On Sat, 16 Feb 2008 06:06:37 -0600, Gerald Vogt <vogt@spamcop.net> wrote:
> On Feb 16, 8:48 pm, "Bear Bottoms" <bearbotto...@gmai.com> wrote:
>> On Sat, 16 Feb 2008 04:54:48 -0600, Sebastian G. <se...@seppig.de>
>> wrote:
>> > shatter attacks
>>
>> It is as easy as: Wikipedia:In computing, a shatter attack is a
>> programming technique employed by hackers on Microsoft Windows operating
>> systems that can be used to bypass security restrictions between
>> processes
>> in a session. A shatter attack takes advantage of a design flaw in
>> Windows's message-passing system whereby arbitrary code could be
>> injected
>> into any other running application or service in the same session, that
>> makes use of a message loop. This could result in a privilege escalation
>> exploit.
>
> If you stood in a library and someone came to you (assuming you are
> not a librarian) and asked you for the name of the capital of
> Timbuktu, you would run and go and pick the next encyclopedia, look it
> up, copy it, and give it to the person in question? You would not just
> wonder whether that person was a little bit crazy or wonder whether
> that person thought you were a librarian and paid for that job? You
> would not tell that person that it should check a encyclopedia??
> Astonishing... ;-)
>
> Gerald
LOL...we are not in a Library, and if someone asked a question to a group
even in a Library...you would expect everyone in the group to go look it
up for themselves, rather than have one person easily present
it...astonishing.
--
Bear Bottoms
Freeware Website http://bearware.info


Reply With Quote