Path: news.nzbot.com!spool1.sonic-news.com!news-out.sonic-news.com!not.news-service.com!not.alt.net!not.highwinds-media.com!dr5!sd16!feeder.news-service.com!feeder.news-service.com!feeder1.cambriumusenet.nl!feeder3.cambriumusenet.nl!feed.tweaknews.nl!209.197.12.246.MISMATCH!nx02.iad01.newshosting.com!newshosting.com!69.16.185.11.MISMATCH!npeer01.iad.highwinds-media.com!news.highwinds-media.com!feed-me.highwinds-media.com!Xl.tags.giganews.com!border1.nntp.dca.giganews.com!nntp.giganews.com!local2.nntp.dca.giganews.com!news.giganews.com.POSTED!not-for-mail
NNTP-Posting-Date: Fri, 12 Mar 2010 15:32:41 -0600
From: Rebulon Ruster <reb.ruster@gmail.com>
Newsgroups: alt.binaries.chakotay
Subject: Re: Test - 1 attachment
Date: Fri, 12 Mar 2010 16:32:25 -0500
Message-ID: <ghclp59kf4ge5joqclf671gcmd1dg8vd3b@4ax.com>
References: <Xns9D2E5A4794336rebrustergmailcom@207.246.207.165> <va25p5dot8a6niarp63l3hnbthoc10or2n@4ax.com> <2010031107381916807-K@examplecom>
X-Newsreader: Forte Agent 6.00/32.1186
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Lines: 18
X-Usenet-Provider: http://www.giganews.com
X-Trace: sv3-KgQCjkDjGLLIaPypnsXOP8Sqce4MkaBAD/apqdS3SSn3IiuEyOnjRgATLLgvcTCt4hGmp+tb7X7odrX!hW+S1pSpCIkyjrwUJnt2MYVwHgiDkysfS58DP1U8AX7FgrZaJUf6PPd25hyiKp6aoaBxPKU=
X-Complaints-To: abuse@giganews.com
X-DMCA-Notifications: http://www.giganews.com/info/dmca.html
X-Abuse-and-DMCA-Info: Please be sure to forward a copy of ALL headers
X-Abuse-and-DMCA-Info: Otherwise we will be unable to process your complaint properly
X-Postfilter: 1.3.40
Xref: news.nzbot.com alt.binaries.chakotay:2669
On Thu, 11 Mar 2010 07:38:19 +0000, K <K@example.com> wrote:
>On 2010-03-06 16:57:23 +0000, Rebulon Ruster said:
>
>> On 01 Mar 2010 13:52:36 GMT, Rebulon Ruster <reb.ruster@gmail.com>
>> wrote:
>>
>>> Overture Password
>>
>> www.securekit.com.
>
>Be careful: http://homepage.mac.com/adonismac/Advisory/steg/steganography.html
I tested the method used by the Authors on the above link and it
appears that they are correct, the stegged files can be succesfully
hacked using binary data replacement. I will not be using this method
with the faulted software. Thank you for bringing this to my
attention. I will notify the software manufacturer of this problem.
|
|