lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Tue, 1 Jan 2008 13:49:47 -0600
From: reepex <reepex@...il.com>
To: "Marcin Wielgoszewski" <marcinw86@...il.com>, 
	full-disclosure@...ts.grok.org.uk
Subject: Re: [Professional IT Security Providers -
	Exposed] QuietMove ( D - )

your attitude sure has changed since your last post. Maybe you shouldn't
sound so commanding on a real list next time and instead stick to your local
2600 meetings.

On Jan 1, 2008 1:08 PM, Marcin Wielgoszewski <marcinw86@...il.com> wrote:

> You're right. I'm new and young and I'll be the first to admit it. We
> can't all be born security gurus, and I'm not trying to hide that, but
> me aside... what have you done besides hide behind your gmail account
> and troll FD?
>
> Thanks for pointing out those two pages, two pages out of 100's that
> were posted a long time ago and yes, are very out of date.
>
> On Jan 1, 2008 1:33 PM, reepex <reepex@...il.com> wrote:
> > You are worthless.
> >
> > http://www.tssci-security.com/bookshelf/
> >
> > Is this list up to date?  It makes it seem as if you are learning basic
> > linux commands, sed, and basic perl. Also why are you reading operating
> > system design and implementation when you do not know C? ( Seeing as C
> books
> > are in your 'to-read' list ).  Do you understand any of the code in it
> or do
> > you just pick out buzz words to talk about at your 'local meet-ups'. Why
> > dont you explain the finer points of microkernel design to us?
> >
> > You are headed even further down the path of complete lamer seeing as
> you
> > read books on XSS and all your blog posts revolve around it.
> >
> > even more lulz in your 'plan to read' containing books on fuzzing,
> > metasploit, and writing rootkits. How can you write rootkits when you do
> not
> > know C and are learning basic unix commands?... lol
> >
> > Hopefully one day you realize that you are just another security
> industry
> > kiddie and have no real knowledge, but probably not. Seeing as you have
> your
> > 'bachelors' ( lol - has nothing to do with security ) - I am sure you
> are
> > well on your way to a cissp.
> >
> > Also for good laugh speople should read:
> >
> > http://www.tssci-security.com/projects/
> >
> > how long did it take you to write all 40 lines of your 'labs' code? I
> shall
> > notify perl underground of your horrendous perl and you shalll be a
> source
> > of great lulz in their next production.
> >
> > Just found this:
> >
> http://www.tssci-security.com/blog/wp-content/uploads/2007/11/mwielgoszewski_resume.pdf
> > So you worked 4 places and did nothing useful. Sounds like SImon may
> want to
> > hire you. ( Hi simon , are your workers still inadequate and you need
> more
> > help? )
> >
> > So basically you have worked 4 jobs, went to a community college that
> has
> > some sort of security program, you know basic perl and C, do not know
> how to
> > audit any real programs, and blog about XSS.   Does this summarize you
> > pretty well?
> >
>

Content of type "text/html" skipped

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists