From MAILER-DAEMON Tue Jun 19 03:06:24 2012 Date: 19 Jun 2012 03:06:24 -0500 From: Mail System Internal Data Subject: DON'T DELETE THIS MESSAGE -- FOLDER INTERNAL DATA Message-ID: <1340093184@attrition.org> X-IMAP: 1340091861 0000000046 $Forwarded Status: RO This text is part of the internal format of your mail folder, and is not a real message. It is created automatically by the mail system software. If deleted, important folder data will be lost, and it will be re-created with the data reset to initial values. From officialrahultyagi@gmail.com Mon May 28 03:09:47 2012 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.2.5 (2008-06-10) on forced.attrition.org X-Spam-Level: X-Spam-Status: No, score=-3.6 required=4.6 tests=BAYES_00,HTML_MESSAGE, RCVD_IN_DNSWL_LOW,SPF_PASS autolearn=ham X-Original-To: jericho@attrition.org Delivered-To: jericho@attrition.org Received: from mail-wi0-f177.google.com (mail-wi0-f177.google.com [209.85.212.177]) by forced.attrition.org (Postfix) with ESMTP id DA04A22302 for ; Mon, 28 May 2012 03:09:46 -0500 (CDT) Received: by wibhm14 with SMTP id hm14so1131374wib.0 for ; Mon, 28 May 2012 01:09:44 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:date:message-id:subject:from:to:content-type; bh=p/fprxndlEyp3LbzKVzmN4vflGewvdWRF4AbDHdgn00=; b=MmbN4GkybkpmbP1mB37Zuky/1ftyqCXHzqMjLQ9jCvMuIN4xryoHixvhEYwS6uoDcJ yf2naA65UFuZYsxHv31vgBeO2SoK/LKP/w5/6QLO7iocJ86V9bL44uWCRdJx3HpGgS5v ZxpK7kklbFqOPQge/1AB8ukaBjIUgYq8/bfIyFZi5VJrmLCpW2lo8mNv/KwVTtNnTBuP K+TejS8zKCd5uKW8wjjILfVdesGxmDMfHqikQ3YHCypKyG2W5p6IBZWOg/9FFznQx8JF y15D0w95asNeQolrrN/TmNS+ZHD81X/udKIWHaw8A4BFM7YA0RDgvUZhKgm7izCLKIZF Y4WA== MIME-Version: 1.0 Received: by 10.216.55.148 with SMTP id k20mr3783507wec.70.1338192584184; Mon, 28 May 2012 01:09:44 -0700 (PDT) Received: by 10.180.104.6 with HTTP; Mon, 28 May 2012 01:09:44 -0700 (PDT) Date: Mon, 28 May 2012 13:39:44 +0530 Message-ID: Subject: Thanks For Getting My Book Jerico From: Rahul Tyagi To: security curmudgeon Content-Type: multipart/alternative; boundary=0016e6dbe8529f12b704c1143dca Status: RO X-Status: A X-Keywords: X-UID: 3 --0016e6dbe8529f12b704c1143dca Content-Type: text/plain; charset=ISO-8859-1 I have mailed you few months back to have a look on my book, but you said that time that you are busy, but i am happy to send you this copy. and hope you will like it . Thanks -R- --0016e6dbe8529f12b704c1143dca Content-Type: text/html; charset=ISO-8859-1 I have mailed you few months back to have a look on my book, but you said that time that you are busy, but i am happy to send you this copy. and hope you will like it .


Thanks
-R-
--0016e6dbe8529f12b704c1143dca-- From jericho@attrition.org Mon May 28 03:12:57 2012 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.2.5 (2008-06-10) on forced.attrition.org X-Spam-Level: X-Spam-Status: No, score=-4.3 required=4.6 tests=ALL_TRUSTED,AWL,BAYES_00 autolearn=ham X-Original-To: jericho@attrition.org Delivered-To: jericho@attrition.org Received: by forced.attrition.org (Postfix, from userid 1000) id D3E16DF0B8; Mon, 28 May 2012 03:12:57 -0500 (CDT) Received: from localhost (localhost [127.0.0.1]) by forced.attrition.org (Postfix) with ESMTP id D2E74DF0B4; Mon, 28 May 2012 03:12:57 -0500 (CDT) Date: Mon, 28 May 2012 03:12:57 -0500 (CDT) From: security curmudgeon To: Rahul Tyagi Subject: Re: Thanks For Getting My Book Jerico In-Reply-To: Message-ID: References: User-Agent: Alpine 2.00 (LNX 1167 2008-08-23) X-Attrition: Attrition is only good when forced. http://attrition.org X-OSVDB: Everything is vulnerable. http://osvdb.org/ X-Message-Flag: WARNING: Over 100 published security vulnerabilities in Microsoft Outlook! X-Copyright: This e-mail copyright 2011 by jericho@attrition.org where applicable X-Encryption: rot26 MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Status: RO X-Status: X-Keywords: X-UID: 4 On Mon, 28 May 2012, Rahul Tyagi wrote: : I have mailed you few months back to have a look on my book, but you : said that time that you are busy, but i am happy to send you this copy. : and hope you will like it . Not sure when I will get a chance to read it, but figured I should grab it while available. From officialrahultyagi@gmail.com Mon May 28 03:19:54 2012 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.2.5 (2008-06-10) on forced.attrition.org X-Spam-Level: X-Spam-Status: No, score=-3.6 required=4.6 tests=BAYES_00,HTML_MESSAGE, RCVD_IN_DNSWL_LOW,SPF_PASS autolearn=ham X-Original-To: jericho@attrition.org Delivered-To: jericho@attrition.org Received: from mail-wg0-f49.google.com (mail-wg0-f49.google.com [74.125.82.49]) by forced.attrition.org (Postfix) with ESMTP id 7C862DF0B4 for ; Mon, 28 May 2012 03:19:54 -0500 (CDT) Received: by wgbds1 with SMTP id ds1so1895018wgb.18 for ; Mon, 28 May 2012 01:19:53 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :content-type; bh=9Ilrmg7B4BCOsnOpG/4C0I0Upiho70l3toUGzpjhQOs=; b=U1IY48xMVd/GnoExPh1CQoLFH9w1vJbGt7BE/yFOLA/1N1jnuQEOAg2Ti5ptiwYmnI oMspm5rusvizer6+JpmCTP4dJ8HH6RU2zaAidHeS0sCJncheyrhn7Cc5jHrwBrWatZh8 ajHVCPefwKh6C3OpXUmCFl1UCJZMf2nvlNswEWOMcWS/8sya2kZaZDiidlbKuTB861KW yXarnOFQAqdnZspj+aGP5BtUHmVJ2wwEmWXDFwrlLBDV6ktN+aJwBfY9GvskEegWSmsX UCjTULqi5h9kGTlXeND/LWcetYPaKI1lXK+qlPK63XHFENZ0Ug+GCzcTXZarMjIq+Da9 rPgw== MIME-Version: 1.0 Received: by 10.216.145.13 with SMTP id o13mr3905108wej.95.1338193192996; Mon, 28 May 2012 01:19:52 -0700 (PDT) Received: by 10.180.104.6 with HTTP; Mon, 28 May 2012 01:19:52 -0700 (PDT) In-Reply-To: References: Date: Mon, 28 May 2012 13:49:52 +0530 Message-ID: Subject: Re: Thanks For Getting My Book Jerico From: Rahul Tyagi To: security curmudgeon Content-Type: multipart/alternative; boundary=0016e6de172ae8d07e04c114618e Status: RO X-Status: A X-Keywords: X-UID: 5 --0016e6de172ae8d07e04c114618e Content-Type: text/plain; charset=ISO-8859-1 > > Rahul Tyagi wrote: > > : I have mailed you few months back to have a look on my book, but you > : said that time that you are busy, but i am happy to send you this copy. > : and hope you will like it . > > Jerico Write:- > :Not sure when I will get a chance to read it, but figured I should grab > :it while available. > Rahul Tyagi Wrote: : I would love if you personally check my book and give a independent review : please if you can get some time i'll be very thankful to you. --0016e6de172ae8d07e04c114618e Content-Type: text/html; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable
Rahul Tyagi wrote= :

: I have mailed you few months back to have a look on my book, but you
: said that time that you are busy, but i am happy to sen= d you this copy.
: and hope you will like it .

Jerico Write:-
=A0
:Not sure when I will get a chance to read it, but fi= gured I should grab
:it while available.

Rahul Tyagi Wrote:

: I would love if you pers= onally check my book and give a independent review
: please if you can = get some time i'll be very thankful to you.
--0016e6de172ae8d07e04c114618e-- From jericho@attrition.org Thu Jun 14 19:26:22 2012 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.2.5 (2008-06-10) on forced.attrition.org X-Spam-Level: X-Spam-Status: No, score=-4.3 required=4.6 tests=ALL_TRUSTED,AWL,BAYES_00 autolearn=ham X-Original-To: jericho@attrition.org Delivered-To: jericho@attrition.org Received: by forced.attrition.org (Postfix, from userid 1000) id BA9D88BE4A; Thu, 14 Jun 2012 19:26:22 -0500 (CDT) Received: from localhost (localhost [127.0.0.1]) by forced.attrition.org (Postfix) with ESMTP id B9A6E8BD16; Thu, 14 Jun 2012 19:26:22 -0500 (CDT) Date: Thu, 14 Jun 2012 19:26:22 -0500 (CDT) From: security curmudgeon To: Rahul Tyagi Subject: Re: Thanks For Getting My Book Jerico In-Reply-To: Message-ID: References: User-Agent: Alpine 2.00 (LNX 1167 2008-08-23) X-Attrition: Attrition is only good when forced. http://attrition.org X-OSVDB: Everything is vulnerable. http://osvdb.org/ X-Message-Flag: WARNING: Over 100 published security vulnerabilities in Microsoft Outlook! X-Copyright: This e-mail copyright 2011 by jericho@attrition.org where applicable X-Encryption: rot26 MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Status: RO X-Status: X-Keywords: X-UID: 14 On Mon, 28 May 2012, Rahul Tyagi wrote: : I would love if you personally check my book and give a independent : review please if you can get some time i'll be very thankful to you. Did you write all of the material in this book yourself? From officialrahultyagi@gmail.com Fri Jun 15 01:44:52 2012 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.2.5 (2008-06-10) on forced.attrition.org X-Spam-Level: X-Spam-Status: No, score=-3.6 required=4.6 tests=BAYES_00,HTML_MESSAGE, RCVD_IN_DNSWL_LOW,SPF_PASS autolearn=ham X-Original-To: jericho@attrition.org Delivered-To: jericho@attrition.org Received: from mail-wg0-f49.google.com (mail-wg0-f49.google.com [74.125.82.49]) by forced.attrition.org (Postfix) with ESMTP id 4537D1FE26 for ; Fri, 15 Jun 2012 01:44:51 -0500 (CDT) Received: by wgbds1 with SMTP id ds1so1819601wgb.18 for ; Thu, 14 Jun 2012 23:44:49 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :content-type; bh=A8PoKDyfOCtQJDPZU999MdDjJkNhU25ETKKTpYZAzrw=; b=ZtZvtGAGFTAh3cmCzG4Eya9Wq9WZ5uVBD4/4hyQaaitiyysK8eNMP4FBvomR7zzHED kVHmISW+SOW9vGPXojwPpAJQjWkunZJv8ksJxMUpzda0+EJXJr3J0lS2mf8J8Mf6R9n9 GHfFiwiiDfGkE6rWShhmh+DBIxMtgkV3e/NQXbi8ifCPf0sISitZIdWoUaY8EKoMyyTL RbLbGaIju9Q+5Rxmz4o2wWV6BoVTETPJxd++EgCi/8JTxygfIV54snd3tALEpCWekOjK DWMrSQF1D8auIOnDvBXV3HB6vmR+lT64uNPLmI5r/TibchWWx8bv0gXVPrFIVTkS96tp Fmeg== MIME-Version: 1.0 Received: by 10.180.24.103 with SMTP id t7mr1673542wif.16.1339742689847; Thu, 14 Jun 2012 23:44:49 -0700 (PDT) Received: by 10.180.18.136 with HTTP; Thu, 14 Jun 2012 23:44:49 -0700 (PDT) In-Reply-To: References: Date: Fri, 15 Jun 2012 12:14:49 +0530 Message-ID: Subject: Re: Thanks For Getting My Book Jerico From: Rahul Tyagi To: security curmudgeon Content-Type: multipart/alternative; boundary=f46d043c80601e67a004c27d27cb Status: RO X-Status: A X-Keywords: X-UID: 16 --f46d043c80601e67a004c27d27cb Content-Type: text/plain; charset=ISO-8859-1 On Fri, Jun 15, 2012 at 5:56 AM, security curmudgeon wrote: > > On Mon, 28 May 2012, Rahul Tyagi wrote: > > : I would love if you personally check my book and give a independent > : review please if you can get some time i'll be very thankful to you. > > Did you write all of the material in this book yourself? Rahul Tyagi Wrote: Yes from 17 chapters i tired my best to contribute from my side i contributed 92% of whole book , 5-8% part of the book is contributed by some of my students and some other friends, and two chapter cum articles are from guest writers Mr. Rishab Dhangwal(RFI Attack) and AMarjit Singh.( Wireless Attacks). --f46d043c80601e67a004c27d27cb Content-Type: text/html; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable

On Fri, Jun 15, 2012 at 5:56 AM, securit= y curmudgeon <jericho@attrition.org> wrote:

On Mon, 28 May 2012, Rahul Tyagi wrote:

: I would love if you personally check my book and = give a independent
: review please if you can get some time i'll be very thankful to you.<= br>
Did you write all of the material in this book yourself?=

Rahul Tyagi Wrote: Yes from 17 chapters i tired my best to contrib= ute from my side i contributed 92% of whole book , 5-8% part of the book is= contributed by some of my=A0 students and some other friends, and two chap= ter cum articles are from guest writers Mr. Rishab Dhangwal(RFI Attack) and= AMarjit Singh.( Wireless Attacks).=A0

--f46d043c80601e67a004c27d27cb-- From jericho@attrition.org Fri Jun 15 01:46:58 2012 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.2.5 (2008-06-10) on forced.attrition.org X-Spam-Level: X-Spam-Status: No, score=-4.3 required=4.6 tests=ALL_TRUSTED,AWL,BAYES_00 autolearn=ham X-Original-To: jericho@attrition.org Delivered-To: jericho@attrition.org Received: by forced.attrition.org (Postfix, from userid 1000) id 4976C1FE26; Fri, 15 Jun 2012 01:46:58 -0500 (CDT) Received: from localhost (localhost [127.0.0.1]) by forced.attrition.org (Postfix) with ESMTP id 488741FDCB; Fri, 15 Jun 2012 01:46:58 -0500 (CDT) Date: Fri, 15 Jun 2012 01:46:58 -0500 (CDT) From: security curmudgeon To: Rahul Tyagi Subject: Re: Thanks For Getting My Book Jerico In-Reply-To: Message-ID: References: User-Agent: Alpine 2.00 (LNX 1167 2008-08-23) X-Attrition: Attrition is only good when forced. http://attrition.org X-OSVDB: Everything is vulnerable. http://osvdb.org/ X-Message-Flag: WARNING: Over 100 published security vulnerabilities in Microsoft Outlook! X-Copyright: This e-mail copyright 2011 by jericho@attrition.org where applicable X-Encryption: rot26 MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Status: RO X-Status: X-Keywords: $Forwarded X-UID: 17 On Fri, 15 Jun 2012, Rahul Tyagi wrote: : > Did you write all of the material in this book yourself? : : Rahul Tyagi Wrote: Yes from 17 chapters i tired my best to contribute : from my side i contributed 92% of whole book , 5-8% part of the book is : contributed by some of my students and some other friends, and two : chapter cum articles are from guest writers Mr. Rishab Dhangwal(RFI : Attack) and AMarjit Singh.( Wireless Attacks). I saw the couple of pages by Dhangwal on RFI, which you credited at the end. After skimming the firt half of the book this afternoon, I have to ask again. Are you sure you wrote everything else in this book, other than the two sections you identified? From officialrahultyagi@gmail.com Fri Jun 15 02:05:28 2012 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.2.5 (2008-06-10) on forced.attrition.org X-Spam-Level: X-Spam-Status: No, score=-3.6 required=4.6 tests=BAYES_00,HTML_MESSAGE, RCVD_IN_DNSWL_LOW,SPF_PASS autolearn=ham X-Original-To: jericho@attrition.org Delivered-To: jericho@attrition.org Received: from mail-wi0-f171.google.com (mail-wi0-f171.google.com [209.85.212.171]) by forced.attrition.org (Postfix) with ESMTP id 046688D458 for ; Fri, 15 Jun 2012 02:05:27 -0500 (CDT) Received: by wibhm14 with SMTP id hm14so191069wib.0 for ; Fri, 15 Jun 2012 00:05:27 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :content-type; bh=6BnyYzNqFkaAqti5VPcoht0iPaPz0pKWomMKqFRpWdg=; b=XtxNshPFqosrlQWk0Nuz2RWLvjKitzrkPd0Ua514BWcnumf7Hpen1gaDhYw7WBvz7R 24jhqG7IEZGfhaVpFn+aQ3ilCSA4FiIjYMPVGBcN0xudDvisUdY372zR/nInbLnw4huo 8GwbfQmD2Kmj3YGPtIiocimq36sca97q0MTBiA0dahpWNOntc60V66jr2tTG1W53G5OL PW8qFGrj+ml2W0kNJCK0/ERMQxwa3ApjNyvYGBGmgwLn32esZWjWLxjYMLXBvkMgTatS 4dv7KX78ZbV5LzDBWTd5KweqDincEMxitUyTtMdZIFWdAeXD4t+Rh3eokusRGYcd9Bub cMsw== MIME-Version: 1.0 Received: by 10.216.143.200 with SMTP id l50mr2430798wej.58.1339743927411; Fri, 15 Jun 2012 00:05:27 -0700 (PDT) Received: by 10.180.18.136 with HTTP; Fri, 15 Jun 2012 00:05:27 -0700 (PDT) In-Reply-To: References: Date: Fri, 15 Jun 2012 12:35:27 +0530 Message-ID: Subject: Re: Thanks For Getting My Book Jerico From: Rahul Tyagi To: security curmudgeon Content-Type: multipart/alternative; boundary=0016e6dedd8ce226ee04c27d7025 Status: RO X-Status: A X-Keywords: X-UID: 20 --0016e6dedd8ce226ee04c27d7025 Content-Type: text/plain; charset=ISO-8859-1 Rahul Tyagi Wrote: As i told you before 92% of the book is written by me, and rest 5-8% except rishab and amrjit's articles were contributed by some of my students and my friends.Like some of spamming portion and wireless security portion where contributed by my students. --0016e6dedd8ce226ee04c27d7025 Content-Type: text/html; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable Rahul Tyagi Wrote: As i told you before 92% of the book is written by me, a= nd rest 5-8% except rishab and amrjit's articles were contributed by so= me of my students and my friends.Like some of spamming portion and wireless= security portion where contributed by my students.
--0016e6dedd8ce226ee04c27d7025-- From officialrahultyagi@gmail.com Fri Jun 15 02:09:01 2012 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.2.5 (2008-06-10) on forced.attrition.org X-Spam-Level: X-Spam-Status: No, score=-3.6 required=4.6 tests=BAYES_00,HTML_MESSAGE, RCVD_IN_DNSWL_LOW,SPF_PASS autolearn=ham X-Original-To: jericho@attrition.org Delivered-To: jericho@attrition.org Received: from mail-wg0-f49.google.com (mail-wg0-f49.google.com [74.125.82.49]) by forced.attrition.org (Postfix) with ESMTP id C9DFA2165A for ; Fri, 15 Jun 2012 02:09:00 -0500 (CDT) Received: by wgbds1 with SMTP id ds1so1831851wgb.18 for ; Fri, 15 Jun 2012 00:09:00 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :content-type; bh=ZgN0pPvW2ytTAYG311QbhIVm7in1/jlDG2VctlA9JvA=; b=lbuEGlgxrzUIs5xUdLNF7cFQCfJKWkOT3MgXto8aArepRu0CYEjWMV71iA9I6HV0iR G3jEILQfmWWL6Qzo4tyF/t5lNhJ9t+eqocGjfFEmmykcEbqvwfaasaKpV6V7gZ2xDVRE lZ38PigGbWJ/6wraxeq2kKW665WkiQPPUKcvZWynbrO1u126zIY/9jsv6hou+an+TKuO XN7UM5Xx/Ft84j5JVpq+nHWhLlu49MgO34ts1f9aafoEviB0bf2uaBzGPU1oyxl1qYYv WJn+dAxqBTdR9uzNFLhzGR2kvxu43bwLUTJQvYmWpaAwRbAAFOk8Q2Akx+b3dDmmKiIM 6XIw== MIME-Version: 1.0 Received: by 10.216.211.131 with SMTP id w3mr2473782weo.163.1339744140425; Fri, 15 Jun 2012 00:09:00 -0700 (PDT) Received: by 10.180.18.136 with HTTP; Fri, 15 Jun 2012 00:09:00 -0700 (PDT) In-Reply-To: References: Date: Fri, 15 Jun 2012 12:39:00 +0530 Message-ID: Subject: Re: Thanks For Getting My Book Jerico From: Rahul Tyagi To: security curmudgeon Content-Type: multipart/alternative; boundary=0016e6dbe6d094787304c27d7d7a Status: RO X-Status: X-Keywords: X-UID: 21 --0016e6dbe6d094787304c27d7d7a Content-Type: text/plain; charset=ISO-8859-1 Rahul Tyagi Wrote: Hope you like the first portion of my book , i tried my best to deliver the best content in a easy way for the readers --0016e6dbe6d094787304c27d7d7a Content-Type: text/html; charset=ISO-8859-1 Rahul Tyagi Wrote: Hope you like the first portion of my book , i tried my best to deliver the best content in a easy way for the readers
--0016e6dbe6d094787304c27d7d7a-- From jericho@attrition.org Fri Jun 15 11:06:01 2012 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.2.5 (2008-06-10) on forced.attrition.org X-Spam-Level: X-Spam-Status: No, score=-4.3 required=4.6 tests=ALL_TRUSTED,AWL,BAYES_00 autolearn=ham X-Original-To: jericho@attrition.org Delivered-To: jericho@attrition.org Received: by forced.attrition.org (Postfix, from userid 1000) id BD3BA423D2; Fri, 15 Jun 2012 11:06:01 -0500 (CDT) Received: from localhost (localhost [127.0.0.1]) by forced.attrition.org (Postfix) with ESMTP id BC795232F5; Fri, 15 Jun 2012 11:06:01 -0500 (CDT) Date: Fri, 15 Jun 2012 11:06:01 -0500 (CDT) From: security curmudgeon To: Rahul Tyagi Subject: Re: Thanks For Getting My Book Jerico In-Reply-To: Message-ID: References: User-Agent: Alpine 2.00 (LNX 1167 2008-08-23) X-Attrition: Attrition is only good when forced. http://attrition.org X-OSVDB: Everything is vulnerable. http://osvdb.org/ X-Message-Flag: WARNING: Over 100 published security vulnerabilities in Microsoft Outlook! X-Copyright: This e-mail copyright 2011 by jericho@attrition.org where applicable X-Encryption: rot26 MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Status: RO X-Status: X-Keywords: X-UID: 24 On Fri, 15 Jun 2012, Rahul Tyagi wrote: : Rahul Tyagi Wrote: As i told you before 92% of the book is written by : me, and rest 5-8% except rishab and amrjit's articles were contributed : by some of my students and my friends.Like some of spamming portion and : wireless security portion where contributed by my students. How about the section on SQL injection and Cross-site Scripting? From officialrahultyagi@gmail.com Sat Jun 16 22:51:59 2012 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.2.5 (2008-06-10) on forced.attrition.org X-Spam-Level: X-Spam-Status: No, score=-3.6 required=4.6 tests=BAYES_00,HTML_MESSAGE, RCVD_IN_DNSWL_LOW,SPF_PASS autolearn=ham X-Original-To: jericho@attrition.org Delivered-To: jericho@attrition.org Received: from mail-wg0-f49.google.com (mail-wg0-f49.google.com [74.125.82.49]) by forced.attrition.org (Postfix) with ESMTP id 1D44E75D9C for ; Sat, 16 Jun 2012 22:51:58 -0500 (CDT) Received: by wgbds1 with SMTP id ds1so2941756wgb.18 for ; Sat, 16 Jun 2012 20:51:56 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :content-type; bh=IPZqLidyBfGX0cGoYc1Mcf20Mvglk3ZSMe5oshIvN4A=; b=PdoI2JukVjcED2LigScTsUH/QAztsxB4zrDP6jqVV5Ym+TbW436RYIojWHdkR/bjQD 3X5jnlUVUq4qF8+sYhV50Fw5SOgkXG0agRYhmxDLHPmewenYWGuLPIsEFdz/bbFpJLDZ +JCvSD0G92IvqMAqd2E0fyQ2XT3PDqbE+7dp4vnvyBlmyglnYm0NcJO3/hpc3ra1ztN9 n94AcQdPYTsCjWfOfYIXyuflgBhQN7MSd+ULIIa/YXDHhg4ZMCWuEfDCu43i8DfnDtBx uO6e5Wk4yOiuHA/a5IgWt70ISQyNM5TOFgeFznivesEjlddwPJmcBCuuWgK3BUIX7Axj o32A== MIME-Version: 1.0 Received: by 10.216.143.200 with SMTP id l50mr5544541wej.58.1339905116664; Sat, 16 Jun 2012 20:51:56 -0700 (PDT) Received: by 10.180.18.136 with HTTP; Sat, 16 Jun 2012 20:51:56 -0700 (PDT) In-Reply-To: References: Date: Sat, 16 Jun 2012 20:51:56 -0700 Message-ID: Subject: Re: Thanks For Getting My Book Jerico From: Rahul Tyagi To: security curmudgeon Content-Type: multipart/alternative; boundary=0016e6dedd8c82f26104c2a2f82f Status: RO X-Status: A X-Keywords: $Forwarded X-UID: 26 --0016e6dedd8c82f26104c2a2f82f Content-Type: text/plain; charset=ISO-8859-1 On Fri, Jun 15, 2012 at 9:06 AM, security curmudgeon wrote: > > On Fri, 15 Jun 2012, Rahul Tyagi wrote: > > : Rahul Tyagi Wrote: As i told you before 92% of the book is written by > : me, and rest 5-8% except rishab and amrjit's articles were contributed > : by some of my students and my friends.Like some of spamming portion and > : wireless security portion where contributed by my students. > > How about the section on SQL injection and Cross-site Scripting? > Rahul Tyagi Wrote:- Jerico can you please list all the section on which you have any problem, that would be easier for me to reply in single stance. and reply for this SQL Injection and Cross Site scripting i wrote that but to increase the section people behind book added more content. --0016e6dedd8c82f26104c2a2f82f Content-Type: text/html; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable

On Fri, Jun 15, 2012 at 9:06 AM, securit= y curmudgeon <jericho@attrition.org> wrote:

On Fri, 15 Jun 2012, Rahul Tyagi wrote:

: Rahul Tyagi Wrote: As i told you before 92% of the book is written = by
: me, and rest 5-8% except rishab and amrjit's articl= es were contributed
: by some of my students and my friends.Like some of spamming portion and : wireless security portion where contributed by my students.
=A0
How about the section on SQL injection and Cross-site Scripting?
<= /blockquote>
Rahul Tyagi Wrote:- Jerico can you please list all the sec= tion on which you have any problem, that would be easier for me to reply in= single stance.=A0 and reply for this SQL Injection and Cross Site scriptin= g i wrote that but to increase the section people behind book added more co= ntent.

--0016e6dedd8c82f26104c2a2f82f-- From officialrahultyagi@gmail.com Sat Jun 16 23:22:30 2012 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.2.5 (2008-06-10) on forced.attrition.org X-Spam-Level: X-Spam-Status: No, score=-3.6 required=4.6 tests=BAYES_00,HTML_MESSAGE, RCVD_IN_DNSWL_LOW,SPF_PASS autolearn=ham X-Original-To: jericho@attrition.org Delivered-To: jericho@attrition.org Received: from mail-wg0-f49.google.com (mail-wg0-f49.google.com [74.125.82.49]) by forced.attrition.org (Postfix) with ESMTP id 72D1776CCA for ; Sat, 16 Jun 2012 23:22:30 -0500 (CDT) Received: by wgbds1 with SMTP id ds1so2946892wgb.18 for ; Sat, 16 Jun 2012 21:22:28 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :content-type; bh=XVhSCgNhLxj6J2M/87PmExV19SicqT9HFI+RhaWURIg=; b=CWe8kv/wiOydXaw7obixYDTJ9uTsNXQRKNT/Vjh1BpwT40xOBDaiG7BFYqkbvMy/pN 8WKGvCYVuzLecJv1w5oxk+TksCSQPXcEQe2lKYQ68c1cMk4njKIgTtPJkJvu5Hvq0t1/ FlNZtqu4w3fGEmrF5wdiS78OQKJU/WSmTIBl1sEcXLY/jPFQh/lXWOTAZ4LIGjZWPwhB MjdDnXtNP+SIVPdWRM3c/YQJoz58csFhgw+aPGczYqSIoQRvKVvQxp5RoL4t/vqliKd8 r3R+ZqwXjAlu1S/vKAJ2i7WgW1cS1Y+LCRmr8l7VDTJAg4kCGCg0F3VI7wvTh+BrQwa8 SqMw== MIME-Version: 1.0 Received: by 10.216.211.131 with SMTP id w3mr5743380weo.163.1339906948405; Sat, 16 Jun 2012 21:22:28 -0700 (PDT) Received: by 10.180.18.136 with HTTP; Sat, 16 Jun 2012 21:22:28 -0700 (PDT) In-Reply-To: References: Date: Sat, 16 Jun 2012 21:22:28 -0700 Message-ID: Subject: Re: Thanks For Getting My Book Jerico From: Rahul Tyagi To: security curmudgeon Content-Type: multipart/alternative; boundary=0016e6dbe6d0b1182204c2a365d9 Status: RO X-Status: A X-Keywords: X-UID: 27 --0016e6dbe6d0b1182204c2a365d9 Content-Type: text/plain; charset=ISO-8859-1 The chapters which are from my hand not from any friend , content adder and others, are listed below you can check it out. 1. Introduction to Ethical Hacking 2. Information Gathering Techniques 3. Advance Google Hacking 4. Trojan and Backdoors 5. Binder and Crypters 7. Spamming and Email Forging techniques (Spamming section contributed by Miss dox my friend and forging techniques are all from me.) 8. Email Hacking 9. System Hacking 10. Stenography 11. Basics of Python 12. Virus 13. Proxy Server and VPN 14. Pentration Testing 15. Metasploit Framework 16. Hacking Mobile Phones 17. Wireless Network Attacks (By Amarjit Singh) --0016e6dbe6d0b1182204c2a365d9 Content-Type: text/html; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable The chapters which are from my hand not from any friend , content adder and= others,=A0 are listed below you can check it out.

1. Introduction t= o Ethical Hacking
2. Information Gathering Techniques
3. Advance Goog= le Hacking
4. Trojan and Backdoors
5. Binder and Crypters
7. Spamming and Email = Forging techniques (Spamming section contributed by Miss dox my friend and = forging techniques are all from me.)
8. Email Hacking
9. System Hacki= ng
10. Stenography
11. Basics of Python
12. Virus
13. Proxy Server an= d VPN
14. Pentration Testing
15. Metasploit Framework
16. Hacking = Mobile Phones
17. Wireless Network Attacks (By Amarjit Singh)


--0016e6dbe6d0b1182204c2a365d9-- From jericho@attrition.org Mon Jun 18 16:36:11 2012 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.2.5 (2008-06-10) on forced.attrition.org X-Spam-Level: X-Spam-Status: No, score=-4.3 required=4.6 tests=ALL_TRUSTED,AWL,BAYES_00 autolearn=ham X-Original-To: jericho@attrition.org Delivered-To: jericho@attrition.org Received: by forced.attrition.org (Postfix, from userid 1000) id 9B90CDF490; Mon, 18 Jun 2012 16:36:11 -0500 (CDT) Received: from localhost (localhost [127.0.0.1]) by forced.attrition.org (Postfix) with ESMTP id 9A299232F5; Mon, 18 Jun 2012 16:36:11 -0500 (CDT) Date: Mon, 18 Jun 2012 16:36:11 -0500 (CDT) From: security curmudgeon To: Rahul Tyagi Subject: Re: Thanks For Getting My Book Jerico In-Reply-To: Message-ID: References: User-Agent: Alpine 2.00 (LNX 1167 2008-08-23) X-Attrition: Attrition is only good when forced. http://attrition.org X-OSVDB: Everything is vulnerable. http://osvdb.org/ X-Message-Flag: WARNING: Over 100 published security vulnerabilities in Microsoft Outlook! X-Copyright: This e-mail copyright 2011 by jericho@attrition.org where applicable X-Encryption: rot26 MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Status: RO X-Status: X-Keywords: $Forwarded X-UID: 28 On Sat, 16 Jun 2012, Rahul Tyagi wrote: : > How about the section on SQL injection and Cross-site Scripting? : Rahul Tyagi Wrote:- Jerico can you please list all the section on which : you have any problem, that would be easier for me to reply in single : stance. and reply for this SQL Injection and Cross Site scripting i : wrote that but to increase the section people behind book added more : content. I mentioned two specific chapters for you to reply to, and you have no said several times that you wrote it. In fact, you did not. You plagiarized the material from other people. Chapter 6, page 38 - SQL injection (2 paragraphs) taken from verbatim from http://www.imperva.com/resources/glossary/sql_injection.html. The full page of text on "simple bypass authentication from frontend" was taken from http://www.cmswire.com/cms/web-cms/how-they-hack-your-website-overview-of-common-techniques-002339.php or another article. Chapter 6, pages 39-42 - XSS section is all taken verbatim from http://projects.webappsec.org/w/page/13246920/Cross%20Site%20Scripting. The only edits you made were to the example URLs, to try to conceal the fact that it was not your work. These are not the only sections that contain material you plagiarized from other sources. Do you understand what an author does, specifically writing original material OR properly citing material taken from other places? Are you familiar with plagiarism? If you are, then why did you lie to me? From jericho@attrition.org Mon Jun 18 20:08:51 2012 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.2.5 (2008-06-10) on forced.attrition.org X-Spam-Level: X-Spam-Status: No, score=-4.3 required=4.6 tests=ALL_TRUSTED,AWL,BAYES_00 autolearn=ham X-Original-To: jericho@attrition.org Delivered-To: jericho@attrition.org Received: by forced.attrition.org (Postfix, from userid 1000) id 5654CDF466; Mon, 18 Jun 2012 20:08:51 -0500 (CDT) Received: from localhost (localhost [127.0.0.1]) by forced.attrition.org (Postfix) with ESMTP id 55706161D6; Mon, 18 Jun 2012 20:08:51 -0500 (CDT) Date: Mon, 18 Jun 2012 20:08:51 -0500 (CDT) From: security curmudgeon To: Rahul Tyagi Subject: Re: Thanks For Getting My Book Jerico In-Reply-To: Message-ID: References: User-Agent: Alpine 2.00 (LNX 1167 2008-08-23) X-Attrition: Attrition is only good when forced. http://attrition.org X-OSVDB: Everything is vulnerable. http://osvdb.org/ X-Message-Flag: WARNING: Over 100 published security vulnerabilities in Microsoft Outlook! X-Copyright: This e-mail copyright 2011 by jericho@attrition.org where applicable X-Encryption: rot26 MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Status: RO X-Status: X-Keywords: X-UID: 29 On Sat, 16 Jun 2012, Rahul Tyagi wrote: : The chapters which are from my hand not from any friend , content adder : and others, are listed below you can check it out. I have finished reviewing the book. Based on a pretty quick check, there are over 20 instances of plagiarized content that I found. Given that a sizable portion of the book consists of large screenshots and very little text, it makes up a substantial amount. I am curious to receive a reply to my previous mail regarding this. For the parts that you appear to have written, it is clear that you have about the same grasp on "hacking" as Fadia and others. That is, you don't know the topic very well. Some of your claims and explanations make it clear that you do not understand how hacking has been done historically, nor do you go past the initial script kiddy junk that many people have been peddling for years. Other than your very basic familiarity with Backtrack, I don't think you understand a fraction of the topic. If I were to make a list of all the mistakes and shortcomings of the book, it would take me a full day or more. Every single part of this book seems to be junk honestly. Selling it under the advertising and claims you make on your web page is a disservice to your readers. The fact that you or Fadia teach people 'hacking', which is little more than glorified Windows tricks and how to use simple Windows programs, is laughable and in my opinion, borderline fraud. jericho From officialrahultyagi@gmail.com Mon Jun 18 23:56:32 2012 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.2.5 (2008-06-10) on forced.attrition.org X-Spam-Level: X-Spam-Status: No, score=-3.6 required=4.6 tests=BAYES_00,HTML_MESSAGE, RCVD_IN_DNSWL_LOW,SPF_PASS autolearn=ham X-Original-To: jericho@attrition.org Delivered-To: jericho@attrition.org Received: from mail-wi0-f177.google.com (mail-wi0-f177.google.com [209.85.212.177]) by forced.attrition.org (Postfix) with ESMTP id 212CF8E557 for ; Mon, 18 Jun 2012 23:56:31 -0500 (CDT) Received: by wibhm11 with SMTP id hm11so165470wib.0 for ; Mon, 18 Jun 2012 21:56:29 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :content-type; bh=eORrLAQ+LejtP9+6AW3M2NwfxFhLoRuyqnEcFibJ6lU=; b=pM7XJTm0ZywngS0EFk69abbwDEcUbBig2848MJ8gXip4f+2QkhCELE73T8yWjTOnCd ChyGpniJyyBbAUTeN8NcDyCg8HaUwhRBkdWrwwxq0/tatcYPdzka5m/yF3y8YzvjImbp g+DQCrMr69vB+84GONM5dZjEPVRDQGyTc8CRdKUMrPbwmvIZKYbIaySGDUJEGCeW/7TR S02PHqKMCgnFkPnnLzhHRBSpcvFiQX6ZfqgtgAABc9Ox/a9VP2yBwyB9P/nM1HyI2/Mi 9gq6mShVfUxbjx4G/v2sKSawl1Gs1YMEbVkRQ+OQV+qSSjOfTISh+Bky31HMbv5WWWf0 IprA== MIME-Version: 1.0 Received: by 10.216.139.19 with SMTP id b19mr9977505wej.4.1340081789224; Mon, 18 Jun 2012 21:56:29 -0700 (PDT) Received: by 10.180.18.136 with HTTP; Mon, 18 Jun 2012 21:56:29 -0700 (PDT) In-Reply-To: References: Date: Mon, 18 Jun 2012 21:56:29 -0700 Message-ID: Subject: Re: Thanks For Getting My Book Jerico From: Rahul Tyagi To: security curmudgeon Content-Type: multipart/alternative; boundary=0016e6d467f004481304c2cc1b4d Status: RO X-Status: A X-Keywords: X-UID: 30 --0016e6d467f004481304c2cc1b4d Content-Type: text/plain; charset=ISO-8859-1 Well i respect your words jerico but i am nt agree with your last comment that it is junk, for a person who still do no know what is IP address , how can u teach him msf, and may be u r right but i have written this book by considering a begineer in india not in USA. rest i am nt a person who step back, and i am nt having shame of accepting my mistakes, if they exist, and one request one time instead of finding mistakes try to have a eye of beginr and then read the book. And you knw i cant stop you by doing anything even i will not, you can do whatever you want your steps will be welcomed from me anytime, but also read other chapters only website hacking is not in the race. And you consider my another ankit then i let u knw i was nt born in a golden spoon family like ankit. and if u really know me you will nt say it for sure. Rest up to you. On Tuesday, June 19, 2012, security curmudgeon wrote: > > > On Sat, 16 Jun 2012, Rahul Tyagi wrote: > > : > How about the section on SQL injection and Cross-site Scripting? > > : Rahul Tyagi Wrote:- Jerico can you please list all the section on which > : you have any problem, that would be easier for me to reply in single > : stance. and reply for this SQL Injection and Cross Site scripting i > : wrote that but to increase the section people behind book added more > : content. > > I mentioned two specific chapters for you to reply to, and you have no > said several times that you wrote it. > > In fact, you did not. You plagiarized the material from other people. > > Chapter 6, page 38 - SQL injection (2 paragraphs) taken from verbatim from > http://www.imperva.com/resources/glossary/sql_injection.html. The full > page of text on "simple bypass authentication from frontend" was taken > from > http://www.cmswire.com/cms/web-cms/how-they-hack-your-website-overview-of-common-techniques-002339.php > or another article. > > Chapter 6, pages 39-42 - XSS section is all taken verbatim from > http://projects.webappsec.org/w/page/13246920/Cross%20Site%20Scripting. > The only edits you made were to the example URLs, to try to conceal the > fact that it was not your work. > > These are not the only sections that contain material you plagiarized from > other sources. Do you understand what an author does, specifically writing > original material OR properly citing material taken from other places? Are > you familiar with plagiarism? If you are, then why did you lie to me? > > > > --0016e6d467f004481304c2cc1b4d Content-Type: text/html; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable
Well i respect your words jerico but i am nt agree with your last comme= nt that it is junk, for a person who still do no know what is IP address , = how can u teach him msf, and may be u r right but i have written this book = by considering a begineer in india not in USA. rest i am nt a person who st= ep back, and i am nt having shame of accepting my mistakes, if they exist, = and one request one time instead of finding mistakes try to have a eye of b= eginr and then read the book. And you knw i cant stop you by doing anything= even i will not, you can do whatever you want your steps will be welcomed = from me anytime, but also read other chapters only website hacking is not i= n the race. And you consider my another ankit then i let u knw i was nt bor= n in a golden spoon family like ankit. and if u really know me you will nt = say it for sure. Rest up to you.
On Tuesday, June 19, 2012, security curmudgeon <jericho@attrition.org> wrote:
>
>
&g= t; On Sat, 16 Jun 2012, Rahul Tyagi wrote:
>
> : > How about= the section on SQL injection and Cross-site Scripting?
>
> : Rahul Tyagi Wrote:- Jerico can you please list all the secti= on on which
> : you have any problem, that would be easier for me to = reply in single
> : stance. and reply for this SQL Injection and Cros= s Site scripting i
> : wrote that but to increase the section people behind book added more=
> : content.
>
> I mentioned two specific chapters for y= ou to reply to, and you have no
> said several times that you wrote i= t.
>
> In fact, you did not. You plagiarized the material from other = people.
>
> Chapter 6, page 38 - SQL injection (2 paragraphs) t= aken from verbatim from
> http://www.imperva.com/resources/glossary/sql= _injection.html. The full
> page of text on "simple bypass authentication from frontend"= was taken
> from
> htt= p://www.cmswire.com/cms/web-cms/how-they-hack-your-website-overview-of-comm= on-techniques-002339.php
> or another article.
>
> Chapter 6, pages 39-42 - XSS secti= on is all taken verbatim from
> http://projects.webappsec.org= /w/page/13246920/Cross%20Site%20Scripting.
> The only edits you made were to the example URLs, to try to conceal th= e
> fact that it was not your work.
>
> These are not the= only sections that contain material you plagiarized from
> other sou= rces. Do you understand what an author does, specifically writing
> original material OR properly citing material taken from other places?= Are
> you familiar with plagiarism? If you are, then why did you lie= to me?
>
>
>
> --0016e6d467f004481304c2cc1b4d-- From jericho@attrition.org Tue Jun 19 00:12:47 2012 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.2.5 (2008-06-10) on forced.attrition.org X-Spam-Level: X-Spam-Status: No, score=-4.4 required=4.6 tests=ALL_TRUSTED,AWL,BAYES_00 autolearn=ham X-Original-To: jericho@attrition.org Delivered-To: jericho@attrition.org Received: by forced.attrition.org (Postfix, from userid 1000) id 94E3CDF463; Tue, 19 Jun 2012 00:12:47 -0500 (CDT) Received: from localhost (localhost [127.0.0.1]) by forced.attrition.org (Postfix) with ESMTP id 93EF7DF462; Tue, 19 Jun 2012 00:12:47 -0500 (CDT) Date: Tue, 19 Jun 2012 00:12:47 -0500 (CDT) From: security curmudgeon To: Rahul Tyagi Subject: Re: Thanks For Getting My Book Jerico In-Reply-To: Message-ID: References: User-Agent: Alpine 2.00 (LNX 1167 2008-08-23) X-Attrition: Attrition is only good when forced. http://attrition.org X-OSVDB: Everything is vulnerable. http://osvdb.org/ X-Message-Flag: WARNING: Over 100 published security vulnerabilities in Microsoft Outlook! X-Copyright: This e-mail copyright 2011 by jericho@attrition.org where applicable X-Encryption: rot26 MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Status: RO X-Status: X-Keywords: X-UID: 31 On Mon, 18 Jun 2012, Rahul Tyagi wrote: : Well i respect your words jerico but i am nt agree with your last : comment that it is junk, for a person who still do no know what is IP : address , how can u teach him msf, and may be u r right but i have : written this book by considering a begineer in india not in USA. rest i : am nt a person who step back, and i am nt having shame of accepting my : mistakes, if they exist, and one request one time instead of finding : mistakes try to have a eye of beginr and then read the book. And you knw : i cant stop you by doing anything even i will not, you can do whatever : you want your steps will be welcomed from me anytime, but also read : other chapters only website hacking is not in the race. And you consider : my another ankit then i let u knw i was nt born in a golden spoon family : like ankit. and if u really know me you will nt say it for sure. Rest up : to you. First, you did not address my questions regarding plagiarism. Why not? After denying it three times, are you ready to admit you did not write significant portions of the book? Second, I am comparing you to Ankit based on your books and apparent knowledge. I don't care who had a privileged upbringing. You are both claiming to be experts, both claim to know hacking, and both wrote books on the topic. Third, I went through the entire book. My comments are based on that, not a limited view of web hacking only. Fourth, there are proper ways to teach a beginner, and this is not it. You jump all over the place, switching topics, covering them in an illogical order, and ultimately cover too many topics in a mere 170 pages. Look at Hacking Exposed (692 pages in 2005) or Maximum Security (896 pages in 2001) and consider they attempt to cover 'hacking' like you do. That many years back, and 3 - 5x more material than yours, with a LOT more content on each page. Do you really think that your book brought anything new to the table over other more recent books? I don't think so. I just don't understand why you, or Fadia, would think yourself an expert in security when it is clear you both come from the same poor technical background and misguided notion on both the breadth and depth of hacking. From officialrahultyagi@gmail.com Tue Jun 19 00:26:01 2012 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.2.5 (2008-06-10) on forced.attrition.org X-Spam-Level: X-Spam-Status: No, score=-3.6 required=4.6 tests=BAYES_00,HTML_MESSAGE, RCVD_IN_DNSWL_LOW,SPF_PASS autolearn=ham X-Original-To: jericho@attrition.org Delivered-To: jericho@attrition.org Received: from mail-wi0-f171.google.com (mail-wi0-f171.google.com [209.85.212.171]) by forced.attrition.org (Postfix) with ESMTP id CEEF0DF462 for ; Tue, 19 Jun 2012 00:26:00 -0500 (CDT) Received: by wibhi8 with SMTP id hi8so173947wib.0 for ; Mon, 18 Jun 2012 22:25:58 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :content-type; bh=AtWPVCVB+qmInTvjuu+XyKaqlg2VOmT54uUzIjegmW0=; b=c+ItAhdc1QIQRJks8znLfuKso/kSrz8lQrwY0h08dN20OhpIgca3N1V3a3etYBtn5i 89+R6vWQ/uhABvSwfoZPhg3rTIndm+ui4fFEs62TJQh3OGct41l+PV76tJa3zOlUVPti W9BIjtk1/GTXRFcl4DyWJXxtR6z7FDZ6usBuj2Hg0d8ht56chzkjFzwKuvo7XID7KKjZ ZDYLKd1QyozWq/NHlN6Kmlv0RInhqFBbLs5TSD9kdWizclobMiLm6obEjvyJO9q9pnzH YNVvt8X9XNNP9XhD5clxxP48lqsCB79KuhvXSMZQHKVzhXs5kAWWuAQJGDAchK+rSm/n QXzg== MIME-Version: 1.0 Received: by 10.216.143.200 with SMTP id l50mr9088967wej.58.1340083558547; Mon, 18 Jun 2012 22:25:58 -0700 (PDT) Received: by 10.180.18.136 with HTTP; Mon, 18 Jun 2012 22:25:58 -0700 (PDT) In-Reply-To: References: Date: Mon, 18 Jun 2012 22:25:58 -0700 Message-ID: Subject: Re: Thanks For Getting My Book Jerico From: Rahul Tyagi To: security curmudgeon Content-Type: multipart/alternative; boundary=0016e6dedd8c7a01b204c2cc8451 Status: RO X-Status: A X-Keywords: X-UID: 32 --0016e6dedd8c7a01b204c2cc8451 Content-Type: text/plain; charset=ISO-8859-1 So you did not find a single good point in this book, this is my last question from you ? On Mon, Jun 18, 2012 at 10:12 PM, security curmudgeon wrote: > > On Mon, 18 Jun 2012, Rahul Tyagi wrote: > > : Well i respect your words jerico but i am nt agree with your last > : comment that it is junk, for a person who still do no know what is IP > : address , how can u teach him msf, and may be u r right but i have > : written this book by considering a begineer in india not in USA. rest i > : am nt a person who step back, and i am nt having shame of accepting my > : mistakes, if they exist, and one request one time instead of finding > : mistakes try to have a eye of beginr and then read the book. And you knw > : i cant stop you by doing anything even i will not, you can do whatever > : you want your steps will be welcomed from me anytime, but also read > : other chapters only website hacking is not in the race. And you consider > : my another ankit then i let u knw i was nt born in a golden spoon family > : like ankit. and if u really know me you will nt say it for sure. Rest up > : to you. > > First, you did not address my questions regarding plagiarism. Why not? > After denying it three times, are you ready to admit you did not write > significant portions of the book? > > Second, I am comparing you to Ankit based on your books and apparent > knowledge. I don't care who had a privileged upbringing. You are both > claiming to be experts, both claim to know hacking, and both wrote books > on the topic. > > Third, I went through the entire book. My comments are based on that, not > a limited view of web hacking only. > > Fourth, there are proper ways to teach a beginner, and this is not it. You > jump all over the place, switching topics, covering them in an illogical > order, and ultimately cover too many topics in a mere 170 pages. Look at > Hacking Exposed (692 pages in 2005) or Maximum Security (896 pages in > 2001) and consider they attempt to cover 'hacking' like you do. That many > years back, and 3 - 5x more material than yours, with a LOT more content > on each page. Do you really think that your book brought anything new to > the table over other more recent books? I don't think so. I just don't > understand why you, or Fadia, would think yourself an expert in security > when it is clear you both come from the same poor technical background and > misguided notion on both the breadth and depth of hacking. > > --0016e6dedd8c7a01b204c2cc8451 Content-Type: text/html; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable So you did not find a single good point in this book, this is my last quest= ion from you ?

On Mon, Jun 18, 2012 at 10= :12 PM, security curmudgeon <jericho@attrition.org> wrot= e:

On Mon, 18 Jun 2012, Rahul Tyagi wrote:

: Well i respect your words jerico but i am nt agree with your last
: comment that it is junk, for a person who still do no k= now what is IP
: address , how can u teach him msf, and may be u r right but i have
: written this book by considering a begineer in india not in USA. rest i : am nt a person who step back, and i am nt having shame of accepting my : mistakes, if they exist, and one request one time instead of finding
: mistakes try to have a eye of beginr and then read the book. And you knw<= br> : i cant stop you by doing anything even i will not, you can do whatever : you want your steps will be welcomed from me anytime, but also read
: other chapters only website hacking is not in the race. And you consider<= br> : my another ankit then i let u knw i was nt born in a golden spoon family<= br> : like ankit. and if u really know me you will nt say it for sure. Rest up<= br> : to you.

First, you did not address my questions regarding plagiarism. Why not= ?
After denying it three times, are you ready to admit you did not write
significant portions of the book?

Second, I am comparing you to Ankit based on your books and apparent
knowledge. I don't care who had a privileged upbringing. You are both claiming to be experts, both claim to know hacking, and both wrote books on the topic.

Third, I went through the entire book. My comments are based on that, not a limited view of web hacking only.

Fourth, there are proper ways to teach a beginner, and this is not it. You<= br> jump all over the place, switching topics, covering them in an illogical order, and ultimately cover too many topics in a mere 170 pages. Look at Hacking Exposed (692 pages in 2005) or Maximum Security (896 pages in
2001) and consider they attempt to cover 'hacking' like you do. Tha= t many
years back, and 3 - 5x more material than yours, with a LOT more content on each page. Do you really think that your book brought anything new to the table over other more recent books? I don't think so. I just don= 9;t
understand why you, or Fadia, would think yourself an expert in security when it is clear you both come from the same poor technical background and<= br> misguided notion on both the breadth and depth of hacking.


--0016e6dedd8c7a01b204c2cc8451-- From jericho@attrition.org Tue Jun 19 00:28:09 2012 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.2.5 (2008-06-10) on forced.attrition.org X-Spam-Level: X-Spam-Status: No, score=-4.4 required=4.6 tests=ALL_TRUSTED,AWL,BAYES_00 autolearn=ham X-Original-To: jericho@attrition.org Delivered-To: jericho@attrition.org Received: by forced.attrition.org (Postfix, from userid 1000) id 24E36DF4C7; Tue, 19 Jun 2012 00:28:09 -0500 (CDT) Received: from localhost (localhost [127.0.0.1]) by forced.attrition.org (Postfix) with ESMTP id 2396CDF462; Tue, 19 Jun 2012 00:28:09 -0500 (CDT) Date: Tue, 19 Jun 2012 00:28:09 -0500 (CDT) From: security curmudgeon To: Rahul Tyagi Subject: Re: Thanks For Getting My Book Jerico In-Reply-To: Message-ID: References: User-Agent: Alpine 2.00 (LNX 1167 2008-08-23) X-Attrition: Attrition is only good when forced. http://attrition.org X-OSVDB: Everything is vulnerable. http://osvdb.org/ X-Message-Flag: WARNING: Over 100 published security vulnerabilities in Microsoft Outlook! X-Copyright: This e-mail copyright 2011 by jericho@attrition.org where applicable X-Encryption: rot26 MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Status: RO X-Status: X-Keywords: X-UID: 33 On Mon, 18 Jun 2012, Rahul Tyagi wrote: : So you did not find a single good point in this book, this is my last : question from you ? Answer my question, and I will answer yours. : > First, you did not address my questions regarding plagiarism. Why not? : > After denying it three times, are you ready to admit you did not write : > significant portions of the book? From officialrahultyagi@gmail.com Tue Jun 19 00:31:11 2012 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.2.5 (2008-06-10) on forced.attrition.org X-Spam-Level: X-Spam-Status: No, score=-3.6 required=4.6 tests=BAYES_00,HTML_MESSAGE, RCVD_IN_DNSWL_LOW,SPF_PASS autolearn=ham X-Original-To: jericho@attrition.org Delivered-To: jericho@attrition.org Received: from mail-wi0-f171.google.com (mail-wi0-f171.google.com [209.85.212.171]) by forced.attrition.org (Postfix) with ESMTP id 81146DF462 for ; Tue, 19 Jun 2012 00:31:11 -0500 (CDT) Received: by wibhi8 with SMTP id hi8so176222wib.0 for ; Mon, 18 Jun 2012 22:31:09 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :content-type; bh=gBfgR+1XkgmNLyAPDFwLYUat1jNtH/Xyzmt+tnfQFzc=; b=Krs4GycwpDMNhUTOmowyfdZeJYG/TnN8VpDdxVBob0Kg1rGTzBvpAY6AW4+ulxpQfd +C2+vB5eJCzKhWAAldZp1EbSSbnX4KosuUNbc9R32AZs2JoT2Q58GfBW5uhPZXWyht8E PWF+X2nV8Zv6ILIvo34QuzsgG62kgAvrn8topPTR2RUNAwsnn5KsCI3yuVTQK9AqlLhR Ly2L7oYt3c5350efryC6AzOF1xd5SyL5ac6FCxFNXwKX+FyQU71lEv+9E3QF3LbXaksW lCBX1RzkLrtp4KS8YLmwZQYxrIvWG1B6Wa85OSp8+1mIJxxQeeNfaLRbsTnRZ4vaCKjf L3qg== MIME-Version: 1.0 Received: by 10.180.24.68 with SMTP id s4mr212187wif.4.1340083869722; Mon, 18 Jun 2012 22:31:09 -0700 (PDT) Received: by 10.180.18.136 with HTTP; Mon, 18 Jun 2012 22:31:09 -0700 (PDT) In-Reply-To: References: Date: Mon, 18 Jun 2012 22:31:09 -0700 Message-ID: Subject: Re: Thanks For Getting My Book Jerico From: Rahul Tyagi To: security curmudgeon Content-Type: multipart/alternative; boundary=f46d043894c106267604c2cc9725 Status: RO X-Status: A X-Keywords: X-UID: 34 --f46d043894c106267604c2cc9725 Content-Type: text/plain; charset=ISO-8859-1 I replied it jerico i think you did not saw that in hurry, i told you in 17 chapters two chapters's content are contributed by my friends and students, spamming(By Miss Dox) and web applications, and also due to short content more content is being added by the content adder. except it Whole 15 chapters are written by me. and out of 17 chapters 15 are purely written by me. On Mon, Jun 18, 2012 at 10:28 PM, security curmudgeon wrote: > > On Mon, 18 Jun 2012, Rahul Tyagi wrote: > > : So you did not find a single good point in this book, this is my last > : question from you ? > > Answer my question, and I will answer yours. > > : > First, you did not address my questions regarding plagiarism. Why not? > : > After denying it three times, are you ready to admit you did not write > : > significant portions of the book? > > --f46d043894c106267604c2cc9725 Content-Type: text/html; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable I replied it jerico i think you did not saw that in hurry, i told you in 17= chapters two chapters's content are contributed by my friends and stud= ents, spamming(By Miss Dox) and web applications, and also due to short con= tent more content is being added by the content adder. except it Whole 15 c= hapters are written by me. and out of 17 chapters 15 are purely written by = me.=A0

On Mon, Jun 18, 2012 at 10:28 PM, security c= urmudgeon <jericho@attrition.org> wrote:

On Mon, 18 Jun 2012, Rahul Tyagi wrote:

: So you did not find a single good point in this book, this is my la= st
: question from you ?

Answer my question, and I will answer yours.

: > First, you did not address my questions regarding plagiarism. Why no= t?
: > After denying it three times= , are you ready to admit you did not write
: > significant portions of the book?


--f46d043894c106267604c2cc9725-- From jericho@attrition.org Tue Jun 19 00:35:19 2012 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.2.5 (2008-06-10) on forced.attrition.org X-Spam-Level: X-Spam-Status: No, score=-4.4 required=4.6 tests=ALL_TRUSTED,AWL,BAYES_00 autolearn=ham X-Original-To: jericho@attrition.org Delivered-To: jericho@attrition.org Received: by forced.attrition.org (Postfix, from userid 1000) id 2A642DF4C7; Tue, 19 Jun 2012 00:35:19 -0500 (CDT) Received: from localhost (localhost [127.0.0.1]) by forced.attrition.org (Postfix) with ESMTP id 29170DF462; Tue, 19 Jun 2012 00:35:19 -0500 (CDT) Date: Tue, 19 Jun 2012 00:35:19 -0500 (CDT) From: security curmudgeon To: Rahul Tyagi Subject: Re: Thanks For Getting My Book Jerico In-Reply-To: Message-ID: References: User-Agent: Alpine 2.00 (LNX 1167 2008-08-23) X-Attrition: Attrition is only good when forced. http://attrition.org X-OSVDB: Everything is vulnerable. http://osvdb.org/ X-Message-Flag: WARNING: Over 100 published security vulnerabilities in Microsoft Outlook! X-Copyright: This e-mail copyright 2011 by jericho@attrition.org where applicable X-Encryption: rot26 MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Status: RO X-Status: X-Keywords: X-UID: 35 On Mon, 18 Jun 2012, Rahul Tyagi wrote: : I replied it jerico i think you did not saw that in hurry, i told you in : 17 chapters two chapters's content are contributed by my friends and : students, spamming(By Miss Dox) and web applications, and also due to : short content more content is being added by the content adder. except : it Whole 15 chapters are written by me. and out of 17 chapters 15 are : purely written by me. I read that. Then I disputed your claims and specifically cited two examples with where they were taken from. I also told you that I found over *20 instances* where material was plagiarized from other people. So what this tells me is that you either do not know what plagiarism means, or you do and are still denying it despite the evidence I have seen. From officialrahultyagi@gmail.com Tue Jun 19 00:43:47 2012 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.2.5 (2008-06-10) on forced.attrition.org X-Spam-Level: X-Spam-Status: No, score=-3.6 required=4.6 tests=BAYES_00,HTML_MESSAGE, RCVD_IN_DNSWL_LOW,SPF_PASS autolearn=ham X-Original-To: jericho@attrition.org Delivered-To: jericho@attrition.org Received: from mail-wi0-f171.google.com (mail-wi0-f171.google.com [209.85.212.171]) by forced.attrition.org (Postfix) with ESMTP id 2CD95DF462 for ; Tue, 19 Jun 2012 00:43:46 -0500 (CDT) Received: by wibhi8 with SMTP id hi8so182356wib.0 for ; Mon, 18 Jun 2012 22:43:44 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :content-type; bh=KuRwvTtC1yeNfW8FN4Y1FBKYSD4vl1fWWfJllMjvbsY=; b=vIYVJHKG7lWYXO2jIEzeqejd7v4I1VC7mH4kGBbRkpFYdiTZ+ZwrJNd169FUsbZJ/O HgnjTJQ7GZUvGHRRpKEAHdFSRA6j4rFd1I4k2/2OOUkZaZqi2eGJyJfEpIf47LifVglJ In7zS/ftiO2h9+mswHri3XwYr7Q3ywHSZ1Z+w6UrSGuGWC/m532S9eX78dNVmt5PBhq6 G4z956FNl0+eiXPtVXLyUVPcCQFZVYKcSZT1w1z58HhAjBmp/jvULAOvdYlhikvW1l5s BM8C1k7LS8DrX8VFQGrsJq6Tmhw6QSx2Lf1ivH2lzR3Q1KcjSlYSrCPDeEjuZ/VF5vtL WYnQ== MIME-Version: 1.0 Received: by 10.216.211.131 with SMTP id w3mr9449978weo.163.1340084622263; Mon, 18 Jun 2012 22:43:42 -0700 (PDT) Received: by 10.180.18.136 with HTTP; Mon, 18 Jun 2012 22:43:42 -0700 (PDT) In-Reply-To: References: Date: Mon, 18 Jun 2012 22:43:42 -0700 Message-ID: Subject: Re: Thanks For Getting My Book Jerico From: Rahul Tyagi To: security curmudgeon Content-Type: multipart/alternative; boundary=0016e6dbe6d0e1046b04c2ccc3a0 Status: RO X-Status: A X-Keywords: X-UID: 36 --0016e6dbe6d0e1046b04c2ccc3a0 Content-Type: text/plain; charset=ISO-8859-1 I know plagiarism jerico, and if you found the content which is plagiarized then what i can promise that in next printing slot the refrences would be there, but beside these chapters please also give credit for others chapters which are from my pen. Everyone have dark and white part and considering this book if you showing the mistakes from 2 or 3 chapters , i am ready to admin my mistake that from contributers i did not cross check from net that whether the content was plagiarized or not, but please if you think give credit for the rest chapters also, to make it a genuine review. and again as i told you i do not having any shame to accept the mistakes which are committed from me or any person which belongs to me. and if you provide me the sources i will definitely provide the source of the content in the next printing slot. --0016e6dbe6d0e1046b04c2ccc3a0 Content-Type: text/html; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable I know plagiarism jerico, and if you found the content which is plagiarized= then what i can promise that in next printing slot the refrences would be = there, but beside these chapters please also give credit for others chapter= s which are from my pen.

Everyone have dark and white part and considering this book if you show= ing the mistakes from 2 or 3 chapters , i am ready to admin my mistake that= from contributers i did not cross check from net that whether the content = was plagiarized or not, but please if you think give credit for the rest ch= apters also, to make it a genuine review. and again as i told you i do not = having any shame to accept the mistakes which are committed from me or any = person which belongs to me. and if you provide me the sources i will defini= tely provide the=A0 source of the content in the next printing slot.


--0016e6dbe6d0e1046b04c2ccc3a0-- From jericho@attrition.org Tue Jun 19 00:49:27 2012 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.2.5 (2008-06-10) on forced.attrition.org X-Spam-Level: X-Spam-Status: No, score=-4.4 required=4.6 tests=ALL_TRUSTED,AWL,BAYES_00 autolearn=ham X-Original-To: jericho@attrition.org Delivered-To: jericho@attrition.org Received: by forced.attrition.org (Postfix, from userid 1000) id 4EF05DF4C7; Tue, 19 Jun 2012 00:49:27 -0500 (CDT) Received: from localhost (localhost [127.0.0.1]) by forced.attrition.org (Postfix) with ESMTP id 4D9BF163AF; Tue, 19 Jun 2012 00:49:27 -0500 (CDT) Date: Tue, 19 Jun 2012 00:49:27 -0500 (CDT) From: security curmudgeon To: Rahul Tyagi Subject: Re: Thanks For Getting My Book Jerico In-Reply-To: Message-ID: References: User-Agent: Alpine 2.00 (LNX 1167 2008-08-23) X-Attrition: Attrition is only good when forced. http://attrition.org X-OSVDB: Everything is vulnerable. http://osvdb.org/ X-Message-Flag: WARNING: Over 100 published security vulnerabilities in Microsoft Outlook! X-Copyright: This e-mail copyright 2011 by jericho@attrition.org where applicable X-Encryption: rot26 MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Status: RO X-Status: X-Keywords: X-UID: 37 On Mon, 18 Jun 2012, Rahul Tyagi wrote: : I know plagiarism jerico, and if you found the content which is : plagiarized then what i can promise that in next printing slot the : refrences would be there, but beside these chapters please also give : credit for others chapters which are from my pen. I found plagiarism in chapters 2, 3, 4, 6, 7, 8, 11, 13, 14, and 17. Several chapters were 80% screenshots with almost no text, and barely constitute 'authoring' a chapter. Further, I did not check every chapter. Seriously, it is difficult to give any credit here. I simply do not understand how you can go from denying plagiarism five times to saying you will properly cite it next time. There shouldn't be a next time! This book should be removed from the market and a refund offered to anyone that purchased it. Your entire carreer is based on 'ethical' hacking. It is time to put the ETHICAL to the test. : Everyone have dark and white part and considering this book if you : showing the mistakes from 2 or 3 chapters , i am ready to admin my See above, it isn't 2 or 3 chapters. It is at least 10 chapters, possibly more. That is *half the book*. : mistake that from contributers i did not cross check from net that : whether the content was plagiarized or not, but please if you think give This plagiarism is NOT from your contributors. This is in the chapters YOU repeatedly say you wrote. I really don't think you understand how bad this is. From officialrahultyagi@gmail.com Tue Jun 19 00:53:26 2012 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.2.5 (2008-06-10) on forced.attrition.org X-Spam-Level: X-Spam-Status: No, score=-3.6 required=4.6 tests=BAYES_00,HTML_MESSAGE, RCVD_IN_DNSWL_LOW,SPF_PASS autolearn=ham X-Original-To: jericho@attrition.org Delivered-To: jericho@attrition.org Received: from mail-we0-f181.google.com (mail-we0-f181.google.com [74.125.82.181]) by forced.attrition.org (Postfix) with ESMTP id 76ED4DF461 for ; Tue, 19 Jun 2012 00:53:26 -0500 (CDT) Received: by werj55 with SMTP id j55so4814867wer.12 for ; Mon, 18 Jun 2012 22:53:24 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :content-type; bh=MBf68oPPTfCBw3aX+CNce4gj7AibahRdvKhgti49SKA=; b=wFJrSrRE3e318DFDQpvZ13iErHf9izX6nJUdGNOdmp3r8XmZ7ePVzpiMq41xnCUQDe s5LpxWcuB0n1Fxh6pDCqk4bupuWMOVB+QWaZ+Ic1POdCnTAN9+abraExbaKRdFn+ik2k PMsWghk+9KiNNpSZxdf5cEPboJ7kwiRyRiaSaMt3lsLuMiG+RCfgXyg6N/FUnvXecg46 AccjTXGbqyV1fAW10Gq3LmVgFL2VG0hO20CPupbscDOHNIQ1P7HBnjxdewzRfk9z5XwT ZZoxtX/yTVI0dh+sRUDyILhfcfaM2QX8YMRwfzwVFNSnjtE95u4S9bVyVRIXCZBa+eiv 1MHg== MIME-Version: 1.0 Received: by 10.181.13.235 with SMTP id fb11mr338022wid.3.1340085204345; Mon, 18 Jun 2012 22:53:24 -0700 (PDT) Received: by 10.180.18.136 with HTTP; Mon, 18 Jun 2012 22:53:24 -0700 (PDT) In-Reply-To: References: Date: Mon, 18 Jun 2012 22:53:24 -0700 Message-ID: Subject: Re: Thanks For Getting My Book Jerico From: Rahul Tyagi To: security curmudgeon Content-Type: multipart/alternative; boundary=f46d043c05c092e49104c2cce6cd Status: RO X-Status: A X-Keywords: X-UID: 38 --f46d043c05c092e49104c2cce6cd Content-Type: text/plain; charset=ISO-8859-1 I found plagiarism in chapters 2, 3, 4, 6, 7, 8, 11, 13, 14, and 17. well if you found plagiarism from these above chapters then i hope you did not consider line by line text , if ettercap or another software having manual commands written in book that are static and will be on internet also as same . so will you consider it also as plagiarism. content.Because i can not change it of-course ? On Mon, Jun 18, 2012 at 10:49 PM, security curmudgeon wrote: > > On Mon, 18 Jun 2012, Rahul Tyagi wrote: > > : I know plagiarism jerico, and if you found the content which is > : plagiarized then what i can promise that in next printing slot the > : refrences would be there, but beside these chapters please also give > : credit for others chapters which are from my pen. > > I found plagiarism in chapters 2, 3, 4, 6, 7, 8, 11, 13, 14, and 17. > Several chapters were 80% screenshots with almost no text, and barely > constitute 'authoring' a chapter. Further, I did not check every chapter. > Seriously, it is difficult to give any credit here. > > I simply do not understand how you can go from denying plagiarism five > times to saying you will properly cite it next time. There shouldn't be a > next time! This book should be removed from the market and a refund > offered to anyone that purchased it. Your entire carreer is based on > 'ethical' hacking. It is time to put the ETHICAL to the test. > > : Everyone have dark and white part and considering this book if you > : showing the mistakes from 2 or 3 chapters , i am ready to admin my > > See above, it isn't 2 or 3 chapters. It is at least 10 chapters, possibly > more. That is *half the book*. > > : mistake that from contributers i did not cross check from net that > : whether the content was plagiarized or not, but please if you think give > > This plagiarism is NOT from your contributors. This is in the chapters YOU > repeatedly say you wrote. > > I really don't think you understand how bad this is. > --f46d043c05c092e49104c2cce6cd Content-Type: text/html; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable I found plagiarism in chapters 2, 3, 4, 6, 7, 8, 11, 13, 14, and 17.
wel= l if you found plagiarism from these above chapters then i hope you did not= consider line by line text , if ettercap or another software having manual= commands written in book that are static and will be on internet also as s= ame . so will you consider it also as plagiarism. content.Because i can not= change it of-course=A0 ?

On Mon, Jun 18, 2012 at 10:49 PM, security c= urmudgeon <jericho@attrition.org> wrote:

On Mon, 18 Jun 2012, Rahul Tyagi wrote:

: I know plagiarism jerico, and if you found the content which is
: plagiarized then what i can promise that in next printi= ng slot the
: refrences would be there, but beside these chapters please also give
: credit for others chapters which are from my pen.

I found plagiarism in chapters 2, 3, 4, 6, 7, 8, 11, 13, 14, and 17.<= br> Several chapters were 80% screenshots with almost no text, and barely
constitute 'authoring' a chapter. Further, I did not check every ch= apter.
Seriously, it is difficult to give any credit here.

I simply do not understand how you can go from denying plagiarism five
times to saying you will properly cite it next time. There shouldn't be= a
next time! This book should be removed from the market and a refund
offered to anyone that purchased it. Your entire carreer is based on
'ethical' hacking. It is time to put the ETHICAL to the test.

: Everyone have dark and white part and considering this book if you
: showing the mistakes from 2 or 3 chapters , i am ready to admin my

See above, it isn't 2 or 3 chapters. It is at least 10 chapters, = possibly
more. That is *half the book*.

: mistake that from contributers i did not cross check from net that
: whether the content was plagiarized or not, but please if you think give<= br>
This plagiarism is NOT from your contributors. This is in the chapter= s YOU
repeatedly say you wrote.

I really don't think you understand how bad this is.

--f46d043c05c092e49104c2cce6cd-- From jericho@attrition.org Tue Jun 19 01:00:10 2012 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.2.5 (2008-06-10) on forced.attrition.org X-Spam-Level: X-Spam-Status: No, score=-4.4 required=4.6 tests=ALL_TRUSTED,AWL,BAYES_00 autolearn=ham X-Original-To: jericho@attrition.org Delivered-To: jericho@attrition.org Received: by forced.attrition.org (Postfix, from userid 1000) id 31D12DF4C7; Tue, 19 Jun 2012 01:00:10 -0500 (CDT) Received: from localhost (localhost [127.0.0.1]) by forced.attrition.org (Postfix) with ESMTP id 304B4DF461; Tue, 19 Jun 2012 01:00:10 -0500 (CDT) Date: Tue, 19 Jun 2012 01:00:10 -0500 (CDT) From: security curmudgeon To: Rahul Tyagi Subject: Re: Thanks For Getting My Book Jerico In-Reply-To: Message-ID: References: User-Agent: Alpine 2.00 (LNX 1167 2008-08-23) X-Attrition: Attrition is only good when forced. http://attrition.org X-OSVDB: Everything is vulnerable. http://osvdb.org/ X-Message-Flag: WARNING: Over 100 published security vulnerabilities in Microsoft Outlook! X-Copyright: This e-mail copyright 2011 by jericho@attrition.org where applicable X-Encryption: rot26 MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Status: RO X-Status: X-Keywords: X-UID: 39 On Mon, 18 Jun 2012, Rahul Tyagi wrote: : : I found plagiarism in chapters 2, 3, 4, 6, 7, 8, 11, 13, 14, and 17. : well if you found plagiarism from these above chapters then i hope you : did not consider line by line text , if ettercap or another software : having manual commands written in book that are static and will be on : internet also as same . so will you consider it also as plagiarism. : content.Because i can not change it of-course ? I am not talking about one or two lines, or just command examples. As I already told you, as *one* example; Chapter 6, pages 39 - 42, all three full pages of text (several hundred words) were taken almost verbatim from the http://projects.webappsec.org/w/page/13246920/Cross%20Site%20Scripting article. Worse, you modified the example URLs from that article in an attempt to hide the fact that the material was not yours. That is full-on, wide-scale plagiarism that is inexcusable and unethical. You simply can't just reference the original if you re-print this book either. You must obtain permission from the original author if you are to use that much text. Otherwise, you can only use very small chunks of it, that fall under "fair use". When I have time, I will write up the full details in an article that covers the plagiarism and contact your publisher. From officialrahultyagi@gmail.com Tue Jun 19 01:03:28 2012 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.2.5 (2008-06-10) on forced.attrition.org X-Spam-Level: X-Spam-Status: No, score=-3.6 required=4.6 tests=BAYES_00,HTML_MESSAGE, RCVD_IN_DNSWL_LOW,SPF_PASS autolearn=ham X-Original-To: jericho@attrition.org Delivered-To: jericho@attrition.org Received: from mail-wi0-f171.google.com (mail-wi0-f171.google.com [209.85.212.171]) by forced.attrition.org (Postfix) with ESMTP id C2131DF461 for ; Tue, 19 Jun 2012 01:03:27 -0500 (CDT) Received: by wibhi8 with SMTP id hi8so192566wib.0 for ; Mon, 18 Jun 2012 23:03:25 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :content-type; bh=7DMUJ+Kvl5HiXXGE7U24cTyeAz9+YWp60KDBpCJXoIA=; b=JYaBvM6sS0unqObu7zlZP1qEThbWle8TEUdEjNIrGqPrJrvC6+jEH1TC3z/05m4qWh crxVqk4ysuK4V2M267Us5OHg3pTzRR6M009SjPw8qePeTMtUClRxl0YiAGxkyfjCA4Kr WjZFqLkoRorRdhE01A+rXdD7H4KTDdAMJ27UriwPDay8h+w+WMPJqtaJrTPb7vMQDbWT bbMTNv9dKJWP3V3TSOrudUYwVcaTbA4l5gicmYYWoDm/wfzmHPcyXarrCRMsbAXDP09P Tgjhh2L70YbzvDKg1TtLUqkG3FuPnQvy7XBnK76QAZyFdUzu73xYZFwH1hoB9SrnPYCM hA4Q== MIME-Version: 1.0 Received: by 10.181.13.235 with SMTP id fb11mr393245wid.3.1340085805599; Mon, 18 Jun 2012 23:03:25 -0700 (PDT) Received: by 10.180.18.136 with HTTP; Mon, 18 Jun 2012 23:03:25 -0700 (PDT) In-Reply-To: References: Date: Mon, 18 Jun 2012 23:03:25 -0700 Message-ID: Subject: Re: Thanks For Getting My Book Jerico From: Rahul Tyagi To: security curmudgeon Content-Type: multipart/alternative; boundary=f46d043c05c0694c7b04c2cd0ae7 Status: RO X-Status: A X-Keywords: X-UID: 40 --f46d043c05c0694c7b04c2cd0ae7 Content-Type: text/plain; charset=ISO-8859-1 No issues jerico, you again and again considering Website Chapter . as i told you it is not from me but rest chapters are from me and if you found any plagiarized content in that then i am ready to admit and and will give credit to each source that is my promise but if it is plagiarized :). On Mon, Jun 18, 2012 at 11:00 PM, security curmudgeon wrote: > > On Mon, 18 Jun 2012, Rahul Tyagi wrote: > > : : I found plagiarism in chapters 2, 3, 4, 6, 7, 8, 11, 13, 14, and 17. > > : well if you found plagiarism from these above chapters then i hope you > : did not consider line by line text , if ettercap or another software > : having manual commands written in book that are static and will be on > : internet also as same . so will you consider it also as plagiarism. > : content.Because i can not change it of-course ? > > I am not talking about one or two lines, or just command examples. As I > already told you, as *one* example; Chapter 6, pages 39 - 42, all three > full pages of text (several hundred words) were taken almost verbatim from > the http://projects.webappsec.org/w/page/13246920/Cross%20Site%20Scripting > article. Worse, you modified the example URLs from that article in an > attempt to hide the fact that the material was not yours. > > That is full-on, wide-scale plagiarism that is inexcusable and unethical. > You simply can't just reference the original if you re-print this book > either. You must obtain permission from the original author if you are to > use that much text. Otherwise, you can only use very small chunks of it, > that fall under "fair use". > > When I have time, I will write up the full details in an article that > covers the plagiarism and contact your publisher. > > --f46d043c05c0694c7b04c2cd0ae7 Content-Type: text/html; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable No issues jerico, you again and again considering Website Chapter . as i to= ld you it is not from me but rest chapters are from me and if you found any= plagiarized content in that then i am ready to admit and and will give cre= dit to each source that is my promise but if it is plagiarized :).

On Mon, Jun 18, 2012 at 11:00 PM, security c= urmudgeon <jericho@attrition.org> wrote:

On Mon, 18 Jun 2012, Rahul Tyagi wrote:

: : I found plagiarism in chapters 2, 3, 4, 6, 7, 8, 11, 13, 14, and = 17.

: well if you found plagiarism from these above chapters then i hope you : did not consider line by line text , if ettercap or another software
: having manual commands written in book that are static and will be on
: internet also as same . so will you consider it also as plagiarism.
: content.Because i can not change it of-course ?

I am not talking about one or two lines, or just command examples. As= I
already told you, as *one* example; Chapter 6, pages 39 - 42, all three
full pages of text (several hundred words) were taken almost verbatim from<= br> the http://projects.webappsec.org/w/page/13246920= /Cross%20Site%20Scripting
article. Worse, you modified the example URLs from that article in an
attempt to hide the fact that the material was not yours.

That is full-on, wide-scale plagiarism that is inexcusable and unethical. You simply can't just reference the original if you re-print this book<= br> either. You must obtain permission from the original author if you are to use that much text. Otherwise, you can only use very small chunks of it, that fall under "fair use".

When I have time, I will write up the full details in an article that
covers the plagiarism and contact your publisher.


--f46d043c05c0694c7b04c2cd0ae7-- From officialrahultyagi@gmail.com Tue Jun 19 01:11:00 2012 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.2.5 (2008-06-10) on forced.attrition.org X-Spam-Level: X-Spam-Status: No, score=-3.6 required=4.6 tests=AWL,BAYES_00,HTML_MESSAGE, RCVD_IN_DNSWL_LOW,SPF_PASS autolearn=ham X-Original-To: jericho@attrition.org Delivered-To: jericho@attrition.org Received: from mail-wi0-f171.google.com (mail-wi0-f171.google.com [209.85.212.171]) by forced.attrition.org (Postfix) with ESMTP id 09830DF462 for ; Tue, 19 Jun 2012 01:10:59 -0500 (CDT) Received: by wibhi8 with SMTP id hi8so196570wib.0 for ; Mon, 18 Jun 2012 23:10:58 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :content-type; bh=0f4vxST+YUSqpFpwYzY0CjJnmoa27arsR+saVyAFSAk=; b=FN2/Iizj4gQHkea8+gWWSVJrsX7AVCwL6ZSf26jFJUBvtbWFUNtbcxzhU68Ya4InG1 oWVoD7Sb7ShOgUDmQyELbM1bZuiNjzuX/2W3gFu58qDFtw4dthEAoXYQiyh9b+MUKAmC eFKkt3/tn2UPDSd9ojUPbgPJRGrdjwJdNK+9FLVmctjmhQx22D5TSupDyawq6Pch2etM Ucue4wHlu7cgk7svHYQFCXMm147w58xL2+1nQdSyhCObK5LfsOsid8ixJklvL+s5DdWq bcjK4XxrBcQibUCkld0srEHqVbGQzDIUV7MJOmFE2iHlYQeY1IuWcVL87KxRd56yQ814 N8WQ== MIME-Version: 1.0 Received: by 10.180.20.137 with SMTP id n9mr441326wie.3.1340086256150; Mon, 18 Jun 2012 23:10:56 -0700 (PDT) Received: by 10.180.18.136 with HTTP; Mon, 18 Jun 2012 23:10:56 -0700 (PDT) In-Reply-To: References: Date: Mon, 18 Jun 2012 23:10:56 -0700 Message-ID: Subject: Re: Thanks For Getting My Book Jerico From: Rahul Tyagi To: security curmudgeon Content-Type: multipart/alternative; boundary=bcaec53d5ce5442a1d04c2cd25f5 Status: RO X-Status: A X-Keywords: X-UID: 41 --bcaec53d5ce5442a1d04c2cd25f5 Content-Type: text/plain; charset=ISO-8859-1 and also tell me so when i can see my self and this conversation on attrition ? On Mon, Jun 18, 2012 at 11:03 PM, Rahul Tyagi wrote: > No issues jerico, you again and again considering Website Chapter . as i > told you it is not from me but rest chapters are from me and if you found > any plagiarized content in that then i am ready to admit and and will give > credit to each source that is my promise but if it is plagiarized :). > > On Mon, Jun 18, 2012 at 11:00 PM, security curmudgeon < > jericho@attrition.org> wrote: > >> >> On Mon, 18 Jun 2012, Rahul Tyagi wrote: >> >> : : I found plagiarism in chapters 2, 3, 4, 6, 7, 8, 11, 13, 14, and 17. >> >> : well if you found plagiarism from these above chapters then i hope you >> : did not consider line by line text , if ettercap or another software >> : having manual commands written in book that are static and will be on >> : internet also as same . so will you consider it also as plagiarism. >> : content.Because i can not change it of-course ? >> >> I am not talking about one or two lines, or just command examples. As I >> already told you, as *one* example; Chapter 6, pages 39 - 42, all three >> full pages of text (several hundred words) were taken almost verbatim from >> the >> http://projects.webappsec.org/w/page/13246920/Cross%20Site%20Scripting >> article. Worse, you modified the example URLs from that article in an >> attempt to hide the fact that the material was not yours. >> >> That is full-on, wide-scale plagiarism that is inexcusable and unethical. >> You simply can't just reference the original if you re-print this book >> either. You must obtain permission from the original author if you are to >> use that much text. Otherwise, you can only use very small chunks of it, >> that fall under "fair use". >> >> When I have time, I will write up the full details in an article that >> covers the plagiarism and contact your publisher. >> >> > --bcaec53d5ce5442a1d04c2cd25f5 Content-Type: text/html; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable and also tell me so when i can see my self and this conversation on attriti= on ?

On Mon, Jun 18, 2012 at 11:03 PM, R= ahul Tyagi <officialrahultyagi@gmail.com> wrote:<= br>
No issues jerico, you again and again consid= ering Website Chapter . as i told you it is not from me but rest chapters a= re from me and if you found any plagiarized content in that then i am ready= to admit and and will give credit to each source that is my promise but if= it is plagiarized :).

On Mon, Jun 18, 2012 at 11:00 PM, security c= urmudgeon <jericho@attrition.org> wrote:

On Mon, 18 Jun 2012, Rahul Tyagi wrote:

: : I found plagiarism in chapters 2, 3, 4, 6, 7, 8, 11, 13, 14, and = 17.

: well if you found plagiarism from these above chapters then i hope you : did not consider line by line text , if ettercap or another software
: having manual commands written in book that are static and will be on
: internet also as same . so will you consider it also as plagiarism.
: content.Because i can not change it of-course ?

I am not talking about one or two lines, or just command examples. As= I
already told you, as *one* example; Chapter 6, pages 39 - 42, all three
full pages of text (several hundred words) were taken almost verbatim from<= br> the http://projects.webappsec.org/w/page/13246920= /Cross%20Site%20Scripting
article. Worse, you modified the example URLs from that article in an
attempt to hide the fact that the material was not yours.

That is full-on, wide-scale plagiarism that is inexcusable and unethical. You simply can't just reference the original if you re-print this book<= br> either. You must obtain permission from the original author if you are to use that much text. Otherwise, you can only use very small chunks of it, that fall under "fair use".

When I have time, I will write up the full details in an article that
covers the plagiarism and contact your publisher.



--bcaec53d5ce5442a1d04c2cd25f5-- From jericho@attrition.org Tue Jun 19 01:13:39 2012 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.2.5 (2008-06-10) on forced.attrition.org X-Spam-Level: X-Spam-Status: No, score=-4.4 required=4.6 tests=ALL_TRUSTED,AWL,BAYES_00 autolearn=ham X-Original-To: jericho@attrition.org Delivered-To: jericho@attrition.org Received: by forced.attrition.org (Postfix, from userid 1000) id E56C5DF4C7; Tue, 19 Jun 2012 01:13:39 -0500 (CDT) Received: from localhost (localhost [127.0.0.1]) by forced.attrition.org (Postfix) with ESMTP id E411CDF461; Tue, 19 Jun 2012 01:13:39 -0500 (CDT) Date: Tue, 19 Jun 2012 01:13:39 -0500 (CDT) From: security curmudgeon To: Rahul Tyagi Subject: Re: Thanks For Getting My Book Jerico In-Reply-To: Message-ID: References: User-Agent: Alpine 2.00 (LNX 1167 2008-08-23) X-Attrition: Attrition is only good when forced. http://attrition.org X-OSVDB: Everything is vulnerable. http://osvdb.org/ X-Message-Flag: WARNING: Over 100 published security vulnerabilities in Microsoft Outlook! X-Copyright: This e-mail copyright 2011 by jericho@attrition.org where applicable X-Encryption: rot26 MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Status: RO X-Status: X-Keywords: X-UID: 42 On Mon, 18 Jun 2012, Rahul Tyagi wrote: : No issues jerico, you again and again considering Website Chapter . as i : told you it is not from me but rest chapters are from me and if you You said on June 16: "... and reply for this SQL Injection and Cross Site scripting i wrote that but to increase the section people behind book added more content." You said on June 15: "Rahul Tyagi Wrote: As i told you before 92% of the book is written by me, and rest 5-8% except rishab and amrjit's articles were contributed by some of my students and my friends." Since you are changing your mind on which parts you wrote, here is another example: Chapter 8, pages 56-57 on keyloggers. This is two pages taken verbatim from http://searchmidmarketsecurity.techtarget.com/definition/keylogger. Chapter 11, pages 86-87 on types of viruses. This is two pages taken verbatim from http://www.makeuseof.com/tag/types-computer-viruses-watch/. Chapter 14, pages 105-106 on penetration testing. One intro paragraph and all of the bulleted paragraphs from http://www.secpoint.com/what-is-penetration-testing.html. Chapter 17, pages 157-158 on WiFi attacks. Some of the introduction, the image, and most of the four paragraphs taken from http://www.aboutonlinetips.com/wi-fi-security-how-to-secure-your-wi-fi-network/. So it appears that both you and your students have plagiarized. If you want to share their names and which pages they wrote, I will be glad to include it in my article. : found any plagiarized content in that then i am ready to admit and and : will give credit to each source that is my promise but if it is : plagiarized :). I don't know how many times I can say this. TEN CHAPTERS, maybe more, contain plagiarized material. You said you wrote 92% of the book. Do the math! That means the material you claimed to have written, was in fact plagiarized. From jericho@attrition.org Tue Jun 19 01:14:29 2012 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.2.5 (2008-06-10) on forced.attrition.org X-Spam-Level: X-Spam-Status: No, score=-4.4 required=4.6 tests=ALL_TRUSTED,AWL,BAYES_00 autolearn=ham X-Original-To: jericho@attrition.org Delivered-To: jericho@attrition.org Received: by forced.attrition.org (Postfix, from userid 1000) id 56B75DF462; Tue, 19 Jun 2012 01:14:29 -0500 (CDT) Received: from localhost (localhost [127.0.0.1]) by forced.attrition.org (Postfix) with ESMTP id 5598DDF461; Tue, 19 Jun 2012 01:14:29 -0500 (CDT) Date: Tue, 19 Jun 2012 01:14:29 -0500 (CDT) From: security curmudgeon To: Rahul Tyagi Subject: Re: Thanks For Getting My Book Jerico In-Reply-To: Message-ID: References: User-Agent: Alpine 2.00 (LNX 1167 2008-08-23) X-Attrition: Attrition is only good when forced. http://attrition.org X-OSVDB: Everything is vulnerable. http://osvdb.org/ X-Message-Flag: WARNING: Over 100 published security vulnerabilities in Microsoft Outlook! X-Copyright: This e-mail copyright 2011 by jericho@attrition.org where applicable X-Encryption: rot26 MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Status: RO X-Status: X-Keywords: X-UID: 43 On Mon, 18 Jun 2012, Rahul Tyagi wrote: : and also tell me so when i can see my self and this conversation on : attrition ? Yes, I will include our correspondence as well as the article that summarizes the plagiarism and gives my general opinion of the book. It should be up by the end of the week. From officialrahultyagi@gmail.com Tue Jun 19 01:21:27 2012 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.2.5 (2008-06-10) on forced.attrition.org X-Spam-Level: X-Spam-Status: No, score=-3.6 required=4.6 tests=BAYES_00,HTML_MESSAGE, RCVD_IN_DNSWL_LOW,SPF_PASS autolearn=ham X-Original-To: jericho@attrition.org Delivered-To: jericho@attrition.org Received: from mail-wg0-f41.google.com (mail-wg0-f41.google.com [74.125.82.41]) by forced.attrition.org (Postfix) with ESMTP id 167E9DF461 for ; Tue, 19 Jun 2012 01:21:26 -0500 (CDT) Received: by wgbds1 with SMTP id ds1so2099960wgb.0 for ; Mon, 18 Jun 2012 23:21:24 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :content-type; bh=S1N2ZelHV32cqUMghKartnwZFEaFvgPgcG5V1mtHAGU=; b=MU1Zq8+x4hXixIzisqp/zJkk4UAz8suFl/FkRMC6oz4MFGUiDHWYjXNH65O+Ltq6gH nqbazlPpzCaEm6PGrleBXN2aPUSKEPzrEYFPvm+SS3Ha2XAwWE6Su5z/CWNZ/YVL2003 OM+DfTgZkLKwifdcMhKbEb2KrlyRUEMZ1n2+ZBweSgCbaZvIvVMnNyoRKPk86KbNK2qO aGwqoO0/JI8c/byIPaO/vJBjrzH0noqtlj/6WZ8M/IsxEOAcQFyWtYjGIS/Ei1xwf2AX UmJa0Q1ib2XEFlrbxV5t5uRuImyiHJ+z1uIdF8ojD05W2bGPrkA0NoXTe/vjK/LK4i4G 0vYw== MIME-Version: 1.0 Received: by 10.180.107.70 with SMTP id ha6mr436314wib.16.1340086884794; Mon, 18 Jun 2012 23:21:24 -0700 (PDT) Received: by 10.180.18.136 with HTTP; Mon, 18 Jun 2012 23:21:24 -0700 (PDT) In-Reply-To: References: Date: Mon, 18 Jun 2012 23:21:24 -0700 Message-ID: Subject: Re: Thanks For Getting My Book Jerico From: Rahul Tyagi To: security curmudgeon Content-Type: multipart/alternative; boundary=e89a8f234d09bc820b04c2cd4ae6 Status: RO X-Status: X-Keywords: X-UID: 45 --e89a8f234d09bc820b04c2cd4ae6 Content-Type: text/plain; charset=ISO-8859-1 OK thanks for all links you gave me. and especially getting time to review. But i am not over yet soon will send you next slot of book and and this time do check it one more time, by this AUG. Thanks once again. --e89a8f234d09bc820b04c2cd4ae6 Content-Type: text/html; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable OK thanks for all links you gave me. and especially getting time to review.= But i am not over yet soon will send you next slot of book and and this ti= me do check it one more time, by this AUG. Thanks once again.

=A0

--e89a8f234d09bc820b04c2cd4ae6--