Gerwin Schnittjer | 19 Apr 16:01 2016
Gravatar

Fw: new important message

Hello!

 

New message, please read http://www.hilltopturfandlandscapes.com/radar.php

 

Gerwin Schnittjer

maria karlberg | 11 Feb 01:54 2016
Picon

Fw: new important message

Hello!

 

New message, please read http://pileczki.pl/replied.php

 

maria karlberg

Daniel | 15 Dec 18:58 2015
Picon

Re: Fw: important message

Nice try.

On 11/20/2015 04:23 PM, richard scott wrote:
<!-- /* Font Definitions */ <at> font-face {font-family:"Cambria Math"; panose-1:2 4 5 3 5 4 6 3 2 4;} <at> font-face {font-family:Calibri; panose-1:2 15 5 2 2 2 4 3 2 4;} /* Style Definitions */ p.MsoNormal, li.MsoNormal, div.MsoNormal {margin:0cm; margin-bottom:.0001pt; font-size:11.0pt; font-family:"Calibri",sans-serif; mso-fareast-language:EN-US;} a:link, span.MsoHyperlink {mso-style-priority:99; color:#0563C1; text-decoration:underline;} a:visited, span.MsoHyperlinkFollowed {mso-style-priority:99; color:#954F72; text-decoration:underline;} span.EmailStyle17 {mso-style-type:personal-compose; font-family:"Calibri",sans-serif; color:windowtext;} .MsoChpDefault {mso-style-type:export-only; font-family:"Calibri",sans-serif; mso-fareast-language:EN-US;} <at> page WordSection1 {size:612.0pt 792.0pt; margin:2.0cm 42.5pt 2.0cm 3.0cm;} div.WordSection1 {page:WordSection1;} -->

Hello!

 

New message, please read http://e-targi.org/hear.php

 

richard scott


Gerke M. Preussner | 20 Sep 11:48 2015
Picon

(kein Betreff)


Simon Maurer | 20 Jun 19:49 2015
Picon

selinux + systemd

Hi,
I tried to use selinux with systemd, but without much success. Looks
like the whole transitioning is broken. (Most daemons are stuck in the
init_t domain) What I don't understand is, while more and more disros
switching to systemd, it seems like there is still no working selinux
policy with systemd support. So how do other distros support selinux?

While I'm tying to figure this selinux thingy out, a few questions came
to mind:
Most packages with the selinux use flag are just pulling their reference
policy module as a dependency. Wouldn't it be better to use the seinux
flag only for packages which are linked against libselinux and use
instead a SELINUX_MODULES variable in the make.conf file (similar to
APACHE2_MODULES)?

The tresys reference policy uses the distro_gentoo directive, but AFAIK
it only affects openrc stuff. So shouldn't it be renamed to init_openrc?

Best regards,
Simon

eduardo lenz | 15 Jul 07:19 2014
Picon

Resposta automática

This account is not active. Please send e-mails to lenz <at> joinville.udesc.br.

cfp | 15 Jul 07:16 2014
Picon

Ruxcon 2014 Final Call For Presentations

______________________________________________________________ _._) (_._ | .%$$% .. | ' __________. ._____ ________.&&$ '$$%$.__________ ' ._\ /___.___\ \_____/ ____/$ &&$\ /_ -:-\ \_____\ | /____/ /________\'$#%. .$&&'/____/ /-:- /____/ \________/ \____\ ' %$$$%' /_____/ . www.ruxcon.org.au . _|_ _|_ '(______________________________________________________________)'
Introduction

The Ruxcon team is pleased to announce the Final Call For Presentations for Ruxcon 2014.

This year the conference will take place over the weekend of the 11th and 12th of October at the CQ Function Centre, Melbourne, Australia.

The deadline for submissions is the 15th of September, 2014.

About Ruxcon

Ruxcon is the premier technical computer security conference in Australia. The conference aims to bring together the individual talents of the best and brightest security folk in the region, through live presentations, activities and demonstrations.

The conference is held over two days in a relaxed atmosphere, allowing attendees to enjoy themselves whilst networking within the community and expanding their knowledge of security.

Live presentations and activities will cover a full range of defensive and offensive security topics, varying from previously unpublished research to required reading for the security community.

Important Dates

  • September 15 - Call For Presentations Close
  • October 6-7 - Ruxcon/Breakpoint Training
  • October 8-9 - Breakpoint Conference
  • October 11-12 - Ruxcon Conference

Topic Scope

Topics of interest include, but are not limited to:

  • Mobile Device Security
  • Virtualization, Hypervisor, and Cloud Security
  • Malware Analysis
  • Reverse Engineering
  • Exploitation Techniques
  • Rootkit Development
  • Code Analysis
  • Forensics and Anti-Forensics
  • Embedded Device Security
  • Web Application Security
  • Network Traffic Analysis
  • Wireless Network Security
  • Cryptography and Cryptanalysis
  • Social Engineering
  • Law Enforcement Activities
  • Telecommunications Security (SS7, 3G/4G, GSM, VOIP, etc)
Submission Guidelines

In order for us to process your submission we require the following information:

1. Presentation title
2. Detailed summary of your presentation material
3. Name/Nickname
4. Mobile phone number
5. Brief personal biography
6. Description of any demonstrations involved in the presentation
7. Information on where the presentation material has or will be presented before Ruxcon

As a general guideline, Ruxcon presentations are between 45 and 60 minutes, including question time.

Please note that Ruxcon isn't able to cover any travel expenses for speakers. Speakers in the past have had success in having their employer cover conference related expenses. Our other conference Breakpoint does cover travel expenses and runs 3 days before Ruxcon.

If you have any enquiries about submissions, or would like to make a submission, please send an email to presentations <at> ruxcon.org.au

cfp | 7 May 02:34 2014
Picon

Breakpoint 2014 Call For Presentations

Breakpoint 2014 Call For Papers
Melbourne, Australia, October 8th-9th
Intercontinental Rialto
http://www.ruxconbreakpoint.com

.[x]. Introduction .[x].

 The Ruxcon team is pleased to announce Call For Papers for Breakpoint 2014.

 Breakpoint showcases the work of expert security researchers from around the
 world on a wide range of topics. This conference is organised by the Ruxcon 
 team and offers a specialised security conference to complement and lead into 
 the larger and more casual Ruxcon weekend conference. 

.[x]. Important Dates .[x].

 May 1 - Call For Presentations Open
 August 30 - Call For Presentations Close
 October 6-7 - Breakpoint Training
 October 8-9 - Breakpoint Conference
 October 11-12 - Ruxcon Conference

.[x]. Topic Scope .[x].

Topics of interest include, but are not limited to:

 o Mobile Device Security
 o Exploitation Techniques
 o Reverse Engineering
 o Vulnerability Discovery
 o Rootkit Development
 o Malware Analysis
 o Code Analysis
 o Virtualisation, Hypervisor Security
 o Cloud Security
 o Embedded Device Security
 o Hardware Security
 o Telecommunications Security
 o Wireless Network Security
 o Web Application Security
 o Law Enforcement Activities
 o Forensics
 o Threat Intelligence

.[x]. Submission Guidelines .[x].

 In order for us to process your submission we will require the following 
 information:

 1. Presentation title
 2. Detailed summary of your presentation material
 3. Name/Nickname
 4. Mobile phone number
 5. Brief personal biography
 6. Description of any demonstrations involved in presentation
 7. Information on where the presentation material has or will be presented 
    before Breakpoint

 * Preference will be given to presentations that contain original research 
   that will be first presented at Breakpoint. 
 * As a general guideline, Breakpoint presentations are between 
   45 and 60 minutes, including question time. 

 If you have any questions about submissions, or would like to make a 
 submission, please send an email to submissions <at> ruxconbreakpoint.com

.[x]. Speaker Benefits .[x].

 Speakers at Breakpoint will be entitled to the following benefits:                                                

 - A return economy airfare to Melbourne (total cost limit applies)
 - Three nights accommodation at the Intercontinental Rialto
 - Complimentary registration for Breakpoint and Ruxcon conferences
 - Invitation to all Breakpoint and Ruxcon parties

 * All speaker benefits apply to a single speaker per submission. 

.[x]. Contact .[x]. 

 If you have any questions or inqueries, contact us at:

 * Email:	submissions <at> ruxconbreakpoint.com
 * Twitter:	 <at> ruxconbpx

Jo | 9 Apr 18:39 2014
Picon

Regeneration of gpg keys after HeartBleed

Hi all, this is my first post in this list, so again Hi all!

I'm a bit concerned about the signing keys of the portage tree releases,
I know that gpg is not the same as openssl but keeping in mind that SSH,
VPN, HTTPS keys might be compromised for two years, don't you think it's
a healthy measure to generate a new pair of keys?

Thank you

Samuel Damashek | 18 Jan 05:25 2014
Picon

glksa-check Proof of Concept


At the request of creffett, I created a Proof of Concept for
glksa-check, which allows for glksa XML files to define Kernel
security vulnerabilities. Please realize that this is a Proof of
Concept, and that the interface is not the most user-friendly. The
code can definitely be improved as well. To test the program, untar
the files and copy the glksa dir to /usr/portage/metadata/. At the
moment, the script requires you to have /proc/config.gz enabled in
your kernel to read your running config options.

I have two XML files currently defined (still using the glsa.dtd
schema); one that is an actual vulnerability and one that is simply a
control that triggers on X86. To test the program, run it with the -l
option.

You can download the files at http://sdamashek.me/files/glksa.tar.gz
(not sure if the mailing lists let you attach tarballs). There is
definitely a lot to be improved about the application; this is just an
idea for how to handle notifying users about Kernel vulnerabilities
that affect their system. They would be released just like glsas. What
are the list's opinions on this?

--
Samuel Damashek
Sascha Wolf | 10 Jan 16:02 2014
Picon

Soliciting feedback for the GLSA-2 format

Hi,

I  find  the  new  version of GLSA format very interesting, especially
with the backdrop of the automated evaluation of vulnerabilities.

Would  it  be  possible  to  specify  in  which branch of Gentoo, this
program is usually installed? For example, "stable" or "unstable"?

So you can better see if you are actively involved or not.

--

-- 
Best regards,
 Sascha Wolf
Attachment (smime.p7s): application/pkcs7-signature, 7827 bytes

Gmane