Hi,
These days I'm getting a lot of Error 999 - Please retry from the
yahoo servers.
Does anybody know what's wrong?
Thanks.
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
Hello Valdis,
On Wednesday 16 February 2005 19:08, you produced the following piece of
wisdom:
[SNIP]
And if it's a crew with a 400K machine zombie net, 3 days. Maybe a week
given that most of the boxes are consumer-grade machines.
Consider it a given that there's at least one somebody
On Thursday 17 February 2005 10:57, Lionel Ferette wrote:
Granted. But what would those somebody find? Maybe it is possible to
forge a message that would have the same hash as another, given, message.
What is the probability of such a forged message to make any sense? More,
to make any sense
===
Ubuntu Security Notice USN-78-2 February 17, 2005
mailman vulnerabilities
CAN-2005-0202
===
A security issue affects the following Ubuntu releases:
Ubuntu 4.10 (Warty
===
Ubuntu Security Notice USN-66-2 February 17, 2005
php4 vulnerability
http://www.securitytracker.com/alerts/2004/Oct/1011984.html
===
A security issue affects the following
The new MyDoom.BB worm misuses Google / Yahoo / Lycos / etc.
to search for e-mail addresses to be greeted with an
infected e-mail message.
See:
http://www.f-secure.com/v-descs/mydoom_bb.shtml
___
Full-Disclosure - We believe in it.
Charter:
Hello ,
2005. februr 17., 13:30:43, rtad:
FT The new MyDoom.BB worm misuses Google / Yahoo / Lycos / etc.
FT to search for e-mail addresses to be greeted with an
FT infected e-mail message.
FT See:
FT http://www.f-secure.com/v-descs/mydoom_bb.shtml
And from Sophos, as MyDoom.O
See:
On Thu, 17 Feb 2005 13:30:43 +0100 (CET), Feher Tamas
[EMAIL PROTECTED] wrote:
The new MyDoom.BB worm misuses Google / Yahoo / Lycos / etc.
to search for e-mail addresses to be greeted with an
infected e-mail message.
See:
http://www.f-secure.com/v-descs/mydoom_bb.shtml
Sometimes I can't
Hi
It looks as though my hosting plans have fallen through, with the
result of this being that I have very little time to find a new home
for the list. Anyone capable of offering support should contact me
off-list ASAP, or I may have no choice but to take FD offline.
Cheers
- John
= Advisory: Multiple Vulnerabilities in BibORB =
Multiple vulnerabilities were found in BibORB which result in SQL
injection, XSS, directory traversal and arbitrary file upload.
== Details ==
=
Product: BibORB
Affected Version: 1.3.2,
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
This is an announcement only email list for the x86 architecture.
Turbolinux Security Announcement 17/Feb/2005
The following
On 2/17/2005 2:23 PM +0100, Macy Gasp wrote:
Sometimes I can't beleive how ignorant and stupid people can be. There
are so many efficient AV products and still worms are running wild...
:(
Imagine a world without ignorant people, and a worm free internet.
That would be bad for business and jobs.
M$ is informing the public about scriptkiddies:
http://www.microsoft.com/athome/security/children/kidtalk.mspx but
unfortunately, their information is incorrect:
Characters of similar appearance can be used to replace the letters they
resemble. -- The only two words in 311715h written with a $
One possibility is brute forcing password hashes. If one has this hash
'91adc9fc3655077dc2d4d757d480b5ea0e11', less time is now needed to brute
force it and gain access to something.
Not really. Here's why:
Bruce Schneier wrote that the research team had found collisions in
SHA-1 in 2**69
iDEFENSE Labs is pleased to announce the launch of our community site:
http://labs.idefense.com
This site will serve as our repository for sharing our research and
development with the security community, including the release of free
software tools. Currently you can find the following at
Anyone know how the dude who hacked into T-Mobil's
network ( http://securityfocus.com/news/10516 )
actually did so? Now that's it gone to court, the
data should be in the public record (anyone have any
lawyer friends who can get a transcript?)
In general, I think it would be invaluable to the
Hi,
Sorry when compose window is opening i forgot your name.
Well the problem lies with your ISP. Here when i was getting same error messages i contacted my ISP and they told me that you have to use our Proxy server and when i did that the problem is solved and now i can access Yahoo properly.
Try
Hi,
Sorry, while compose window is opening i forgot your name.
Well the problem lies with your ISP. Here when i was getting same error messages i contacted my ISP and they told me that you have to use our Proxy server and when i did that the problem is solved and now i can access Yahoo properly.
Seriously, doesn't Microsoft has anything better to do...
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Berend-Jan
Wever
Sent: Thursday, February 17, 2005 10:14 AM
To: full-disclosure@lists.netsys.com
Subject: [Full-Disclosure] A parent's primer to
Who cares. Its high-level for parents. Why would you expect any of
this to be absolutely current or accurate? I would compare talking to
most parents similar to talking to PHB's.
Is there something here to be disclosed about MS trying to provide
information to parents so they at least have
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200502-24
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - -
gf gf wrote:
PS Doesn't the secret service use a classification
system, like the mil, that would prevent sending
highyl sensitive emails in the clear? From what I've
read, the guy compromised highly sensitive reports and
documentation. Does any mobile carrier support PGP or
some other end-to-end
Wait untill he's out (or earlier), a book will no doubt be written :-)
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
just like just about every other webserver gets hacked, they use third
party server software that hasnt gone through enough rigorous testing
to make sure its not vulnerable to any flaws.. simple search on google
will give you the answer
On Thu, 17 Feb 2005 16:12:07 -0500, Dave Ockwell-Jenner
---
Fedora Legacy Update Advisory
Synopsis: Updated cyrus-sasl resolves security vulnerabilities
Advisory ID: FLSA:2137
Issue date:2005-02-17
Product: Red Hat Linux
Jack Koziol's blog over at InfoSec Institute shows that T-Mobile's website is still vulnerable. Even though he hasn't exploited the security holes, it looks like there are still several problems related to the authentication process that was hacked last
Hello!
The next, non-commercial, technological Security Forum will take place
on Sunday, the 20th of February, 2005, at Tel Aviv University's Lev
Auditorium.
Between DNSSEC and breaking pseudo-random algorithms to hijack HTTP
sessions, last month was cool, no?
A bit over 160 people showed up.
Hello List,
Does anyone have a list of query URLs used by W32/MyDoom-O
(Sophos name: http://www.sophos.com/virusinfo/analyses/w32mydoomo.html)
to dig e-mail addresses from search engines?
Are these specific enough that there's a chance to catch them in the
config of a web proxy (e.g. Squid) and
Yes, I did notice that too. I find it somewhat odd, that the browser is not
secure in itself.
It seems, that in Microsoft's point of view, security needs to be something
complex and patchy. No such simple solution as simply upgrading software to a
version which is not vulnerable.
I don't get
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandrakelinux Security Update Advisory
___
Package name: postgresql
Advisory
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandrakelinux Security Update Advisory
___
Package name: cups
Advisory ID:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandrakelinux Security Update Advisory
___
Package name: kdelibs
Advisory ID:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandrakelinux Security Update Advisory
___
Package name: xpdf
Advisory ID:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandrakelinux Security Update Advisory
___
Package name: gpdf
Advisory ID:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandrakelinux Security Update Advisory
___
Package name: tetex
Advisory ID:
-Original Message-
From: [EMAIL PROTECTED]
Sent: Thursday, February 17, 2005 5:01 PM
Subject: URLs used by W32/MyDoom-O (aka .AX,.BB) to query search engines?
Hello List,
Does anyone have a list of query URLs used by W32/MyDoom-O
(Sophos name:
36 matches
Mail list logo