lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Fri Dec 16 10:49:15 2005
From: steve_r125 at yahoo.co.uk (Steve Russell)
Subject: A CALL FOR FULL-DISCLOSURE TO BECOME A
	MODERATED LIST

--- Joe Average <yahooinsider@...il.com> wrote:

> On 12/15/05, uber@...h.com <uber@...h.com> wrote:
> >
> > I WOULD JUST LIKE TO EXPRESS MY DEEP SUPPORT FOR
> THIS IDEA.  MAKING
> > THE LIST MODERATED WOULD REALLY HELP MY JOB AS A
> SECURITY
> > RESEARCHER.  I COULD MAKE QUICKER, MORE WELL
> INFORMED CHOICES IN MY
> > DAY TO DAY TASKS OF PEN TESTING LEGITIMATELY.  I
> WILL ONLY GET THE
> > GOOD STUFF AND NONE OF THIS PISSING CONTEST WHICH
> IS KILLING THIS
> > LIST.  MODERATING WOULD MAKE THE LIST MUCH MORE
> PROFESSIONAL AND
> > WOULD BRING IT ONE STEP ABOVE SECURITY FOCUS.
> >
> > ONCE AGAIN.  I AM 150% FOR THE MODERATION OF
> FULL-DISCLOSURE.
> 
> 
> no need,
> 
> a) ban all gmail addresses
> b) ban nicknames (real name only)
> c) start inforcing list policy for trouble makers
> who attack legitimate
> researchers like netdev

a) what like the one you are using?
b) what like the one you are using?
c) they were not attacks; they were attempts to get
said person(s) to prove that what they say/have said
is legitimate, and as such we got insults from said
person(s) and we are still waiting for said proof...

Thanks for playing
-Steve


		
___________________________________________________________ 
To help you stay safe and secure online, we've developed the all new Yahoo! Security Centre. http://uk.security.yahoo.com

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ