Full Disclosure mailing list archives
Re: [Professional IT Security Providers - Exposed] QuietMove ( D - )
From: reepex <reepex () gmail com>
Date: Tue, 1 Jan 2008 13:49:47 -0600
your attitude sure has changed since your last post. Maybe you shouldn't sound so commanding on a real list next time and instead stick to your local 2600 meetings. On Jan 1, 2008 1:08 PM, Marcin Wielgoszewski <marcinw86 () gmail com> wrote:
You're right. I'm new and young and I'll be the first to admit it. We can't all be born security gurus, and I'm not trying to hide that, but me aside... what have you done besides hide behind your gmail account and troll FD? Thanks for pointing out those two pages, two pages out of 100's that were posted a long time ago and yes, are very out of date. On Jan 1, 2008 1:33 PM, reepex <reepex () gmail com> wrote:You are worthless. http://www.tssci-security.com/bookshelf/ Is this list up to date? It makes it seem as if you are learning basic linux commands, sed, and basic perl. Also why are you reading operating system design and implementation when you do not know C? ( Seeing as Cbooksare in your 'to-read' list ). Do you understand any of the code in itor doyou just pick out buzz words to talk about at your 'local meet-ups'. Why dont you explain the finer points of microkernel design to us? You are headed even further down the path of complete lamer seeing asyouread books on XSS and all your blog posts revolve around it. even more lulz in your 'plan to read' containing books on fuzzing, metasploit, and writing rootkits. How can you write rootkits when you donotknow C and are learning basic unix commands?... lol Hopefully one day you realize that you are just another securityindustrykiddie and have no real knowledge, but probably not. Seeing as you haveyour'bachelors' ( lol - has nothing to do with security ) - I am sure youarewell on your way to a cissp. Also for good laugh speople should read: http://www.tssci-security.com/projects/ how long did it take you to write all 40 lines of your 'labs' code? Ishallnotify perl underground of your horrendous perl and you shalll be asourceof great lulz in their next production. Just found this:http://www.tssci-security.com/blog/wp-content/uploads/2007/11/mwielgoszewski_resume.pdfSo you worked 4 places and did nothing useful. Sounds like SImon maywant tohire you. ( Hi simon , are your workers still inadequate and you needmorehelp? ) So basically you have worked 4 jobs, went to a community college thathassome sort of security program, you know basic perl and C, do not knowhow toaudit any real programs, and blog about XSS. Does this summarize you pretty well?
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- Re: [Professional IT Security Providers - Exposed] QuietMove ( D - ) Marcin Wielgoszewski (Jan 01)
- Re: [Professional IT Security Providers - Exposed] QuietMove ( D - ) Adam Muntner (Jan 01)
- Re: [Professional IT Security Providers - Exposed] QuietMove ( D - ) reepex (Jan 01)
- Re: [Professional IT Security Providers - Exposed] QuietMove ( D - ) Jeffrey Denton (Jan 01)
- Re: [Professional IT Security Providers - Exposed] QuietMove ( D - ) Marcin Wielgoszewski (Jan 01)
- Re: [Professional IT Security Providers - Exposed] QuietMove ( D - ) reepex (Jan 01)
- Re: [Professional IT Security Providers - Exposed] QuietMove ( D - ) Valdis . Kletnieks (Jan 02)