lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <1185622588.10063.62.camel@warthawg-desktop>
Date: Sat, 28 Jul 2007 06:36:28 -0500
From: Joe Barr <joe@...rimer.com>
To: Nate McFeters <nate.mcfeters@...il.com>
Cc: full-disclosure@...ts.grok.org.uk
Subject: Re: FIREFOX 2.0.0.5 new vulnerability

On Fri, 2007-07-27 at 14:56 -0500, Nate McFeters wrote:
> Relax it back man, it's almost time for Vegas... don't take every
> joking email you get so seriously, it could be bad for your health in
> the long run.

What happens in Vegas, stays in Vegas.  Unless you tell me about it.

-- 
This email may contain confidential data which you are neither licensed
nor cleared to possess. If you read such information, you are bound
morally and ethically to empty your brain into the enclosed plastic
baggie and send it to our corporate labs to be vacuumed and tested.
Various legal entaglements ala Apple Sekurity, RIAA, MPAA, and MS-EULA
may also be implied.  Consult your attorney prior to digesting.  No
parts of this email may be consumed in any form without the prior,
express, non-exclusive permission of our auditors.  Details may vary
depending on your locale.  May cause harmful injury or death.  If you
are pregnant, have liver problems, or experience a sudden cessation of
heartbeat, see your doctor.  Do not use alcohol or crystal meth while
reading this email.  

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ