lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <000c01c34f8f$f1c7d9f0$1802a8c0@das.com>
From: srenna at d-a-s.com (Scott Renna)
Subject: GUNINSKI THE SELF-PROMOTER

Can you guys stop having a damn pissing contest.  I'm trying to actually
sift through my mail for relevant and important information relating to
security issues.... I don't feel like having to listen to everyone try
to "one-up" each other.  We're all in security together.  Why do you
guys have to care so much about ego?  Don't you have anything else to be
proud of in your life besides your in depth knowledge of security?

Please stop this crap.



***************************
Scott Renna
Head Systems Administrator
Dynamic Animation Systems
703-503-0500

*************************** 

-----Original Message-----
From: full-disclosure-admin@...ts.netsys.com
[mailto:full-disclosure-admin@...ts.netsys.com] On Behalf Of
dhtml@...h.com
Sent: Sunday, July 20, 2003 2:19 PM
To: full-disclosure@...ts.netsys.com
Subject: Re: [Full-Disclosure] GUNINSKI THE SELF-PROMOTER



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


>
> Secondly, if you are an advocate of full disclosure, why weren't these

> "semi private" exploits revealed along with the other, if you are 
> indeed following the full disclosure model?  I think you can't stand 
> by your previous word, so you use degrading terms like "kiddie", to 
> try and undermine my credibility.  It is quite ridiculous, if you ask 
> me.

Young Matthew seems to think that there is some sort of industry
practice whether it be full, part or responsbile disclosure. He is
oblivious to the fact that these nothing more than cute labels others
are trying to append to the work and style of people that  do things.
Mathew is too thick to grasp this and believes that there is formality
to all of this.

I would use the words "liar" and "thief". This is what you are Matthew
:(. Again you are too stupid to realise it and it shall have to be
pointed out to you again.



> If anyone here is a troll, it is you.  I have not gone around labeling

> people "kiddie" without the slightest knowledge of the background to
their
> claims, something that you have done.  You have consistently bashed 
> Microsoft, even though you have been completely idle with respect to 
> Microsoft since July.  I ask where those claims can possibly come 
> from,

> unless of course you have other "semi private" exploits, Georgi?

Unfortunately Matthew because you are a liar and thief and moron, your
actions certainly can be considered trollish. Once again, because you
are not aware of any of this, it will have to be pointed out to once
again.


> I've learned something about you -- you only stick to your word, and
follow
> the standards you've set before, if and when it suits you.  I think
the
> word that "dhtml@...h.com" (since we have no name for this anonymous
fan of
> yours) used fits well here -- turncoat.

I think we have all learnt that you are a liar and a thief and a moron
Matthew :( perhaps you will lern this as well as you age.

Plain and simple.

A.

1. Matthew concludes that Georgi is lying about informing VIM because
Matthew struggles to find any messages about this in the mailing list
archives. Matthew declares that Georgi is a liar twice because of this.

2. Georgi and others reconfirm that in fact that VIM were informed about
this. Plain and simple.

3. Matthew still is unable to accept that he is wrong and has accused
Georgi of lying falsely. This is quite moronic Matthew.

B.

1. Matthew concludes that Microsoft must be doing a good job with their
Trustworthy Initiative because Georgi hasn't published anything in over
a year.  This is Matthew's conclusion and is similr to his moronic
conclusion as in A above.

Matthew you are a certified moron :(

C.

1. Matthew decides that Schneier has made a statmenent that security
vulnerabilities can be completely eliminated

"I think his statement that security vulnerabilities can be completely
eliminated if we want to is silly, and perfectionist in nature".

Of course Schneier did not make any such statement. Matthew is lying.
This is because Matthew is a liar you see :(

2.   Matthew finds a virus or virus generator utilising a well known
and published vulnerability discovered, that core discovery being the
manipulation of spaces in file names and types in the Outlook Express
MUA. Matthew he modifies it and declares to the world that he has
discovered a vulnerability. Matthew is once again lying, because he did
not discover anything. What Matthew did is modify someone else's
discovery and then claim it as his own. Matthew is once again lying and
sadly unaware of it :(

3. Matthew finds an old archived vulnerability report abotu 4 methods of
crashing Internet Explorer, one of which is self-referencing through the
hmtl object associated with the Internet Explorer proprietry html,
actions and behaviors. The core vulnerability technique being looping an
html file in an object. Matthew weaks this finding, and then declares to
the world that he has discovered a vulnerability. Yet again Matthew is
lying as he has not discovered anything. All he has done is modified
someone else's findings. Yet another sad lie in the string of lies from
our friend Matthew the Liar.

D.

As in C 1 and 2 above. Matthew steals two parties original discoveries
and modifies them and then declares to the world that he has discovered
two vulnerabilities. Matthew has stolen two parties findings and made
them his own. This is the nature of the thief and a liar.Matthew Murphy.
In his greed for the spotlight and attention he just takes others
published findings and uses them and claims them to be his own.

In Matthew's mornic conclusion and theiving, lying mind, he will have
you believe that diddling with the file name or the style renders a
brand new discovery. Unable to grasp that the core findings already
published as well known are what make the vulnerability. Because Matthew
is a moron (and a liar and thief), we can demonstrate in the following
simple manner that even a chimp can understand, how Matthew conducts his
thefts:

Martha Muffy discovers and publishes a vulnerability in 1998 to bugtraq
of the following

"if we do this, we crash windows explorer

<script>
window.open("/")
</script>
"

Matthew Murpy the thief, roots around old archives and finds that
published vulnerability and takes and does this which happens to produce
the same results as the original:

if we do this, we crash windows explorer

<script>
window.open("\")
</script>

He then declares to the world, I Matthew Murphy have discovered a
vulnerability.Look at me, aren't I great.

Of course if this were science and had Matthew helped himself to the
pioneering works of others and delcared it to be his own, he would be
shot and pissed on. But this is not science and Matthew is not a
scientist. What he is, is a mornic liar and a thief.

My decision is final.






-----BEGIN PGP SIGNATURE-----
Note: This signature can be verified at https://www.hushtools.com/verify
Version: Hush 2.3

wkYEARECAAYFAj8a3RwACgkQTAj0ZSCgbx5VcwCgsVy2sO2SR61SuSDOXiIEeUQY73MA
mwTN00usb8Ig2uthAK0jV7MRvhVO
=XtHE
-----END PGP SIGNATURE-----




Concerned about your privacy? Follow this link to get
FREE encrypted email: https://www.hushmail.com/?l=2

Free, ultra-private instant messaging with Hush Messenger
https://www.hushmail.com/services.php?subloc=messenger&l=434

Promote security and make money with the Hushmail Affiliate Program: 
https://www.hushmail.com/about.php?subloc=affiliate&l=427
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ