lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <200208020038.g720cIg58590@mailserver2.hushmail.com>
From: choose.a.username at hushmail.com (choose.a.username@...hmail.com)
Subject: VulnWatch.Org Release

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Oh great, ANOTHER mailing list, ANOTHER .org and ANOTHER database. Just what we need.

win2ksecadvice@...tserv is flop, vulnwatch.org is flop. Flop flop flop like a little fish.

[Full-Disclosure] rules. No need for ANOTHER mailing list. You'll never be Elias or Russ and none of these flopping lists you keep coming up with will succeed.

Steve Manzuik, founder and co-moderator, owner, tinker, tailor, sailor, flop, flop, flop....

Get a real job whydontcha.

On Fri, 2 Aug 2002 00:35:11 +0000 (GMT), Steve <steve@...nwatch.org> wrote:
>Las Vegas, August 1, 2002 - At the Black Hat and Defcon security
>conferences, security community volunteers announce two important new
>services for the security community and a new partnership for
>community-based security information sources.
>The first is the VulnDiscuss mailing list, a new full disclosure forum
>that compliments the existing VulnWatch accouncement list. VulnDiscuss is
>meant to foster the discussion of security issues and vulnerabilities by
>providing a forum for recent security announcements to be discussed.
>VulnDiscuss will be under moderator control to keep it topical, and access
>is open to anyone who wishes to participate or observe.
>
>The second is the Open Source Vulnerability Database (OSVDB). OSVDB - A
>database built and maintained for the community, by the community. The
>goal of the Open Source Vulnerability Database is to provide accurate,
>technical, up to date, unbiased, and reliable vulnerability information to
>the community for free.
>
>The redundant time, effort and money that individual people and companies
>put into maintaining proprietary databases will be cut by exorbitant
>amounts by participating in a community that is working toward a common
>goal. The database will have no commercial licensing restrictions,
>allowing corporations, businesses, and individuals alike to use this
>information in any way they wish without having to pay a dime.
>
>The OSVDB project will be debuting with thousands of vulnerability entries
>provided by databases donated by Digital Defense, Inc., and SensePost.
>This will provide a strong base to start from, allowing OSVDB to
>immediately track new vulnerabilities and provide quality data from the
>start. The continued help of Farm9, NMRC, Neohapsis, Packetstorm,
>VulnWatch, and many other industry experts is invaluable to this project.
>
>And finally the third is a formal partnership between multiple
>community-based security information sources: PacketStorm, Open Source
>Vulnerability Database, Alldas.org, and VulnWatch. The partnership will
>come together under the Internetworked Security Information Services
>initiative (ISISi) title, which will remain a non-profit, vendor-neutral
>entity run by volunteers from the security community. All involved
>projects share the common goal of providing accessible information
>security resources useful for researchers, IT Professionals, and the
>general public, while adhering to a not-for-profit operation model. The
>initiative allows the projects to share resources and volunteers,
>eliminate redundancy, and provide a single organized access point to all
>information which is currently dispersed amongst the individual projects.
>Current ISISi information is available at www.isisi.org.
>
>"[ISISi] allows us to pool our resources and increase the effectiveness of
>our respective initiatives while giving information security professionals
>co-ordinated, higher quality, open source security information than was
>possible previously."
>- Emerson Tan, Spokesman and Ideologue, Packetstormsecurity.org
>
>"Each of the projects involved in this initiative have committed to
>remaining independent and not-for-profit, this is a key requirement for
>participation as we want this to be a community supported effort, for the
>community by the community."
>- Steve Manzuik, founder and co-moderator of VulnWatch.
>
>The individual projects can be contacted at the addresses below.
>
>VulnWatch -- Full disclosure security forums and resources. Press contact:
>Steve Manzuik, steve@...nwatch.org.
>
>Alldas.org . The most complete and up to date mirror of web site
>defacements that includes statistics and trend analysis. Press contact:
>press@...das.org
>
>PacketStorm -- Repository of vulnerability and exploit information. Press
>contact: Emerson Tan, et@....org
>
>OSVDB.ORG - A database built and maintained for the community, by the
>community. Press contact: osvdb@...db.org
>
>
>
>_______________________________________________
>Full-Disclosure - We believe in it.
>Full-Disclosure@...ts.netsys.com
>http://lists.netsys.com/mailman/listinfo/full-disclosure
>

-----BEGIN PGP SIGNATURE-----
Version: Hush 2.1
Note: This signature can be verified at https://www.hushtools.com

wmYEARECACYFAj1J034fHGNob29zZS5hLnVzZXJuYW1lQGh1c2htYWlsLmNvbQAKCRDT
5JkCl0iMkKwjAJ9Xv/yjA2vo3+bKKtCKYgo25J267QCeKATFLcT6XZ5r/yz4bWRRY1vV
xiA=
=BWFr
-----END PGP SIGNATURE-----


Communicate in total privacy.
Get your free encrypted email at https://www.hushmail.com/?l=2

Looking for a good deal on a domain name? http://www.hush.com/partners/offers.cgi?id=domainpeople


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ