lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <039c01c6637d$edcd62c0$0100a8c0@nuclearwinter>
Date: Wed Apr 19 07:50:55 2006
From: fd at g-0.org (GroundZero Security)
Subject: Google Groups e-mail disclosure in plain text

There is no such thing as "public 0-day sources"....
You don't even understand the meaning of 0day.
As soon as some exploit hits the public, its not 
0day anymore..
now please stop to spam FD with your nonsense.

> This is my last ever Full-Disclosure post... i'm no longer going to
> give Secunia the spam satisfaction of adding their web address to the
> bottom of my messages

Thats like the 3. time you say you leave, why don't you just go then ?
Stop crying about it and get lost.

----- Original Message ----- 
From: "n3td3v" <n3td3v@...il.com>
To: <full-disclosure@...ts.grok.org.uk>
Sent: Wednesday, April 19, 2006 8:09 AM
Subject: Re: [Full-disclosure] Google Groups e-mail disclosure in plain text


> On 4/19/06, Randal T. Rioux <randy@...cyonlabs.com> wrote:
> > What does SF offer?
> 
> People directly post to Securityfocus, it is an original source of
> information, whereas "Please note: The information, which this Secunia
> Advisory is based upon, comes from third party"
> 
> Aka they sit on places like Securityfocus all day looking for
> advisories to republish and "verify".
> 
> I don't think the industry needs someone to "verify" an advisory for them.
> 
> "Secunia collects, validates, and verifies all vulnerability reports
> issued by security research groups, vendors, and others."
> 
> People are more than capable of doing that themselves, or do Secunia
> underestimate the intelligence of the security community?
> 
> If we were to wait everytime for Secunia to harvest advisories from
> public 0-day sources, and verify them manually, then the internet
> would be shutdown by now.
> 
> This is my last ever Full-Disclosure post... i'm no longer going to
> give Secunia the spam satisfaction of adding their web address to the
> bottom of my messages.
> 
> Good bye to the All-New Secunia sponsored Full-dIsclosure mailing list.
> 
> Please unsubscribe n3td3v_at_gmail and xploitable_at_gmail
> 
> Thanks,
> 
> n3td3v
> 
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
> 

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ