Discover Habbo's history
Treat yourself with a Secret Santa gift.... of a random Wiki page for you to start exploring Habbo's history!
Happy holidays!
Celebrate with us at Habbox on the hotel, on our Forum and right here!
Join Habbox!
One of us! One of us! Click here to see the roles you could take as part of the Habbox community!


Page 3 of 3 FirstFirst 123
Results 21 to 29 of 29
  1. #21
    Join Date
    May 2007
    Posts
    10,481
    Tokens
    3,140

    Latest Awards:

    Default

    Quote Originally Posted by Jewish Bear View Post
    That's pdf files, you cannot get a virus from an mp3 or .htm file (well I suppose you could from a .htm file redirecting you somewhere, but its' very unlikely)
    You can, there may not be an exploit right now but there has been, that's why you should NEVER open email attachments. Ever..

    If you want proof then listen to some 'Security Now!' podcasts episodes from March-May.
    Chippiewill.


  2. #22
    Join Date
    Oct 2006
    Location
    Peterborough, UK
    Posts
    3,855
    Tokens
    216

    Latest Awards:

    Default

    Quote Originally Posted by 00chips View Post
    You can, there may not be an exploit right now but there has been, that's why you should NEVER open email attachments. Ever..

    If you want proof then listen to some 'Security Now!' podcasts episodes from March-May.

    You can't get a virus from an mp3 file. ever.


    visit my internet web site on the internet
    http://dong.engineer/
    it is just videos by bill wurtz videos you have been warned

  3. #23
    Join Date
    Oct 2007
    Location
    Ireland
    Posts
    2,040
    Tokens
    0

    Latest Awards:

    Default

    Quote Originally Posted by 00chips View Post
    You can, there may not be an exploit right now but there has been, that's why you should NEVER open email attachments. Ever..

    If you want proof then listen to some 'Security Now!' podcasts episodes from March-May.

    The mp3 format does not allow you to execute code

  4. #24
    Join Date
    May 2007
    Posts
    10,481
    Tokens
    3,140

    Latest Awards:

    Default

    Quote Originally Posted by Kevin View Post
    The mp3 format does not allow you to execute code
    The format might not, but you can you say the same for the player?
    Chippiewill.


  5. #25
    Join Date
    Oct 2006
    Location
    Peterborough, UK
    Posts
    3,855
    Tokens
    216

    Latest Awards:

    Default

    Quote Originally Posted by 00chips View Post
    The format might not, but you can you say the same for the player?
    Yes, yes I can.


    visit my internet web site on the internet
    http://dong.engineer/
    it is just videos by bill wurtz videos you have been warned

  6. #26
    Join Date
    Oct 2007
    Location
    Ireland
    Posts
    2,040
    Tokens
    0

    Latest Awards:

    Default

    Quote Originally Posted by 00chips View Post
    The format might not, but you can you say the same for the player?
    hey mr 1337 haxxk0r, do what you believe to be possible, and pm me the download link. I'll test it out on my VM

  7. #27
    Join Date
    May 2007
    Posts
    10,481
    Tokens
    3,140

    Latest Awards:

    Default

    Security Now: Episode 197 23:00 - 28:07

    'It's always scary when an exploit affects data files because everybody who listens to this show, anyway, knows to avoid executables.'

    'And of course you back up data files. So you don't think, oh, a JPG, a PDF, an MP3. Those are harmless.'

    'Well, and somewhere somebody was writing code to parse and process the samples in an MP3 sound file. They weren't thinking about security. They were thinking about getting the darn thing to work so that sounds come out. And it turns out that, as a consequence of that, if you give it a deliberately specially crafted sound file, an MP3 file, it will cause a hiccup in the processing that allows you then to, like, cause the rest of the sound buffer to be jumped into. So you have this special set of samples which causes this integer overflow, which causes the execution of the rest of the buffer. So you literally are putting a program into the sound file with a header that gets this vulnerable version of the library to execute the following code. And as soon as you do that, it can bring in some more code, take over your machine, go off to somewhere malicious, and install backdoors and trojans and worms. And, I mean, it's just the reality of computing today.'

    I iz super 1337 haxxorr

    http://aolradio.podcast.aol.com/sn/SN-187.mp3
    Last edited by Chippiewill; 18-12-2009 at 06:33 PM.
    Chippiewill.


  8. #28
    Join Date
    May 2005
    Location
    /etc/passwd
    Posts
    19,110
    Tokens
    1,139

    Latest Awards:

    Default

    Podcasts are like Wikipedia, usually right, but not always.
    Quote Originally Posted by Chippiewill View Post
    e-rebel forum moderator
    :8

  9. #29
    Join Date
    May 2007
    Posts
    10,481
    Tokens
    3,140

    Latest Awards:

    Default

    Quote Originally Posted by Recursion View Post
    Podcasts are like Wikipedia, usually right, but not always.

    :rolleyes: typical, cannot accept the truth... He is well known in the Security sector and is very well respected. He has one of the most accurate podcasts I know, he actually spends several hours preparing each one to check that his details are correct. If he was not in fact correct (On the rare occasion) he would have brought it up in the subsequent episode. He actually created his own e-commerce system.

    You can look up the guy at grc.com
    Chippiewill.


Page 3 of 3 FirstFirst 123

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •