On 10-Oct-09, at 10:23 PM, Lorell Hathcock wrote:
Could you point to the documentation?
Well, a friend at one particular large internet exchange says he can
predict
semi-accurately the ambient temperature/ weather in the local city
from the MRTG stats. :-)
The stats he showed me backed h
On 7-Oct-09, at 11:22 AM, Scott Morris wrote:
I may be having my wires a little crossed (I'm not an electrical
engineer) but I was always under the impression that manipulation of
the
physical characteristics like that from heat/dampness didn't reduce
the
"speed" but the "quality" (like li
On 7-Aug-09, at 8:01 PM, Randy Bush wrote:
Have you seen the iphone decoding bar code into urls ?
doesn't the iphone has an app to decode qr-codes similar to the one
built into almost all keitai here in japan.
http://en.wikipedia.org/wiki/QR_Code
There are multiple (5+ at last count) iP
On 3-Aug-09, at 9:43 PM, andrew.wallace wrote:
Hi,
Read my post one more time and think though: Only "zf0" are legally
in the shit.
The guy "Dragos Ruiu" has absolutely no case against me.
Copy & paste doesn't count as defamation, speak to Wired's legal
On 29-Jul-09, at 9:23 PM, Randy Bush wrote:
LAS VEGAS — Two noted security professionals were targeted this
week
by hackers who broke into their web pages, stole personal data and
posted it online on the eve of the Black Hat security conference.
boring.
Two noted security professionals,
On 2-Jan-09, at 6:53 PM, Gadi Evron wrote:
Yes, this is a serious matter, but it hardly has any operational
impact to speak of for users and none for NSPs.
Dunno. Last I checked NSPs had web servers too. :-P
cheers,
--dr
--
World Security Pros. Cutting Edge Training, Tools, and Techniques
On 2-Jan-09, at 9:56 AM, Robert Mathews (OSIA) wrote:
Joe Greco wrote:
[ ]
Either we take the potential for transparent MitM attacks
seriously, or
we do not. I'm sure the NSA would prefer "not." :-)
As for the points raised in your message, yes, there are additional
problems with
On 28-Nov-08, at 7:35 PM, Gadi Evron wrote:
On Fri, 28 Nov 2008, Howard C. Berkowitz wrote:
It seems that all these cases are more under the bottom than over
the top.
Every couple of years there is a story about some anti virus
company, data center, or whatever running out of an old n
On 18-May-08, at 7:11 AM, Suresh Ramasubramanian wrote:
> 2. It can be prevented by what's widely regarded as BCP on router
> security, and has been covered at *nog, in cisco training material,
> etc etc for quite some time now.
>
> I am much less concerned about security conferences discussing th
On 17-May-08, at 3:12 AM, Suresh Ramasubramanian wrote:
> On Sat, May 17, 2008 at 12:47 PM, Matthew Moyle-Croft
> <[EMAIL PROTECTED]> wrote:
>> If the way of running this isn't out in the wild and it's actually
>> dangerous then a pox on anyone who releases it, especially to gain
>> publicity at
The question this presentation begs for me... is how many of the folks
on this list do integrity checking on their routers?
You can no longer say this isn't necessary :-).
I know FX and a few others are working on toolsets for this...
I'll probably have other comments after I see the presentat
On 18-Apr-08, at 1:45 PM, David Coulson wrote:
> Stephen John Smoogen wrote:
>> I think that is based off the all American TV going to HDD that is
>> supposed to happen in 2009. ( I think I read that currently only 40%
>> of Americans have HDD TV's and the 60% were not going to buy one
>> until
12 matches
Mail list logo