Hi,
On Fri, Mar 05, 2004 at 08:40:14AM +0100, rudolphi wrote:
so swinogers turn from service-providers in the newspaper's text to
hackers in the headline
That's nothing new. Some time ago you could read in the BLICK that
some israeli hacker broke the A5/1 gsm mobile phone encryption.
rudolphi wrote:
bad boys :-) today in Zürichsee-Zeitung: ein fehler sprach hacker
an - [...] unglücklicherweise hat sich dabei ein fehler
eingeschlichen: IP-adressen von anwendern, die den test durchgeführt
hatten, konnten eingesehen werden. unter servicdeprovidern wurde
dieses manko in der nacht
On Fri, 2004-03-05 at 10:47, Fredy Kuenzler wrote:
rudolphi wrote:
bad boys :-) today in Zürichsee-Zeitung: ein fehler sprach hacker
an - [...] unglücklicherweise hat sich dabei ein fehler ...
Maybe we (Swinog) should write a Leserbrief.
How many people read the Zürichsee-Zeitung ?
How many people read the Zürichsee-Zeitung ? :-)
Olivier
well, in the train i read ANYthing *gg*
--
[EMAIL PROTECTED] Maillist-Archive:
http://www.mail-archive.com/swinog%40swinog.ch/
--
[EMAIL
Olivier Mueller wrote:
Maybe we (Swinog) should write a Leserbrief.
How many people read the Zürichsee-Zeitung ? :-)
AFAIK it's #3 or #4 in canton of Zurich. I guess they to 50'000 copies
a day.
http://www.zsz.ch/
F.
--
[EMAIL PROTECTED]
ZT: Ein Fehler öffnete die Hintertür
Während einer Woche wurden stün dlich rund 1 Rechner angewählt.
So that's why my net was slow. I was wondering why I was being
hit by so many more amateurs than usual.
Isn't this illegal?
-John
--
That's certainly the part which pisses me off most.
I still haven't forgiven CNLAB for an episode in 1996, when
they dialed various ISP's analog modems EVERY MINUTE FOR A DAY
to test availibility - all without ever logging in, of course,
since they didn't have any accounts with any of those ISPs.
and how does this fit together:
...testeten 20 Rechner via Internetverbindung. Zwischen 10 und 54% waren dabei
über eine öffentlich bekannte Internet-Protokoll-Adresse (IP) direkt zu erreichen.
how does this fit together with this part:
Während einer Woche wurden stündlich rund 1
.
-John
-- Original Message ---
From: A. Uk / dataway GmbH [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Fri, 5 Mar 2004 12:19:58 +0100
Subject: Re: AW: Re: AW: Re: [swinog] Kassensturz/Switch
That's certainly the part which pisses me off most.
I still haven't forgiven CNLAB
bad boys :-) today in Zürichsee-Zeitung: ein fehler sprach hacker an - [...]
unglücklicherweise hat sich dabei ein fehler eingeschlichen: IP-adressen von
anwendern, die den test durchgeführt hatten, konnten eingesehen werden. unter
servicdeprovidern wurde dieses manko in der nacht auf mittwoch
On Tue, 2 Mar 2004 21:37:33 +0100
Marc Loosli [EMAIL PROTECTED] wrote:
Kassensturz.ch Homepage:
:-)
have a look at the filepaths listet below (and put them into your
webbrowser) .. oops :)
the question is: which door is not closed?
Ueli
Warning: mysql_connect(): Too many connections
: [swinog] Kassensturz
On Tue, 2 Mar 2004 21:37:33 +0100
Marc Loosli [EMAIL PROTECTED] wrote:
Kassensturz.ch Homepage:
:-)
have a look at the filepaths listet below (and put them into your
webbrowser) .. oops :)
the question is: which door is not closed?
Ueli
Warning
lol, we should start a story about kassensturz :)
-steven
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] Behalf Of Marc Loosli
Sent: Wednesday, March 03, 2004 12:17 AM
To: [EMAIL PROTECTED]
Subject: RE: [swinog] Kassensturz
http://www.cnlab.ch/kassensturz
well, high security :
and that without NAT :))
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] Behalf Of Marc Loosli
Sent: Wednesday, March 03, 2004 12:17 AM
To: [EMAIL PROTECTED]
Subject: RE: [swinog] Kassensturz
http://www.cnlab.ch/kassensturz
\\securitycheck.cnlab.ch
Open NetBios :-)
-Original Message-
From: Steven Glogger [mailto:[EMAIL PROTECTED]
Sent: Wednesday, March 03, 2004 12:30 AM
To: [EMAIL PROTECTED]
Subject: RE: [swinog] Kassensturz
well, high security :
and that without NAT :))
-Original
have a look at the filepaths listet below (and put them into your
webbrowser) .. oops :)
the question is: which door is not closed?
Exactly. With a little bit of 'fantasie' you'll find the mysql user, db name and
password in clear text.(nice pw, btw). :)
We should really make a
16 matches
Mail list logo