Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email firstname.lastname@example.org
Date: Thu Mar 26 2009 - 11:32:58 CDT
-----BEGIN PGP SIGNED MESSAGE-----
Peter, there is no reason to insult this aspiring young computer
scientist and his endeavours to fully disclose information security
errata. Calling him stupid for citing an industry acclaimed source
makes you nothing but arrogant and uneducated. :)
On Wed, 25 Mar 2009 18:13:53 -0400 Pete Licoln
>2009/3/25 Lorenzo Vogelsang <vogelsang.lorenzogmail.com>
>> Neverthless i think that the open redirect vulnerabilty it's
>> because "This vulnerability is used in phishing attacks to get
>> visit malicious sites without realizing it." (
>Well that's actually false, because the person who WANTS to
>someone who TRUST nvdia via this "flaw" need first to control this
>..Or trick a very very dummy person, it's almost the same as if
>you say "
>wow you can do phishing with the ADDTHIS service " only because
>field" can be controlled, without looking at :
>The subject : Link shared by **spoofer**
>The message body : " this spoofed_emailer recommands you to see
>,[Message sent by spooferbla.site via AddThis.com. Please note
>sender's email address has not been verified.]
>Cant do nothing about that, if you're enough silly to believe in
>credibility, an A-V software wont help you too.
-----BEGIN PGP SIGNATURE-----
Version: Hush 3.0
Note: This signature can be verified at https://www.hushtools.com/verify
-----END PGP SIGNATURE-----
Click here to explore the best options for affordable internet service!
Full-Disclosure - We believe in it.
Hosted and sponsored by Secunia - http://secunia.com/