lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <acdc033d050217125775e17940@mail.gmail.com>
From: michealespinola at gmail.com (Micheal Espinola Jr)
Subject: A parent's primer to computer slang

Who cares.  Its high-level for parents.  Why would you expect any of
this to be absolutely current or accurate?  I would compare talking to
most parents similar to talking to PHB's.

Is there something here to be disclosed about MS trying to provide
information to parents so they at least have some sort of clue as to
what their children might be doing?

I would think its good that they even trying to broach the subject.


On Thu, 17 Feb 2005 15:17:27 -0500, Paul Kurczaba
<seclists@...urinews.com> wrote:
> Seriously, doesn't Microsoft has anything better to do...
> 
> -----Original Message-----
> From: full-disclosure-bounces@...ts.netsys.com
> [mailto:full-disclosure-bounces@...ts.netsys.com] On Behalf Of Berend-Jan
> Wever
> Sent: Thursday, February 17, 2005 10:14 AM
> To: full-disclosure@...ts.netsys.com
> Subject: [Full-Disclosure] A parent's primer to computer slang
> 
> M$ is informing the public about scriptkiddies:
> http://www.microsoft.com/athome/security/children/kidtalk.mspx but
> unfortunately, their information is incorrect:
> "Characters of similar appearance can be used to replace the letters they
> resemble." --> The only two words in 311715h written with a $ are M$ and
> Micro$oft.
> "sploitz" (short for exploits): Vulnerabilities in computer software used by
> hackers. --> A vulnerability is called a "vuln" and a tool (mostly a program
> or script) exploiting the vuln is called an exploit or "sploit".
> 
> Cheers,
> SkyL1n3d.
> 
>                        .-----------------------------------,
>                       / Berend-Jan Wever aka SkyLined       )
>                      / skylined@...p.tudelft.nl            / \
>                     / http://www.edup.tudelft.nl/~bjwever /  /
>                    / PGP key ID 0x48479882               /  /
>                   / .----.            ,                 /  /
>                  / (      '  /       /  .     __   __/ /  /
>                 /   `'-._   /.' | / /  / ( / /_.'.' / /  /
>                (         ) / )  |/ /  / / ) (__ (__/ /  /
>                 \-------' ------` '-----------------<  /
>                  \______.`\______\/\_________________\/
> 
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.netsys.com/full-disclosure-charter.html
> 
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.netsys.com/full-disclosure-charter.html
> 


-- 
ME2

my home: <http://www.santeriasys.net/>
my photos: <http://mespinola.blogspot.com/>

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ