lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <8a6b8e350808221546p482a4b4bu265acff2b578c506@mail.gmail.com>
Date: Fri, 22 Aug 2008 15:46:01 -0700
From: "James Matthews" <nytrokiss@...il.com>
To: full-disclosure@...ts.grok.org.uk
Subject: Re: Fwd: Hacker calls buddies overseas on U.S.
	government dime

So one guy got caught. Many times people call on unprotected RAS servers but
thanks for the clarification between a hacker and phreak!

On Fri, Aug 22, 2008 at 3:22 PM, n3td3v <xploitable@...il.com> wrote:

> Cnet News cave into n3td3v pressure and change "hacker" headline to
> "phreaker".
>
> All the best,
>
> n3td3v
>
> ---------- Forwarded message ----------
> From: n3td3v <xploitable@...il.com>
> Date: Fri, Aug 22, 2008 at 6:05 PM
> Subject: re:Hacker calls buddies overseas on U.S. government dime
> To: send-us-news-tips@...t.com
>
>
> Its called phreaking and its a phreaker not a hacker...
>
>
> http://news.cnet.com/8601-1009_3-10023285.html?communityId=2114&targetCommunityId=2114&messageId=783700#783700
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>



-- 
http://www.goldwatches.com/

Content of type "text/html" skipped

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ