Vulnerability Development mailing list archives
Re: Award BIOS passwords (was Re: local security workaround through IE)
From: 11a () GMX NET (Bluefish)
Date: Sat, 8 Apr 2000 14:10:06 +0200
And in the spirit of this mail, I just can't resist to mention that www.11a.nu provides a number of open source password deciphers for bioses. I totally agree with Robert A. Seace comments regarding "secrecy" versus full disclosure. ..:::::::::::::::::::::::::::::::::::::::::::::::::.. http://www.11a.nu || http://bluefish.11a.nu eleventh alliance development & security team
Current thread:
- Re: Novell 32bit Client , Passwords, (continued)
- Re: Novell 32bit Client , Passwords Andrew Griffiths (Apr 06)
- Re: local security workaround through IE Jason Brvenik (Apr 03)
- Re: local security workaround through IE Andrew Bennieston (Apr 08)
- Re: local security workaround through IE Javor Ninov (Apr 05)
- Re: local security workaround through IE Wertheimer, Ishai (Apr 06)
- Re: local security workaround through IE Mr Jason C Hill (Apr 06)
- Award BIOS passwords (was Re: local security workaround through IE) Robert A. Seace (Apr 06)
- Re: Award BIOS passwords (was Re: local security workaround through IE) jnzero (Apr 07)
- Kill BIOS dEStr0YEr (Apr 08)
- Re: Kill BIOS Greg Rice (Apr 08)
- Re: local security workaround through IE Mr Jason C Hill (Apr 06)
- Re: Award BIOS passwords (was Re: local security workaround through IE) Bluefish (Apr 08)