lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <200310160256.h9G2uT602920@storage.mshome.net>
From: gui at goddessmoon.org (Poof)
Subject: FW: Last Microsoft Patch

Maybe they?re giving those certs out now with every icee or something you
buy.

Must be it!


________________________________________
From: full-disclosure-admin@...ts.netsys.com
[mailto:full-disclosure-admin@...ts.netsys.com] On Behalf Of Exibar
Sent: Wednesday, October 15, 2003 18:13
To: Curt Purdy; full-disclosure@...ts.netsys.com
Subject: Re: [Full-Disclosure] FW: Last Microsoft Patch

You're CISSP, GSEC,MCSE+I,CNE, and CCDA and you actually think this is a
real patch from Microsoft?? 
?
? I doubt if anyone will believe that you earned those premium certs after
reading this last message from you....
?
?Exibar
----- Original Message ----- 
From: Curt Purdy 
To: full-disclosure@...ts.netsys.com 
Sent: Wednesday, October 15, 2003 3:04 PM
Subject: [Full-Disclosure] FW: Last Microsoft Patch

Anybody else get this?? Looks legit, originating address is?from msnbc.com.?
But can't believe even Microsoft would be this stupid after the rash of
trojan-attached "patch announcements" lately.? Plus all security people have
been saying that Microsoft would never email a patch out.? Or are they
thinking, "Send this out so all the stupid people will click on this before
they click on a real trojan?
Curt Purdy CISSP, GSEC, MCSE+I, CNE, CCDA 
Information Security Engineer 
DP Solutions 
cpurdy@...ol.com 
---------------------------------------- 
If you spend more on coffee than on IT security, you will be hacked. 
What's more, you deserve to be hacked. 
-- former White House cybersecurity zar Richard Clarke 
-----Original Message-----
From: admin-owner@....net [mailto:admin-owner@....net]On Behalf Of Technical
Services
Sent: Tuesday, October 14, 2003 11:33 AM
To: MS Corporation User
Subject: [inbox] [admin] Last Microsoft Patch
? Microsoft 
? All Products?|? Support?|? Search?|? Microsoft.com Guide? 

Microsoft Home?? 
?
Microsoft User

this is the latest version of security update, the "October 2003, Cumulative
Patch" update which eliminates all known security vulnerabilities affecting
MS Internet Explorer, MS Outlook and MS Outlook Express as well as three new
vulnerabilities. Install now to help protect your computer from these
vulnerabilities, the most serious of which could allow an malicious user to
run code on your system. This update includes the functionality of all
previously released patches. 

?System requirements 
Windows 95/98/Me/2000/NT/XP
?This update applies to 
MS Internet Explorer, version 4.01 and later
MS Outlook, version 8.00 and later
MS Outlook Express, version 4.01 and later 
?Recommendation
Customers should install the patch at the earliest opportunity.
?How to install
Run attached file. Choose Yes on displayed dialog box.
?How to use
You don't need to do anything after installing this item.

Microsoft Product Support Services and Knowledge Base articles can be found
on the Microsoft Technical Support web site. For security-related
information about Microsoft products, please visit the Microsoft Security
Advisor web site, or Contact Us. 

Thank you for using Microsoft products.

Please do not reply to this message. It was sent from an unmonitored e-mail
address and we are unable to respond to any replies.
________________________________________
The names of the actual companies and products mentioned herein are the
trademarks of their respective owners. 


Contact Us ?|? Legal ?|? TRUSTe 

?2003 Microsoft Corporation. All rights reserved. Terms of Use ?|? Privacy
Statement?|? Accessibility 



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ