lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Sun Mar 26 04:34:51 2006
From: n3td3v at gmail.com (n3td3v)
Subject: Industry calls on Microsoft to scrap Patch
	Tuesday for Critical flaws

*I work with rogue employee vendors around the world to bring good Hack
active solution about within the community, if you can't under stand that,
then you need to sit down and realise that the n3td3v group is the biggest
thing you'll ever meet in your life time, in terms of rogue employees
getting together to make their voice heard.*

*We can agree in that one guy, has many voices, if that helps your cause mr
0x80!*
Or we can argue the crypto of the n3td3v group further if you wish to go
down that road...


On 3/26/06, 0x80@...h.ai <0x80@...h.ai> wrote:
>
> WE?
>
> You are one guy.  Actually you are one stupid guy who obviously has
> zero clue about how real enterprise level infrastructures handle
> patch management.
>
> Patch Tuesday is a good thing as it supports a sound patch
> management methodology.  I wouldn't expect you to know this because
> it is clear that you are some idiotic kid.
>
> On Sat, 25 Mar 2006 14:12:23 -0800 n3td3v <n3td3v@...il.com> wrote:
> >Dear Microsoft and Security Community,
> >
> >
> >In light of WMF and recent HTA flaws, we n3td3v group are calling
> >on the
> >following:
> >
> >
> >We are calling for Microsoft to scrap Patch Tuesday officially for
> >critical flaws in its product line(s).
> >
> >You Microsoft must officially agree that all flaws marked as
> >"Critical" must
> >have a patch within 7 to 14 days of public disclosure.
> >
> >
> >People power will change policy by forwarding this e-mail to:
> >
> >secure@...rosoft.com
> >
> >
> >Reason for this e-mail:
> >
> >
> >Reports are coming into our intelligence body that mass HTA
> >hacking is being
> >carried out world wide.
> >
> >& of course unofficial patches cause a greater security risk than
> >the flaw
> >its self:
> >
> >http://groups.google.com/group/n3td3v/browse_thread/thread/83607ba8
>
> >33b697b0/8f0be3bc9c2436c4
> >
> >
> >Links:
> >
> >n3td3v group HQ:
> >http://groups.google.com/group/n3td3v
> >
> >Hackivism scene information:
> >http://en.wikipedia.org/wiki/Hacktivism
>
>
>
> Concerned about your privacy? Instantly send FREE secure email, no account
> required
> http://www.hushmail.com/send?l=480
>
> Get the best prices on SSL certificates from Hushmail
> https://www.hushssl.com?l=485
>
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20060326/33347785/attachment.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ