On 16 feb, 13:06, Gerald Vogt <v...@spamcop.net> wrote:
> On Feb 16, 8:48 pm, "Bear Bottoms" <bearbotto...@gmai.com> wrote:
>
> > On Sat, 16 Feb 2008 04:54:48 -0600, Sebastian G. <se...@seppig.de> wrote:
> > > shatter attacks
>
> > It is as easy as: Wikipedia:In computing, a shatter attack is a
> > programming technique employed by hackers on Microsoft Windows operating
> > systems that can be used to bypass security restrictions between processes
> > in a session. A shatter attack takes advantage of a design flaw in
> > Windows's message-passing system whereby arbitrary code could be injected
> > into any other running application or service in the same session, that
> > makes use of a message loop. This could result in a privilege escalation
> > exploit.
>
> If you stood in a library and someone came to you (assuming you are
> not a librarian) and asked you for the name of the capital of
> Timbuktu, you would run and go and pick the next encyclopedia, look it
> up, copy it, and give it to the person in question? You would not just
> wonder whether that person was a little bit crazy or wonder whether
> that person thought you were a librarian and paid for that job? You
> would not tell that person that it should check a encyclopedia??
> Astonishing... ;-)
This is not a library, this is usenet.
FYI: Timbuktu is the captial of the region Timbuktu in Mali.


Reply With Quote