The point that everyone seems to have out here is, all these User IDs / PINs
etc are all stored in clear text in the web 'form fields'. These days
attacks are much more sophisticated and stealth. The idea of X-x-X screen
capture is bit outdated and can easily be fooled. Ex: If an user has to type
Lol !! Never seen such settings in the content filters where the
notification reveals any such file paths.
Another funny statement is - Please rename your file to filename.zzp and
resend to ensure delivery.
- D
-Original Message-
From: System Attendant [mailto:[EMAIL PROTECTED]
Sent:
-Original Message-
From: Blue Boar
Sent: Friday, December 02, 2005 12:15 AM
To: [EMAIL PROTECTED]
Cc: full-disclosure@lists.grok.org.uk
Subject: Re: [Full-disclosure] Most common keystroke loggers?
Shannon Johnston wrote:
Hi All,
I'm looking for input on what you all believe the most
This sober *FBI/CIA* variant seems to have strike back with the intention to
make *news* which it failed to make when it was originally released first
time in the month of Feb (2005). I encountered it in the month of Feb and
since there were no AV advisories around, I reverse engg it to find out
the following
link:
http://www.hackingspirits.com/vuln-rnd/vuln-rnd.html
IX. CREDITS:
Tr0y (a.k.a Debasis Mohanty)
[EMAIL PROTECTED]
http://www.hackingspirits.com
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure
Hello Andrey,
Few comments on this -
Correct me if I am wrong, forged magic byte might not always be able to
fool the AV in real scenario (especially EXEs) unless you are talking about
Static Virus scanners. In past few years the AV scanning technology has
improved a lot and has gone even beyond
Hey AZ,
Andrei Zlate-Podani wrote:
A firewall has to do with network traffic. All this talk about bypassing
firewall x or y using this
trick or that one is sheer nonsense.
I just noticed @bitdefender.com in your ID and I am sure you must be
knowing better than me in all aspect as far as AV /
that the vendor wants to keep their EGO up-2-date by
covering up this issue with their latest version 6.0 =))
Gud Luck !!
-D
-Original Message-
From: Paul Laudanski [mailto:[EMAIL PROTECTED]
Sent: Monday, October 03, 2005 9:06 PM
To: Debasis Mohanty
Cc: 'Zone Labs Security Team
Sent: Monday, October 03, 2005 11:57 PM
To: Zone Labs Security Team
Cc: full-disclosure@lists.grok.org.uk; bugtraq@securityfocus.com
Subject: [Full-disclosure] Bypassing Personal Firewall, is it that* hard?
hello list,
Lately 'Debasis Mohanty' was refreshing some old issues. Anyways
and warns the user if some program (evil or trusted) is
trying to become a system startup program. Sorry for that mistake had tooo
much with Paul Zone Labs ;-)
-D
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Debasis
Mohanty
Sent: Tuesday, October 04, 2005 12
the Solution section in the PoC where I have mentioned about the
Upgrade. :)
- D
-Original Message-
From: Paul Laudanski [mailto:[EMAIL PROTECTED]
Sent: Sunday, October 02, 2005 11:43 PM
To: Debasis Mohanty
Cc: 'Zone Labs Security Team'; bugtraq@securityfocus.com;
full-disclosure
messaging.
- D
-Original Message-
From: Florian Weimer [mailto:[EMAIL PROTECTED]
Sent: Sunday, October 02, 2005 12:11 AM
To: Debasis Mohanty
Cc: 'Thierry Zoller'; full-disclosure@lists.grok.org.uk
Subject: Re: [Full-disclosure] Re: Bypassing Personal Firewall (Zone
AlarmPro)Using DDE
Yeah TZ,
This one will work but as long as an user's intervention is there but if you
try to simulate key strokes using your code then this is prevented by
current version of ZA.
- D
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Thierry
Zoller
Sent:
Hey TZ,
I am not sure we are speaking about the same attack. When I was speaking
about SendMessage()
I was refering to the presentation at CCC2003, i.e shelling IE simulating
a user through SendMessage() Api.
As this wasn't clear in your previous reply so I got it wrong. Anyway thanks
for
: Thierry Zoller [mailto:[EMAIL PROTECTED]
Sent: Sunday, October 02, 2005 1:06 AM
To: Debasis Mohanty
Cc: full-disclosure@lists.grok.org.uk
Subject: Re: [Full-disclosure] Re: Bypassing Personal Firewall
(ZoneAlarmPro)Using DDE-IPC
Dear Debasis,
DM This one will work but as long as an user's
from me then feel free to mail.
Thanks Regds...
Tr0y (aka Debasis Mohanty)
www.hackingspirits.com
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Zone Labs
Security Team
Sent: Friday, September 30, 2005 5:13 AM
To: bugtraq@securityfocus.com; full
Paul Laudanski wrote:
This exploit was tested by members at CastleCops and found to be
untrue:
Unfortunately not !! Besides Zone Alarm free version it has been tested for
ZA Pro 3x and it works like a charm. Again Symantec SecurityFocus has
probably tested this for ZA Pro 5.1. so they have
, 2005 3:25 AM
To: Debasis Mohanty
Cc: [EMAIL PROTECTED]; full-disclosure@lists.grok.org.uk;
bugtraq@securityfocus.com
Subject: RE: [Full-disclosure] Re: Bypassing Personal Firewall (Zone Alarm
Pro)Using DDE-IPC
On Sat, 1 Oct 2005, Debasis Mohanty wrote:
Paul Laudanski wrote:
This exploit
can be downloaded from the following link:
http://hackingspirits.com/vuln-rnd/vuln-rnd.html
Cheers
Tr0y (aka Debasis Mohanty)
www.hackingspirits.com
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure
* Due to an invalid keyboard input validation, its
possible to send keys to any
* application of the
Desktop.
Cross-Window access and emulation of
key strokes on Windows are pretty old stuffs. You can see this in many joke
programs and fake virus programs. They are there since Win 9x
, 2005: Vendor was contacted but no response till today.
Cheers,
Debasis Mohanty (a.k.a Tr0y)
www.hackingspirits.com
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia
:[EMAIL PROTECTED]
Sent: Saturday, August 06, 2005 1:40 AM
To: Debasis Mohanty
Cc: full-disclosure@lists.grok.org.uk
Subject: Re: [Full-disclosure] Defeating Citi-Bank Virtual Keyboard
Protection
On Sat, 6 Aug 2005, Debasis Mohanty wrote:
Recently I discovered a method to defeat the much hyped
Sweet and Simple - This is how this program works.
A brief on the algo~m is given below -
Step1: Enumerate all the IE windows and look for the one with CitiBank Login
screen (This step is invoked when an IE is opened and a partucular URL is
requested)
Step2: If found then Create a HTML object
%20UNPLUG%20UR%20PC%20CABLE')/s
criptproduct_rn=scriptalert('OR%20REBOOT%20IT')/scriptproduct_rn=scr
iptalert('LOOSER%20!!')/script
History:
Vendor has been notified but there is no response and I guess neither they
are going to respond.
Cheers,
Debasis Mohanty
www.hackingspirits.com
$
download centre. Bad Luck ... ;o)
There are still ways
to circumvent WGA, I am currently working on it but can't comment anything at
this point of time.
Debasis
Mohanty
www.hackingspirits.com
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of
goosee007Sent: Wednesday, July 27
not
so much interested in the credits rather I am more interested in uncovering
such issue to this community.
Justin Allen (a.k.a. poedguy)
Debasis Mohanty (a.k.a. Tr0y)
www.hackingspirits.com
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Justin
[EMAIL PROTECTED] wrote:
In the article the representative analyze this hack and explain why (by
microsoft's opinion...) it is not a threat for Microsoft. Also the
article speaks about the rapidly expiration which is a point that Debasis
Mohanty mistaken.
I am absolutely not mistaken
on their pirated versions of Win XP then do let
me know if the installed product make noise after certain time period.
Debasis Mohanty
www.hackingspirits.com
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full
i guess, companies should know learn how to treat ppl.
who write to them. For this, i've always admired
Microsoft. (O; (no flames)
-bipin
This is something I must agree with you Bipin. Microsoft has always been
polite and responsible atleast to whatever I have posted them in the past.
To
84 matches
Mail list logo