lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Fri Apr 21 14:44:43 2006
From: bart.lansing at hushmail.com (bart.lansing@...hmail.com)
Subject: Secunia illegal spam and advisory republication

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

John, thank you for wading in here and setting the record straight.

Now, can we please drop this ridiculous thread and get back to the
business at hand?

On Fri, 21 Apr 2006 08:07:27 -0500 John Cartwright
<johnc@...k.org.uk> wrote:
>On Thu, Apr 20, 2006 at 02:45:57PM -0700, Mike Owen wrote:
>> The list was purchased by Secunia a year or so ago. Many of the
>> subscribers have been on it since it's inception by Len on
>netsys.com
>> 4 years ago, long before Secunia got their hands on it.
>
>Hi
>
>Actually, the list has never been purchased by anyone. Len and I
>started things off using our own hardware, and when Len retired
>last
>year I solicited offers for hosting and support. Of the ~100 or so
>offers I received, Secunia made the most sense from a financial
>and
>technical point of view.
>
>For the record, Secunia staff have no access to the FD server and
>I
>continue to run it exclusively in an independant manner under a
>mutual
>agreement with Secunia.
>
>As far as the 'banner' text goes, I myself added that to reward
>Secunia for their generous support, for which I am extremely
>grateful.
>
>Cheers
>- John
>
>_______________________________________________
>Full-Disclosure - We believe in it.
>Charter: http://lists.grok.org.uk/full-disclosure-charter.html
>Hosted and sponsored by Secunia - http://secunia.com/
-----BEGIN PGP SIGNATURE-----
Note: This signature can be verified at https://www.hushtools.com/verify
Version: Hush 2.5

wkYEARECAAYFAkRI4bkACgkQuCj5fjTzkbCmBwCguYyXmZ9aMT2fAG1rUxgUSwy6/TEA
oJuiicbPH9wFQg3xpBIucUs79WAM
=/Bcv
-----END PGP SIGNATURE-----


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ