IMPLICATION: That an active hacker has a significant role in a company offering security solutions. This behavior is an absolute 'no' in the world of security consulting. If it is known that active hackers populate a security team, what guarantees exist that they will behave ethically when doing consulting work on your network?
PROOF: The following mail proves that "so1o", a.k.a Chris McNab holds a significant position in Network Security Solutions Ltd. ---------- Forwarded message ---------- Received: from ( []) by (8.8.7/8.8.7) with ESMTP id MAA22054 for (; Sun, 11 Apr 1999 12:22:24 -0400 (EDT) From: Received: from ( []) by (8.8.7/8.8.7) with ESMTP id MAA18125 for (; Sun, 11 Apr 1999 12:22:22 -0400 (EDT) Received: from (t@glm001 []) by (8.7.5/8.x.x) with SMTP id RAA26418 for (; Sun, 11 Apr 1999 17:22:29 +0100 (BST) Message-ID: ( Date: Sun, 11 Apr 1993 17:22:25 -0700 Organization: X-Mailer: Mozilla 3.01 (Win95; I; 16bit) MIME-Version: 1.0 To: Ken Williams ( Subject: Re: 2.6 md5's References: ( Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit X-UIDL: 90e8e8bdcef936724ed2ef7fd94a63f1 Hi Ken, Chris (so1o) here again.. just asking for a quick favour (well, 2 mins of work on your part, heh). After some hard-drive difficulties I've been experiencing here, I've been trying to rebuild my exploit/tools collections. I was simply wondering if it would be possible for you to .tgz up the *.c files in the directory on your site, I only really need the C source files, this will also keep the .tgz's filesize down :-) I would be _extremely_ grateful if you could hook this up for me, maybe you can put the files on an FTP at or somewhere fast. Take it easy, Chris -- Chris McNab | Managing Director | Network Security Solutions Ltd. |