lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Tue, 1 Jan 2008 12:33:36 -0600
From: reepex <reepex@...il.com>
To: "Marcin Wielgoszewski" <marcinw86@...il.com>, 
	full-disclosure@...ts.grok.org.uk, "Simon Smith" <simon@...soft.com>
Subject: Re: [Professional IT Security Providers -
	Exposed] QuietMove ( D - )

You are worthless.

http://www.tssci-security.com/bookshelf/

Is this list up to date?  It makes it seem as if you are learning basic
linux commands, sed, and basic perl. Also why are you reading operating
system design and implementation when you do not know C? ( Seeing as C books
are in your 'to-read' list ).  Do you understand any of the code in it or do
you just pick out buzz words to talk about at your 'local meet-ups'. Why
dont you explain the finer points of microkernel design to us?

You are headed even further down the path of complete lamer seeing as you
read books on XSS and all your blog posts revolve around it.

even more lulz in your 'plan to read' containing books on fuzzing,
metasploit, and writing rootkits. How can you write rootkits when you do not
know C and are learning basic unix commands?... lol

Hopefully one day you realize that you are just another security industry
kiddie and have no real knowledge, but probably not. Seeing as you have your
'bachelors' ( lol - has nothing to do with security ) - I am sure you are
well on your way to a cissp.

Also for good laugh speople should read:

http://www.tssci-security.com/projects/

how long did it take you to write all 40 lines of your 'labs' code? I shall
notify perl underground of your horrendous perl and you shalll be a source
of great lulz in their next production.

Just found this:
http://www.tssci-security.com/blog/wp-content/uploads/2007/11/mwielgoszewski_resume.pdfSo
you worked 4 places and did nothing useful. Sounds like SImon may want
to
hire you. ( Hi simon , are your workers still inadequate and you need more
help? )

So basically you have worked 4 jobs, went to a community college that has
some sort of security program, you know basic perl and C, do not know how to
audit any real programs, and blog about XSS.   Does this summarize you
pretty well?



On Jan 1, 2008 10:57 AM, Marcin Wielgoszewski <marcinw86@...il.com> wrote:

> Marcin Wielgoszewski here, the "green consultant" you mentioned but
> chose not to focus on.  I'm not sure what you mean by "green," but
> whatever.  I have just finished my bachelor's degree, have done
> internships with some Fortune-100's and I am constantly doing research
> on my own.  I also make an effort to attend every conference and local
> meet-up.  I have my own blog I started at http://www.tssci-security.com,
> you can read and learn more about me.
>
> Onto QuietMove and Adam Muntner...  QuietMove was founded by Adam and
> the other two folks you mention.  I have done some part-time work with
> Adam over the past couple months while finishing up my last semester.
> Adam knows this industry inside-out, and one of only several people I
> would say really knows his stuff.  I'm sorry the website doesn't have an
> infosec glossary of terms for you to study for your Security+.  I guess
> looking on LinkedIn and the website passes off as "research" nowadays.
> Couldn't you have at least used Maltego to look deeper into this?  I was
> actually going to make a post about how pathetic the "research" some
> people have tried to pass off lately in security, and no one, except for
> a few have called anyone out on it.
>
> Some security consulting firms you would give a higher score are some of
> the firms we've picked up where traceroute, whois and their nmap
> scanners left off.
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>

Content of type "text/html" skipped

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ