lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <d87b02ad0601312057l1c589612o@mail.gmail.com>
Date: Wed Feb  1 04:57:11 2006
From: lucianobellou at gmail.com (Luciano Faletti)
Subject: I stole code

Is the fact of opening the head to the people and let them know the fault
that are making the Closed-source software like microsoft, putting a limit
to the knowledge.Nothing that was said before...

Open the Windows, let the wind and sun enter!

greetz,
Luciano (new in the list)


2006/1/31, Steve Kudlak <chromazine@...global.net>:
>
>
> Well ok let's see. I am disabled now, so keeping a regular schedule is
> out; Doing 14 hour days except when I want them is out;  So I teach
> meteorlogy by presenation to kiddies, I always justify it by saying I
> provide a drain for their youthful energies and they don't do worse things.
> . Anyway I used to work in the Silicon Valley and in the well off school
> academia that surrounds it. The very thing you describe was done a lot.
> There was a lot of diuscussion about people lifting code out of the academic
> world and inserting it into corporate software that was protected by this,
> that and the other thing. There is grump among computer graphics people
> about Lucasfilm grabbing lots of the good computer graphics people at
> Stanford and various places there around and hiding them behind all sorts of
> non-disclosure agreements. So to be very new age about it, I wouldn't beat
> yourself up over it.
>
> IF any of that stuff really works and is of interest then just publish it.
> I wouldn't hide things that much. I would keep too many easy to use toy like
> tools out of the hands of script kiddies but that is no reason to hide the
> good stuff.  I kind of giggle and laugh at the macho posturing of some
> hackers. Heaven knows I started in the land of PDP10s and DECSYSTEM 20s and
> ITS, TENEX, TOPS-20 and the like and hacker was a term to was mostly a
> compliment.  It didn't involve putting the letter x in words and getting
> haxxors or whatever, but that would have been thought of as cute.
>
> Overall open source is better. I have my big catch all windows file in
> WORD and word crashes all the time when opening this file. SO I have to
> figure out why it crashes and what is messing up and all of that. It isn't
> easy and in fact it's a pain in the you know where. I am perfecly playing
> fast and loose sometimes but overall I do want to do that all the time. So
> overall I would say be honestly open source is a good idea.
>
> Have Fun,
> Semds Steve
>
>
> Simon wrote:
>
> Hello,
> my name is Simon, founder of segfault.ch and wireless-bern.ch
> In this mail i want to admit that i copyed other people's code.
> I took code, edited the headers and printfs,  removed the real
> author's name and added my own. Almost all codes and
> papers on my Site (http://www.segfault.ch) were written by some else.
> The only thing that came from me were the segfault.ch ASCII and the
> printfs with my name.
> llfe.c by Danny from:http://packetstorm.linuxsecurity.com/UNIX/penetration/log-wipers/lastlog.txt
>
> shellcodes (connectback-x86-fbsd.c, dumb-portbind-x86-fbsd.c,
>         portbind-x86-fbsd.c, shellspawn-x86-fbsd.c) by fli from:http://shapeshifter.se/code/shellcodes/shellcodes/
> iwconfig-local-r00t-sploit.c by qnix from:http://milw0rm.com/id.php?id=1215
>
> shoutcast_expl.c by crash-x from:http://0x41414141.net/~crash-x/code/shoutcast_expl.c
> Remote.doc from:http://www.heise.de/security/artikel/61945/1
>
> b0f_11.txt from:http://ww.packetstormsecurity.nl/shellcode/bish.chttp://community.core-sdi.com/~gera/InsecureProgramming/http://www.l0t3k.net/biblio/b0f/en/bufferexploit.txt
>
>
> Even the design of http://simon.segfault.ch was stolen and on my site i
> said:
>
> "Welcome to the official Website of Simon Moser. My major focus is to
> search for common security vulnerabilities and Reverse engineering.  On
> my Website, you will find Software and Papers, which were released by
> me. They should provide you with knowledge and the ability to check for
> security problems. Nevermind, I am a fucking god at computers, so do
> not test me bitch!"
>
> Yes, most things were released by me, but they were not mine. And of
> course I'm not a god in computers, but rather a god in stealing code.
>
> I want to apologise to everyone, who I stole from. And I want to thank
> the people who got me back to earth and reality from the heaven.
>
> My recommendations to all are:
> Don't publish your exploits! There are too many people like me!
> Beat all code thiefs up!
>
> Regards, Simon <Zodiac> Moser
>
>
> ------------------------------
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>
>
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20060201/cc8832af/attachment.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ