lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <002401cbc70f$64674f00$c103fea9@ml> Date: Mon, 7 Feb 2011 23:35:35 +0200 From: "MustLive" <mustlive@...security.com.ua> To: "Michele Orru" <antisnatchor@...il.com> Cc: full-disclosure@...ts.grok.org.uk Subject: Re: Multiple vulnerabilities in SimpGB Hello antisnatchor! No, I've not :-). When some mothefucker hacked ANOTHER site (to which I had no relations) on the same server, rooted the server of my hoster and put lame and lying message to my web site and also to the mailing list - I not considering it as a deface ;-). It's only lame lying bullshit. And when Laurent is believing in such bullshit and trying to use it as an argument, then it just shows his level of "intelligent". About which I've told already. So, antisnatchor, don't believe in bullshits and nonsense. Best wishes & regards, MustLive Administrator of Websecurity web site http://websecurity.com.ua ----- Original Message ----- From: Michele Orru To: laurent gaffie Cc: MustLive ; full-disclosure@...ts.grok.org.uk Sent: Sunday, February 06, 2011 12:43 PM Subject: Re: [Full-disclosure] Multiple vulnerabilities in SimpGB ahaah. Nice reply Sparky. MustLive, seems you've been defaced :-) antisnatchor _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists