Full Disclosure mailing list archives

RE: GUNINSKI THE SELF-PROMOTER


From: "Scott Renna" <srenna () d-a-s com>
Date: Mon, 21 Jul 2003 09:56:49 -0400

Can you guys stop having a damn pissing contest.  I'm trying to actually
sift through my mail for relevant and important information relating to
security issues.... I don't feel like having to listen to everyone try
to "one-up" each other.  We're all in security together.  Why do you
guys have to care so much about ego?  Don't you have anything else to be
proud of in your life besides your in depth knowledge of security?

Please stop this crap.



***************************
Scott Renna
Head Systems Administrator
Dynamic Animation Systems
703-503-0500

*************************** 

-----Original Message-----
From: full-disclosure-admin () lists netsys com
[mailto:full-disclosure-admin () lists netsys com] On Behalf Of
dhtml () hush com
Sent: Sunday, July 20, 2003 2:19 PM
To: full-disclosure () lists netsys com
Subject: Re: [Full-disclosure] GUNINSKI THE SELF-PROMOTER



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1



Secondly, if you are an advocate of full disclosure, why weren't these

"semi private" exploits revealed along with the other, if you are 
indeed following the full disclosure model?  I think you can't stand 
by your previous word, so you use degrading terms like "kiddie", to 
try and undermine my credibility.  It is quite ridiculous, if you ask 
me.

Young Matthew seems to think that there is some sort of industry
practice whether it be full, part or responsbile disclosure. He is
oblivious to the fact that these nothing more than cute labels others
are trying to append to the work and style of people that  do things.
Mathew is too thick to grasp this and believes that there is formality
to all of this.

I would use the words "liar" and "thief". This is what you are Matthew
:(. Again you are too stupid to realise it and it shall have to be
pointed out to you again.



If anyone here is a troll, it is you.  I have not gone around labeling

people "kiddie" without the slightest knowledge of the background to
their
claims, something that you have done.  You have consistently bashed 
Microsoft, even though you have been completely idle with respect to 
Microsoft since July.  I ask where those claims can possibly come 
from,

unless of course you have other "semi private" exploits, Georgi?

Unfortunately Matthew because you are a liar and thief and moron, your
actions certainly can be considered trollish. Once again, because you
are not aware of any of this, it will have to be pointed out to once
again.


I've learned something about you -- you only stick to your word, and
follow
the standards you've set before, if and when it suits you.  I think
the
word that "dhtml () hush com" (since we have no name for this anonymous
fan of
yours) used fits well here -- turncoat.

I think we have all learnt that you are a liar and a thief and a moron
Matthew :( perhaps you will lern this as well as you age.

Plain and simple.

A.

1. Matthew concludes that Georgi is lying about informing VIM because
Matthew struggles to find any messages about this in the mailing list
archives. Matthew declares that Georgi is a liar twice because of this.

2. Georgi and others reconfirm that in fact that VIM were informed about
this. Plain and simple.

3. Matthew still is unable to accept that he is wrong and has accused
Georgi of lying falsely. This is quite moronic Matthew.

B.

1. Matthew concludes that Microsoft must be doing a good job with their
Trustworthy Initiative because Georgi hasn't published anything in over
a year.  This is Matthew's conclusion and is similr to his moronic
conclusion as in A above.

Matthew you are a certified moron :(

C.

1. Matthew decides that Schneier has made a statmenent that security
vulnerabilities can be completely eliminated

"I think his statement that security vulnerabilities can be completely
eliminated if we want to is silly, and perfectionist in nature".

Of course Schneier did not make any such statement. Matthew is lying.
This is because Matthew is a liar you see :(

2.   Matthew finds a virus or virus generator utilising a well known
and published vulnerability discovered, that core discovery being the
manipulation of spaces in file names and types in the Outlook Express
MUA. Matthew he modifies it and declares to the world that he has
discovered a vulnerability. Matthew is once again lying, because he did
not discover anything. What Matthew did is modify someone else's
discovery and then claim it as his own. Matthew is once again lying and
sadly unaware of it :(

3. Matthew finds an old archived vulnerability report abotu 4 methods of
crashing Internet Explorer, one of which is self-referencing through the
hmtl object associated with the Internet Explorer proprietry html,
actions and behaviors. The core vulnerability technique being looping an
html file in an object. Matthew weaks this finding, and then declares to
the world that he has discovered a vulnerability. Yet again Matthew is
lying as he has not discovered anything. All he has done is modified
someone else's findings. Yet another sad lie in the string of lies from
our friend Matthew the Liar.

D.

As in C 1 and 2 above. Matthew steals two parties original discoveries
and modifies them and then declares to the world that he has discovered
two vulnerabilities. Matthew has stolen two parties findings and made
them his own. This is the nature of the thief and a liar.Matthew Murphy.
In his greed for the spotlight and attention he just takes others
published findings and uses them and claims them to be his own.

In Matthew's mornic conclusion and theiving, lying mind, he will have
you believe that diddling with the file name or the style renders a
brand new discovery. Unable to grasp that the core findings already
published as well known are what make the vulnerability. Because Matthew
is a moron (and a liar and thief), we can demonstrate in the following
simple manner that even a chimp can understand, how Matthew conducts his
thefts:

Martha Muffy discovers and publishes a vulnerability in 1998 to bugtraq
of the following

"if we do this, we crash windows explorer

<script>
window.open("/")
</script>
"

Matthew Murpy the thief, roots around old archives and finds that
published vulnerability and takes and does this which happens to produce
the same results as the original:

if we do this, we crash windows explorer

<script>
window.open("\")
</script>

He then declares to the world, I Matthew Murphy have discovered a
vulnerability.Look at me, aren't I great.

Of course if this were science and had Matthew helped himself to the
pioneering works of others and delcared it to be his own, he would be
shot and pissed on. But this is not science and Matthew is not a
scientist. What he is, is a mornic liar and a thief.

My decision is final.






-----BEGIN PGP SIGNATURE-----
Note: This signature can be verified at https://www.hushtools.com/verify
Version: Hush 2.3

wkYEARECAAYFAj8a3RwACgkQTAj0ZSCgbx5VcwCgsVy2sO2SR61SuSDOXiIEeUQY73MA
mwTN00usb8Ig2uthAK0jV7MRvhVO
=XtHE
-----END PGP SIGNATURE-----




Concerned about your privacy? Follow this link to get
FREE encrypted email: https://www.hushmail.com/?l=2

Free, ultra-private instant messaging with Hush Messenger
https://www.hushmail.com/services.php?subloc=messenger&l=434

Promote security and make money with the Hushmail Affiliate Program: 
https://www.hushmail.com/about.php?subloc=affiliate&l=427
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Current thread: