Penetration Testing mailing list archives
OOO FLAME
From: Jon Kibler <Jon.Kibler () aset com>
Date: Fri, 12 Sep 2008 19:36:10 -0400
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 <RANT> Hey y'all, This is supposed to be a group for pen testers. Isn't it kinda lame for pen testers to be broadcasting OOO messages to the world? Especially to other pen testers? Especially from your work email address? Can you say, "Hack me please! I am not in the office to see what you are doing to my (choose one or more of the following) network / servers / web site / database / users." Come on now, let's get with it! If you have to send OOO messages, PLEASE at least filter them so that they do not get outside of your organization -- or, especially to mailing lists! Ever time I post to this group (and other SF groups), I seem to get about a dozen bounces from either OOO messages or 'you do not have permission to post to Google groups.' Which brings up another point: What is with all the Google groups bounces? If this is a SF auto-post thing, could someone in SF *PLEASE* obfuscate the sender's email address so s/he does not get all those (expletive deleted) bounces? If it is the result of some lamer in this group, will you *PLEASE* find some other way to do the posting without the author getting flamed for trying to post when they do not have permission? </RANT> Thank you for your indulgence. Jon K. - -- Jon R. Kibler Chief Technical Officer Advanced Systems Engineering Technology, Inc. Charleston, SC USA o: 843-849-8214 c: 843-224-2494 s: 843-564-4224 http://www.linkedin.com/in/jonrkibler My PGP Fingerprint is: BAA2 1F2C 5543 5D25 4636 A392 515C 5045 CF39 4253 -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.8 (Darwin) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iEYEARECAAYFAkjK/OoACgkQUVxQRc85QlOEeQCeKdcWArFnoPiGIjg+ItDVIVfm P2IAn3HscnmuK2iTkY7QA/Qb4GEsPT+G =xWAK -----END PGP SIGNATURE----- ================================================== Filtered by: TRUSTEM.COM's Email Filtering Service http://www.trustem.com/ No Spam. No Viruses. Just Good Clean Email.
------------------------------------------------------------------------ This list is sponsored by: Cenzic Top 5 Common Mistakes in Securing Web Applications Get 45 Min Video and PPT Slides www.cenzic.com/landing/securityfocus/hackinar ------------------------------------------------------------------------
Current thread:
- OOO FLAME Jon Kibler (Sep 13)
- RE: OOO FLAME Erin Carroll (Sep 13)
- Re: OOO FLAME Martin Zember (Sep 14)
- Re: OOO FLAME Tim (Sep 14)
- WRAP-UP - RE: OOO FLAME Erin Carroll (Sep 14)
- Re: OOO FLAME Razi Shaban (Sep 13)
- <Possible follow-ups>
- Re: OOO FLAME ray . hawkins (Sep 14)
- RE: OOO FLAME Erin Carroll (Sep 14)
- EXAMPLE: Why OOO is *BAD* [WAS: Re: OOO FLAME] Jon Kibler (Sep 14)
- Re: EXAMPLE: Why OOO is *BAD* [WAS: Re: OOO FLAME] Michael Boman (Sep 14)
- Re: EXAMPLE: Why OOO is *BAD* [WAS: Re: OOO FLAME] Trygve Aasheim (Sep 15)
- RE: OOO FLAME Erin Carroll (Sep 14)
- RE: OOO FLAME Erin Carroll (Sep 13)