June 2008 Archives by subject
Starting: Sun Jun 1 03:31:01 EDT 2008
Ending: Mon Jun 30 23:54:51 EDT 2008
Messages: 253
- [nsp-sec] ****SPAM**** Attention AOL - Money laundering positions -> United States vacancy opening! (fwd)
Steve Peters
- [nsp-sec] 112.118.131.58 hosting stormworm download.
Smith, Donald
- [nsp-sec] 112.118.131.58 hosting stormworm download.
Smith, Donald
- [nsp-sec] 1640/tcp puzzle.
Scott A. McIntyre
- [nsp-sec] 48 hour vetting: Alessandro Fernandes Martins (Embratel, AS4230)
Scott A. McIntyre
- [nsp-sec] 48 hour vetting: Alessandro Fernandes Martins (Embratel, AS4230)
Guilherme Venere
- [nsp-sec] 48 hour vetting: Denish Hong (CDNetworks, AS38107)
Scott A. McIntyre
- [nsp-sec] 48 hour vetting: Greg Hankins (Force10, AS18508)
Scott A. McIntyre
- [nsp-sec] 48 hour vetting: Greg Hankins (Force10, AS18508)
Patrick W. Gilmore
- [nsp-sec] 48 hour vetting: Greg Hankins (Force10, AS18508)
Alex Rubenstein
- [nsp-sec] 48 hour vetting: Greg Hankins (Force10, AS18508)
Bill Woodcock
- [nsp-sec] 48 hour vetting: Greg Hankins (Force10, AS18508)
Kevin Oberman
- [nsp-sec] 48 hour vetting: Marc Kneppers (Telus, AS852)
Scott A. McIntyre
- [nsp-sec] 48 hour vetting: Marc Kneppers (Telus, AS852)
White, Gerard
- [nsp-sec] 48 hour vetting: Marc Kneppers (Telus, AS852)
Philip Taylor
- [nsp-sec] 48 hour vetting: Marc Kneppers (Telus, AS852)
Krista Hickey
- [nsp-sec] 48 hour vetting: Marc Kneppers (Telus, AS852)
Danny McPherson
- [nsp-sec] 48 hour vetting: Marc Kneppers (Telus, AS852)
James Henry
- [nsp-sec] 48 hour vetting: Marc Kneppers (Telus, AS852)
david.harcourt at bt.com
- [nsp-sec] 48 hour vetting: Marc Kneppers (Telus, AS852)
jonathan.curtis at bell.ca
- [nsp-sec] 48 hour vetting: Marc Kneppers (Telus, AS852)
Chris Calvert
- [nsp-sec] 48 hour vetting: Marc Kneppers (Telus, AS852)
Dave Mitchell
- [nsp-sec] 48 hour vetting: Marc Kneppers (Telus, AS852)
Chris Morrow
- [nsp-sec] 48 hour vetting: Marc Kneppers (Telus, AS852)
Jose Nazario
- [nsp-sec] 48 hour vetting: Rob Hunter (Neotel, AS36937)
Scott A. McIntyre
- [nsp-sec] 48 hour vetting: Stefan Fouant (NeuStar, AS12008, 7786)
Scott A. McIntyre
- [nsp-sec] 48 hour vetting: Stefan Fouant (NeuStar, AS12008, 7786)
Danny McPherson
- [nsp-sec] 48 hour vetting: Stefan Fouant (NeuStar, AS12008, 7786)
Chris Morrow
- [nsp-sec] 48 hour vetting: Warren Kumari (Google, AS15169)
Scott A. McIntyre
- [nsp-sec] 48 hour vetting: Warren Kumari (Google, AS15169)
Chris Morrow
- [nsp-sec] 48 hour vetting: Warren Kumari (Google, AS15169)
Danny McPherson
- [nsp-sec] 48 hour vetting: Warren Kumari (Google, AS15169)
Steve Peters
- [nsp-sec] 598 Compromised hosts
Nicholas Ianelli
- [nsp-sec] 598 Compromised hosts
Nicholas Ianelli
- [nsp-sec] 6Gbps (peak) attack ongoing
Neil Long
- [nsp-sec] 6Gbps (peak) attack ongoing
Neil Long
- [nsp-sec] 6Gbps (peak) attack ongoing
Gabriel Iovino
- [nsp-sec] [ACK 2856 5400]spam bounces drown German university
francesco.catalanotto at bt.com
- [nsp-sec] [ACK 812] 6Gbps (peak) attack ongoing
Philip Taylor
- [nsp-sec] [ACK AS52] spam bounces drown German university
Jason Chambers
- [nsp-sec] [C&C nodes]
Dave Mitchell
- [nsp-sec] [C&C nodes]
Jose Nazario
- [nsp-sec] [C&C nodes]
Dave Mitchell
- [nsp-sec] [SPAM] Re: [SPAM] rundll841.com wwwDOTwin496.com wwwDOTtag58.com err68.com and sysid72.com sqlinjection sites.
Stephen Gill
- [nsp-sec] [SPAM] rundll841.com wwwDOTwin496.com wwwDOTtag58.com err68.com and sysid72.com sqlinjection sites.
Stephen Gill
- [nsp-sec] [SPAM] rundll841.com wwwDOTwin496.com wwwDOTtag58.com err68.com and sysid72.com sqlinjection sites.
John Kristoff
- [nsp-sec] [SPAM] rundll841.com wwwDOTwin496.com wwwDOTtag58.com err68.com and sysid72.com sqlinjection sites.
Chris Morrow
- [nsp-sec] [SPAM] rundll841.com wwwDOTwin496.com wwwDOTtag58.comerr68.com and sysid72.com sqlinjection sites.
Smith, Donald
- [nsp-sec] [SPAM] rundll841.com wwwDOTwin496.com wwwDOTtag58.comerr68.com and sysid72.com sqlinjection sites.
Stephen Gill
- [nsp-sec] Ack 14745: wwwDOTen-us18DOTcom and wwwDOTlocale48DOTcom sql injection sites.
Mike Palladino
- [nsp-sec] ACK 174 RE: amazon blocking
Shelton, Steve
- [nsp-sec] ACK 174 RE: windows-update.lensworks.org - AS29671
Shelton, Steve
- [nsp-sec] ack 2119&8434:amazon blocking
bjorn.jensen at telenor.com
- [nsp-sec] ACK 2828 wwwDOTen-us18DOTcom and wwwDOTlocale48DOTcom sqlinjection sites.
Gong, Yiming
- [nsp-sec] ACK 2828 wwwDOTen-us18DOTcom and wwwDOTlocale48DOTcom sqlinjection sites.
Smith, Donald
- [nsp-sec] ACK 3356 Re: THEPLANET hosting vonage phishing site advertised via smsspam.
David Rossbach
- [nsp-sec] ACK AS3320: AW: Malware on ASN 3320 Deutsche Telekom AG
Quick, P
- [nsp-sec] ACK AS852 - RE: amazon blocking
Chris Calvert
- [nsp-sec] active Bank of America phish site
Justin M. Streiner
- [nsp-sec] active Bank of America phish site
Smith, Donald
- [nsp-sec] active Bank of America phish site
Smith, Donald
- [nsp-sec] amazon attack
Dave Burke
- [nsp-sec] amazon attack
Chris Morrow
- [nsp-sec] amazon attack
Jose Nazario
- [nsp-sec] amazon attack
Smith, Donald
- [nsp-sec] amazon attack
Chris Morrow
- [nsp-sec] amazon attack
Dave Burke
- [nsp-sec] amazon attack
Chris Morrow
- [nsp-sec] amazon attack
Dave Burke
- [nsp-sec] amazon attack
Chris Morrow
- [nsp-sec] Amazon Attack (06/09/2008)
Dave Burke
- [nsp-sec] Amazon Attack (06/09/2008)
Rob Thomas
- [nsp-sec] Amazon Attack (06/09/2008)
Stephen Gill
- [nsp-sec] Amazon Attack (06/09/2008)
Jose Nazario
- [nsp-sec] Amazon Attack (06/09/2008)
Chris Calvert
- [nsp-sec] Amazon Attack (06/09/2008)
Jose Nazario
- [nsp-sec] amazon blocking
Dave Burke
- [nsp-sec] amazon blocking
Chris Morrow
- [nsp-sec] amazon blocking
Daniel Schwalbe
- [nsp-sec] amazon blocking
Stephen Fromm
- [nsp-sec] amazon blocking
Taka Mizuguchi
- [nsp-sec] amazon blocking
Par Osterberg Medina
- [nsp-sec] amazon blocking
Phillip G Deneault
- [nsp-sec] amazon blocking
Tom Sands
- [nsp-sec] amazon blocking
Dave Burke
- [nsp-sec] amazon blocking
Rob Thomas
- [nsp-sec] amazon blocking
Philip Taylor
- [nsp-sec] amazon blocking
Rob Thomas
- [nsp-sec] amazon blocking
Shelton, Steve
- [nsp-sec] amazon blocking
Beasley, Jason
- [nsp-sec] amazon blocking - ACK
Hank Nussbacher
- [nsp-sec] Anti-NATO DDOS in Ukraine
jose nazario
- [nsp-sec] Anti-NATO DDOS in Ukraine
Matthew McGlashan
- [nsp-sec] Anti-NATO DDOS in Ukraine
Yonglin ZHOU
- [nsp-sec] Anyone else seeing a HUGE increase in TCP/1935 from Limelight Networks
John Fraizer
- [nsp-sec] Anyone else seeing a HUGE increase in TCP/1935 from Limelight Networks
Matthew.Swaar at us-cert.gov
- [nsp-sec] Anyone else seeing a HUGE increase in TCP/1935 from Limelight Networks
John Fraizer
- [nsp-sec] Anyone else seeing a HUGE increase in TCP/1935 from Limelight Networks
Jose Nazario
- [nsp-sec] Anyone else seeing a HUGE increase in TCP/1935 from Limelight Networks
John Fraizer
- [nsp-sec] Anyone else seeing a HUGE increase in TCP/1935 from Limelight Networks
Jose Nazario
- [nsp-sec] Anyone else seeing a HUGE increase in TCP/1935 from Limelight Networks
RuthAnne Bevier
- [nsp-sec] Anyone else seeing a HUGE increase in TCP/1935 from Limelight Networks
Sean Donelan
- [nsp-sec] Anyone else seeing a HUGE increase in TCP/1935 from Limelight Networks
John Fraizer
- [nsp-sec] Anyone else seeing a HUGE increase in TCP/1935 from Limelight Networks
Sweeney, William- CIPS
- [nsp-sec] Anyone else seeing a HUGE increase in TCP/1935 from Limelight Networks
Sweeney, William- CIPS
- [nsp-sec] Anyone else seeing a HUGE increase in TCP/1935 from Limelight Networks
Dave Burke
- [nsp-sec] Anyone else seeing a HUGE increase in TCP/1935 from Limelight Networks
Chris Calvert
- [nsp-sec] Anyone else seeing a HUGE increase in TCP/1935 from Limelight Networks
Rob Thomas
- [nsp-sec] Anyone else seeing a HUGE increase in TCP/1935 from Limelight Networks
John Fraizer
- [nsp-sec] Anyone else seeing a HUGE increase in TCP/1935 from Limelight Networks
Kevin Oberman
- [nsp-sec] Anyone else seeing a HUGE increase in TCP/1935 from Limelight Networks
John Fraizer
- [nsp-sec] Anyone else seeing a HUGE increase in TCP/1935 fromLimelight Networks
Smith, Donald
- [nsp-sec] Attention AOL - Money laundering positions -> United States vacancy opening! (fwd)
Joel Rosenblatt
- [nsp-sec] Attention Gmail folks - Money Laundering job post
Joel Rosenblatt
- [nsp-sec] Attention Gmail folks - Money Laundering job post
Peter Moody
- [nsp-sec] Attention Gmail folks - Money Laundering job post
Stephen Gill
- [nsp-sec] Attention Gmail folks - Money Laundering job post
Peter Moody
- [nsp-sec] Attention Google folk
Shelton, Steve
- [nsp-sec] Attention Google folk
Chris Morrow
- [nsp-sec] Attn: ATT (AS7018) 122.169.0.0/17 -> AS64351 ???
Lawrence Baldwin
- [nsp-sec] Attn: ATT (AS7018) 122.169.0.0/17 -> AS64351 ???
Rob Thomas
- [nsp-sec] Cisco Security Advisory: SNMP Version 3 Authentication Vulnerabilities
Cisco Systems Product Security Incident Response Team
- [nsp-sec] Cisco Security Advisory: SNMP Version 3 Authentication Vulnerabilities
Chris Morrow
- [nsp-sec] Cisco Security Advisory: SNMP Version 3 Authentication Vulnerabilities
Eli Dart
- [nsp-sec] Cisco Security Advisory: SNMP Version 3 Authentication Vulnerabilities
Chris Morrow
- [nsp-sec] Cisco Security Advisory: SNMP Version 3Authentication Vulnerabilities
Smith, Donald
- [nsp-sec] Cisco Security Advisory: SNMP Version 3 Authentication Vulnerabilities
Ilker Temir
- [nsp-sec] Compromised/misused MySQL servers?
jose nazario
- [nsp-sec] Compromised/misused MySQL servers?
Scott A. McIntyre
- [nsp-sec] Compromised/misused MySQL servers?
Jose Nazario
- [nsp-sec] Daily Reports Summary for week ending 2008-06-02
Tim Wilde
- [nsp-sec] Daily Reports Summary for week ending 2008-06-09
Tim Wilde
- [nsp-sec] Daily Reports Summary for week ending 2008-06-16
Tim Wilde
- [nsp-sec] Daily Reports Summary for week ending 2008-06-23
Tim Wilde
- [nsp-sec] Daily Reports Summary for week ending 2008-06-30
Tim Wilde
- [nsp-sec] Ddos controller - caatadgouk.com
jose nazario
- [nsp-sec] Ddos controller - caatadgouk.com
Rob Thomas
- [nsp-sec] Ddos controller - caatadgouk.com
Stephen Gill
- [nsp-sec] Ddos controller - caatadgouk.com
Jose Nazario
- [nsp-sec] Ddos controller - caatadgouk.com
Stephen Gill
- [nsp-sec] Ddos controller - caatadgouk.com
John Fraizer
- [nsp-sec] Ddos controller - caatadgouk.com
Ross, Jason
- [nsp-sec] Euro 2008 related DDoS attacks?
Jose Nazario
- [nsp-sec] Euro 2008 related DDoS attacks?
Serge Droz
- [nsp-sec] Euro 2008 related DDoS attacks?
Christoph Sprongl
- [nsp-sec] Euro 2008 related DDoS attacks?
Chris Calvert
- [nsp-sec] Fwd: nsp-security subscription notification
Scott A. McIntyre
- [nsp-sec] Hijacked Netblock: Attn Qwest
Heather Schiller
- [nsp-sec] Hijacked Netblock: Attn Qwest
Hank Nussbacher
- [nsp-sec] Hijacked Netblock: Attn Qwest
Smith, Donald
- [nsp-sec] Hijacked Netblock: Attn Qwest
Heather Schiller
- [nsp-sec] HydraFlux is wootyful delicious - Re: rundll841.com wwwDOTwin496.com wwwDOTtag58.com err68.comand sysid72.com sqlinjection sites.
William Salusky
- [nsp-sec] HydraFlux is wootyful delicious - Re: rundll841.com wwwDOTwin496.com wwwDOTtag58.com err68.comand sysid72.com sqlinjection sites.
Chris Morrow
- [nsp-sec] HydraFlux is wootyful delicious - Re: rundll841.com wwwDOTwin496.com wwwDOTtag58.com err68.comand sysid72.com sqlinjection sites.
William Salusky
- [nsp-sec] HydraFlux is wootyful delicious - Re: rundll841.com wwwDOTwin496.com wwwDOTtag58.com err68.comand sysid72.com sqlinjection sites.
White, Gerard
- [nsp-sec] HydraFlux is wootyful delicious - Re: rundll841.com wwwDOTwin496.com wwwDOTtag58.com err68.comand sysid72.com sqlinjection sites.
William Salusky
- [nsp-sec] ICMP packet love (AUSCERT#20082a5b7)
Robert Lowe
- [nsp-sec] ISOI 5
Smith, Donald
- [nsp-sec] ISOI 5
Hank Nussbacher
- [nsp-sec] ISOI 5
Ariel Biener
- [nsp-sec] ISOI 5
Smith, Donald
- [nsp-sec] ISOI 5
Hank Nussbacher
- [nsp-sec] ISOI 5
Smith, Donald
- [nsp-sec] j.root-servers.net ddos earlier?
Jose Nazario
- [nsp-sec] jtk is moving
John Kristoff
- [nsp-sec] Juniper Networks advisory re SNMPv3
Paul Goyette
- [nsp-sec] Juniper Networks advisory re SNMPv3
Smith, Donald
- [nsp-sec] Juniper Networks advisory re SNMPv3
Paul Goyette
- [nsp-sec] Juniper Networks advisory re SNMPv3
Smith, Donald
- [nsp-sec] Leaving Pipex (AS25346)
Sven Huster
- [nsp-sec] Leaving Qwest
Perry, Andrew
- [nsp-sec] live phish (ping yahoo/akamai)
Nishal Goburdhan
- [nsp-sec] live phish (ping yahoo/akamai)
Dave Mitchell
- [nsp-sec] live phish (ping yahoo/akamai)
Smith, Donald
- [nsp-sec] live phish (ping yahoo/akamai)
Dave Mitchell
- [nsp-sec] Malware on ASN 3320 Deutsche Telekom AG
Juan Carlos Guel Lopez
- [nsp-sec] Mid 2008 - State of the net?
jose nazario
- [nsp-sec] msn trojan (ping microsoft)
Ross, Jason
- [nsp-sec] MW Distribution site AS36351 | 67.228.238.122
Serge Droz
- [nsp-sec] MW injecting IPs
Serge Droz
- [nsp-sec] nadnadzzz.info
Serge Droz
- [nsp-sec] NET-SNMP/UCB-SNMP SNMP Version 3 AuthenticationVulnerabilities
Smith, Donald
- [nsp-sec] OT: Lunch Table at FIRST
Barry Raveendran Greene
- [nsp-sec] Paging Yahoo! - Phishing account
Daniel Adinolfi
- [nsp-sec] Paging Yahoo! - Phishing account
White, Gerard
- [nsp-sec] Paging Yahoo! - Phishing account
Seth Hall
- [nsp-sec] Paging Yahoo! - Phishing account
SURFcert - Peter
- [nsp-sec] Paging Yahoo! - Phishing account
Seth Hall
- [nsp-sec] Paging Yahoo! - Phishing account
Krista Hickey
- [nsp-sec] Paging Yahoo! - Phishing account
Dave Mitchell
- [nsp-sec] Pinch C&C with compromised FTP accounts (5000+)
Dave Woutersen (GOVCERT.NL)
- [nsp-sec] Pinch C&C with compromised FTP accounts (5000+)
Chris Morrow
- [nsp-sec] Pinch C&C with compromised FTP accounts (5000+)
David Freedman
- [nsp-sec] Pinch C&C with compromised FTP accounts (5000+)
Chris Morrow
- [nsp-sec] Ping google/gmail - gmail mule address (AUSCERT#20057c5a8)
matthew at auscert.org.au
- [nsp-sec] Ping google/gmail - gmail mule address (AUSCERT#20057c5a8)
Peter Moody
- [nsp-sec] Ping Yahoo: C&C domain at Yahoo NS (chat-shqip.org)
Dave Woutersen (GOVCERT.NL)
- [nsp-sec] Possible security issue with CDP
Hank Nussbacher
- [nsp-sec] Rise in TCP 1100/1106 scanning - HP StorageWorks
jose nazario
- [nsp-sec] Rise in TCP 1100/1106 scanning - HP StorageWorks
jose nazario
- [nsp-sec] Rise in TCP 1100/1106 scanning - HP StorageWorks
jose nazario
- [nsp-sec] rundll841.com wwwDOTwin496.com wwwDOTtag58.com err68.com and sysid72.com sqlinjection sites.
Smith, Donald
- [nsp-sec] rundll841.com wwwDOTwin496.com wwwDOTtag58.com err68.com and sysid72.com sqlinjection sites.
William Salusky
- [nsp-sec] rundll841.com wwwDOTwin496.com wwwDOTtag58.com err68.comand sysid72.com sqlinjection sites.
Smith, Donald
- [nsp-sec] rundll841.com wwwDOTwin496.com wwwDOTtag58.com err68.comand sysid72.com sqlinjection sites.
William Salusky
- [nsp-sec] rundll841.com wwwDOTwin496.com wwwDOTtag58.com err68.comandsysid72.com sqlinjection sites.
Smith, Donald
- [nsp-sec] rundll841.com wwwDOTwin496.com wwwDOTtag58.com err68.comand sysid72.com sqlinjection sites.
White, Gerard
- [nsp-sec] rundll841.com wwwDOTwin496.com wwwDOTtag58.com err68.comandsysid72.com sqlinjection sites.
William Salusky
- [nsp-sec] Save the Date - NSP-SEC Summit - 18th and 19th Sept -
Barry Raveendran Greene
- [nsp-sec] Spam bombed help needed
Hank Nussbacher
- [nsp-sec] spam bounces - the sending bots
Andreas Bunten
- [nsp-sec] spam bounces - the sending bots
Stephen Gill
- [nsp-sec] spam bounces - the sending bots
Andreas Bunten
- [nsp-sec] spam bounces drown German university
Andreas Bunten
- [nsp-sec] spam bounces drown German university
Stephen Gill
- [nsp-sec] spam bounces drown German university
Jon Lewis
- [nsp-sec] spam bounces drown German university
Rafi Sadowsky
- [nsp-sec] spam bounces drown German university
Chris Morrow
- [nsp-sec] spam bounces drown German university
Serge Droz
- [nsp-sec] spam bounces drown German university
Joel Rosenblatt
- [nsp-sec] Spear phish of the Day - Pinging MSN
Joel Rosenblatt
- [nsp-sec] Spear phish of the Day - Pinging MSN
White, Gerard
- [nsp-sec] TCP-23 Increase
Matthew.Swaar at us-cert.gov
- [nsp-sec] TCP-23 Increase
Jose Nazario
- [nsp-sec] TCP-23 Increase
Sean Donelan
- [nsp-sec] TCP-23 Increase
Smith, Donald
- [nsp-sec] TCP-23 Increase
Marc Kneppers
- [nsp-sec] TCP-23 Increase
Jason Chambers
- [nsp-sec] TCP-23 Increase
Daniel, Sandie M CTR JTF-GNO J3
- [nsp-sec] TCP-23 Increase
Yiming Gong
- [nsp-sec] TCP-23 Increase
Daniel, Sandie M CTR JTF-GNO J3
- [nsp-sec] TCP-23 Increase
Rob Thomas
- [nsp-sec] THEPLANET hosting vonage phishing site advertised via sms spam.
Smith, Donald
- [nsp-sec] Thoughts on the mass SQL injections
Seth Hall
- [nsp-sec] Thoughts on the mass SQL injections
Smith, Donald
- [nsp-sec] Thoughts on the mass SQL injections
Chris Morrow
- [nsp-sec] Thoughts on the mass SQL injections
Smith, Donald
- [nsp-sec] Thoughts on the mass SQL injections
Seth Hall
- [nsp-sec] Thoughts on the mass SQL injections
Chris Morrow
- [nsp-sec] Thoughts on the mass SQL injections
Chris Morrow
- [nsp-sec] Thoughts on the mass SQL injections
Smith, Donald
- [nsp-sec] Thoughts on the mass SQL injections
Yonglin ZHOU
- [nsp-sec] Thoughts on the mass SQL injections
Shelton, Steve
- [nsp-sec] Thoughts on the mass SQL injections
Smith, Donald
- [nsp-sec] US IRS phishing [AS34011, AS16276, AS3215]
William Allen Simpson
- [nsp-sec] US IRS phishing [AS34011, AS16276, AS3215]
Joe St Sauver
- [nsp-sec] VoIP scanning/abuse -> MyCERT/TTNET-MY
Nicolas FISCHBACH
- [nsp-sec] VoIP scanning/abuse -> MyCERT/TTNET-MY
White, Gerard
- [nsp-sec] VoIP scanning/abuse -> MyCERT/TTNET-MY
Rob Thomas
- [nsp-sec] VoIPshield Laboratories - VoIP Patches today?
White, Gerard
- [nsp-sec] What is this SNMP vulnerability day? asn1 vulnerability in linux kernel 2.4
Smith, Donald
- [nsp-sec] windows-update.lensworks.org - AS29671
Brian Allen
- [nsp-sec] wwwDOTen-us18DOTcom and wwwDOTlocale48DOTcom sql injection sites.
Smith, Donald
Last message date:
Mon Jun 30 23:54:51 EDT 2008
Archived on: Thu Jan 22 18:51:59 EST 2015
This archive was generated by
Pipermail 0.09 (Mailman edition).