lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20050908170034.GB471@mckenzie.chia-pet.org>
Date: Thu Sep  8 18:01:47 2005
From: miah at chia-pet.org (miah)
Subject: Security Hole Found In Dave's Sock

Ok you've all had your fun now can you all shut the hell up?

Thanks
-miah

On Thu, Sep 08, 2005 at 12:58:31PM -0400, y0himba wrote:
> Is "Shoe 20" a hardened foot protection?
> 
> -----Original Message-----
> From: Ted Frederick [mailto:tfrederick@...entek.com] 
> Sent: Thursday, September 08, 2005 12:55 PM
> To: y0himba; full-disclosure@...ts.grok.org.uk; Dan Mack; Tim Doyle
> Subject: RE: [Full-disclosure] Security Hole Found In Dave's Sock
> 
> Dear list,
> 
> I know that this list is not meant for personal promotion but I think I
> would be remiss if I did not mention that my company has recently released
> an upgrade to our initial offering of Shoe 1.0.  The upgrade to Shoe 2.0
> includes a firewall/anti-virus product previously known as Sock 3.4563.v54.
> 
> The upgrade cost is $19.99. There is also a required software assurance
> subscription of $325.79 monthly. 
> 
> If all goes well with the new product I suspect that we will be purchased by
> a major software vendor before year end thus making updates available on the
> first Tuesday of every month to protect against further holes.  These
> updates will have vague names with no indication of what they actually fix
> which should relieve you of sparing any thought to what risks you may have
> been exposed to prior to the patch.
> 
> Yes, we have in fact thought of everything so you don't have to.
> 
> Ted 

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ