Full Disclosure mailing list archives
Re: African ISP SekuritY
From: "Benji" <me () b3nji com>
Date: Wed, 27 Oct 2010 11:30:06 +0000
Isn't it still a hack depending on how the u/p were obtained? Could someone please explain the definition based difference between a breach and a hack? Sent from my BlackBerry® wireless device -----Original Message----- From: Bill Hicks <420b1llh1cks () gmail com> Sender: full-disclosure-bounces () lists grok org uk Date: Wed, 27 Oct 2010 10:13:33 To: <full-disclosure () lists grok org uk> Subject: Re: [Full-disclosure] African ISP SekuritY _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- African ISP SekuritY Louis McCarty (Oct 25)
- Re: African ISP SekuritY Kenneth Voort (Oct 25)
- Re: African ISP SekuritY Duboucher Thomas (Oct 25)
- Re: African ISP SekuritY Benji (Oct 25)
- <Possible follow-ups>
- Re: African ISP SekuritY dramacide (Oct 25)
- Re: African ISP SekuritY Bill Hicks (Oct 27)
- Re: African ISP SekuritY Benji (Oct 27)
- Re: African ISP SekuritY [lesh] Ivan Nikolic (Oct 27)
- Re: African ISP SekuritY Christopher Grant (Oct 27)
- Re: African ISP SekuritY Jubei Trippataka (Oct 27)
- Re: African ISP SekuritY Benji (Oct 27)