lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <a3a7d6660711131157l553d9d5bg6f290b84f09cc518@mail.gmail.com>
Date: Tue, 13 Nov 2007 19:57:27 +0000
From: imipak <imipak@...il.com>
To: "full-disclosure@...ts.grok.org.uk" <full-disclosure@...ts.grok.org.uk>
Subject: Re: End of the world?

whupass@...hmail.com wrote:


> Check this out...
>
> http://www.rollingstone.com/politics/story/16956300/the_prophet_of_c
> limate_change_james_lovelock
>


Yeah,.. hey, this one seems to work, too:

    http://www.rollingstone.com/politics/story/16956300/turnips-galore-at-the-CNN-feast-of-burbling-heads!


Mildly interesting idea, presumably they use that last chunk of the
path purely for reasons of human-readability (on the user's end, or
perhaps the marketing droids trying to make sense of access log data?)
but I'm not sure that's a security issue per se. Perhaps ffuts could
be injected into log viewers or whatever that way?


/i

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ