Security Hole in Morpheus 264
Saint Aardvark writes: "The BBC reports that they've been contacted by a group claiming to be able to copy any file off
some Morpheus user's hard drives. Apparently a bug allows for a great deal more file-sharing for some users of the software than intended ..." Man this thing got submitted a lot. I've never
actually seen Morpheus, but apparently a lot of readers have! There
really isn't a lot of information except that if you're running
Morpheus, you might as well consider your hard drive world readable ;)
Rats (Score:5, Funny)
Re:Rats (Score:1)
There's a huge difference between "copywritten" and "copyrighted." "Copy," in these words, means two different things.
In "copywritten," it means text. For example, the text in a magazine advertisement can be called ad copy.
However, in "copyrighted," the copy refers to duplication. A copyright is a right to copy.
Someone who writes copy is called a copywriter. Therefore, copywritten would refer to text written by a copywriter, NOT copyrighted property.
Sorry for the lesson, but I've been seeing it a lot and thought I should do something.
giFT (Score:1)
Re:giFT (Score:1)
Re:giFT (Score:2)
important to support giFTproject (Score:4, Informative)
*sigh*
If you are tired of bitching and want to do something about it then get invovlved [giftproject.org].
Cheers...
Re:giFT (Score:2)
here is how to do it (Score:1, Informative)
http://users.pandora.be/lechat/Morpheus%20Explo
how to protect yourself (Score:4, Informative)
Re:how to protect yourself (Score:2, Insightful)
Re:how to protect yourself (Score:3, Informative)
The REAL protection is to unshare any folders that shouldn't be accessible to the public. Simple, sweet, and common sense. The only way that your private files will be shared in a default installation of Morpheus/FastTrack client is if they are saved to the (newly created) directory.
Think about it. Read the BBC article. Then try to genuinely *HACK* Morpheus, and if you are successful in your mission I will eat my words with relish.
Sorry for tone of post, but it needed to be said.
Re:here is how to do it (Score:4, Redundant)
rOD.
Re: (Score:2)
The real security hole. (Score:2, Insightful)
Re:here is how to do it (Score:1)
Re:here is how to do it (Score:1)
What's next, will we see newspapers reporting that all email servers are vulnerable to "hacking" because they can be logged into via telnet?
Just because you can interact with a service using a client other than the one intended, doesn't mean it's a hack...
Re:here is how to do it (Score:2, Informative)
Here's the details on what exactly the vulnerability is [iss.net]
Basically, the assertion that one could gain access to the whole hard drive is false. Looks like a FUD attack on file sharing to me.
Re:here is how to do it (Score:3, Informative)
I tried that against a machine running Morpheus, and the only files that were listed were files in directories that I had told Morpheus to share. IOW, the only files made available via HTTP are the same files made available via FastTrack's protocol. Would someone like to explain to me how this constitutes a security hole? IIRC, this feature of Morpheus is documented (don't recall if it can be switched off).
FWIW, the machine running Morpheus is behind a firewall...HTTP access to it gets blocked anyway. (The little bit of testing I did was from another machine on the LAN.)
Re:here is how to do it (Score:2)
Here's a way to do something that you could do with the Kazaa/Morpheus clients software anyway
Is there any directory traversal technique that I can use to see files outside of the shared kazaa/morpheus folder?
fastrack (Score:2, Insightful)
all the more reason to use GIFT's open network
http://gift.sourceforge.net/
Re:fastrack (Score:2, Interesting)
it's the same damn thing as grabbing their ip with netstat -n in dos (with the port 1214) and plopping it into your browser. Big deal. So instead of using morpheus, you use your browser and a bit more work to look at the contents a user is sharing.
The person on the other end sharing files, STILL RETAINS CONTROL OF WHAT HE OR SHE **WANTS** TO SHARE. True, some are idiots and share their entire hard drive, but that doesn't matter since you can't upload a damn thing using your browser.
Your post clearly indicates your ignorance of the topic, as well as a shameless plug for some inferior open source p2p network.
A penny for my thoughts? Here's my two cents. I got ripped off
Not that big of a deal... (Score:1)
Really though, this is pretty sad since the paranoid people who have been saying that P2P software makes you vulnerable are right in this instance.
AFAICS (Score:1)
Re:AFAICS (Score:1)
:-)
Uhh (Score:1, Informative)
Mod parent up please (Score:1)
Re:Mod parent up please (Score:1)
An unnamed group of "security experts" has contacted the BBC and told them that such-and-such was so. No one is named. No indication that this exploit was demonstrated to anyone. Just raw allegation.
I thought the BBC Sci-Tech department was better than this.
If you would have taken the red pill (Score:1, Funny)
Other links (Score:1)
This finding would appear to be a new development since The Register [theregister.co.uk]'s recent report [theregister.co.uk] suggesting Morpheus "is free of malicious code."
Caution of another possible security hole in this software was mentioned [tech-report.com] by
The Tech Report [tech-report.com] precisely 6 months ago today (give or take a time zone or two).
Looks like this will keep us on our toes for a while.
upside is (Score:2, Redundant)
Disinformation anyone? (Score:5, Troll)
Security experts have been investigating this problem since coming across it on Friday.
"We're not sure what it is that makes some Morpheus members vulnerable to this," said one, who asked to remain anonymous.
It's definitely an accident from Morpheus' side, probably a worm. This is very dangerous."
Uh huh...rather short on details, arent they?
Anyone else getting the feeling that this "story" is in fact disinformation that probably originates with RIAA?
Re:Disinformation anyone? (Score:1)
Re:Disinformation anyone? (Score:2, Interesting)
Okay, yeah, that was my first thought, as well. Given all of the flak that MS has gotten over security holes, it is the sort of thing that a dumbshit trying to commit PR sabotage would try and pull off. If you recall that the RIAA let it be known (I don't think the bill was actually submitted) that they want protection against damages they inflict while hacking our hard drives, we can conclude that the RIAA is unscrupulous enough to try something like this.
Now, firstly, all of that is pretty circumstancial. Smoke and mirrors, hearsay.
The reason I don't think it was the RIAA is that it wasn't slick enough. The RIAA may not be smart, but they are smooth. Glossy and convincingly packaged. This story reads like a communication between a reporter and his friend, a second rate hacker in a garage somewhere (Hey, I know both of these people!) Second rate hacker says "Hey, I think I've found a security hole in Morpheus! Probably a worm." Reporter says "Can I print that?" Hacker says "Uh.... don't put my name on it."
Given the tenor of the article, the (frankly obscure) place it shows up, and the lack of exact quotes - an RIAA "agent" would have given smooth reading soundbytes - I think that it's simply a screw up, with no malicious or deceptive intent. Never ascribe to malice what can be explained by stupidity.
Now, I know, it is still possible that the RIAA was clever enough to figure this out, and figure the way to make it look convincing. It is also possible that this is some sort of RIAA test to see how much attention this thing attracts, before setting off real hoaxes. That, however, is paranoia.
On the other hand, just because you're paranoid..... doesn't mean that this won't give the RIAA ideas.
Not So New (Score:1)
Greater Risk? (Score:3, Flamebait)
Re:Greater Risk? (Score:2, Interesting)
Read the decision in the Napster case. Nothing in that ruling specifies that file-sharing is illegal. What was illegal was copyright infringement. To prove copyright infringement, the copyright holder has to demonstrate an instance in which his copyright was violated. An instance of pirated software is illegal regardless of whether it is shared over a network. As previously mentioned, MP3 files are not inherently illegal.
Child pornography is illegal regardless of whether you share it over a network. You can email child pornography. For that matter, you can email a copyrighted image or copyrighted text, thus creating an infringing copy of the material. Does that make email illegal?
I realize you're just trolling, but given the opportunity I'm always happy to try to educate or persuade people who may not quite grasp the intricasies of these matters. I can easily gloss over flame bait originating from cowardly pipsqueaks if it gives me the opportunity to do so, or just laugh it off if it doesn't.
So what else ya got??
--------
From the Morpheus website.... (Score:1)
Q: Can I get viruses using Morpheus?
A: As always when you are downloading or receiving files from the Internet, you must exercise caution. Certain file types may contain viruses or so-called Trojan horses. You should protect yourself by using regularly updated anti-virus software, for example Norton Antivirus (www.norton.com) or McAfee (www.mcafee.com ). Both Norton and McAfee offer free 30-day trial versions that you can download directly from their web sites. Not all file types can contain viruses or Trojans. Music, video, and picture files are generally safe - that includes files with the extensions
Update Feb. 2 2002: The above warning is the least of your worries.
pr0n (Score:1)
IS this FUD or what? Possibly... (Score:2, Insightful)
The quote, "It's definitely an accident from Morpheus' side, probably a worm. This is very dangerous," contributed by some anonymous figure is a buzzword-injected contradiction. A worm is the opposite of an accident. It seems unlikely that would be the sort of comment from an informed source.
This story may turn out to be true, but they could not be any lighter 1) details 2) qualified sources.
M.O.R.P.H.E.U.S. (Score:5, Funny)
O rganized
R ather
P oorly,
H enceforth,
E veryone can
U se your
S hit
Good (Score:1)
Re:Good (Score:1, Informative)
Perhaps you're talking about the filenames for partial downloads? You do realize that morpheus and kazaa share a p2p system, don't you? Oh, wait; you don't the first fucking clue. Sorry I asked.
ARTICLE IS FALSE (Score:5, Interesting)
Re:ARTICLE IS FALSE (Score:2, Informative)
Quite right.
In fact, this stuff has been known about for quite some time now. A quick search of Bugtraq came up with this message [securityfocus.com]. It basically says that Fasttrack based clients have a built-in http server. Big deal.
This sounds more like a misconfiguration issue in the sense that people may be sharing entire harddrives. But until this is discussed and verified in some sort of forum like Bugtraq I wouldn't believe it.
Re:ARTICLE IS FALSE (Score:2, Insightful)
Somehow I suspect you've missed soemthing...
Re:ARTICLE IS FALSE (Score:3, Interesting)
Try every combination of things you could possibly do to transverse the shared folder. I didn't find a way, maybe I did miss something but I think a bunch of 12 year old wanna-be hackers thought they stumbled onto something when really they found a window in the front door.
Re:ARTICLE IS FALSE (Score:1)
Doesn't help when the story isn't true. I mean this is just as good:
"Some security experts have reported that this thing called 'a web server' can giver users access to all your files if you set it up to"
Yeesh.
Re:ARTICLE IS FALSE (Score:2)
Re:ARTICLE IS FALSE (Score:5, Funny)
in apache server.
Unsubstatiated Rubbish (Score:2, Insightful)
FWIW, I use Morpheus quite a bit (always using FairTunes if I keep the song), and I haven't had any problems with it, not spyware, not this, not anything; and I will continue to use it until I see confirmation from at least one other source.
On the other hand, who knows? Maybe the "Concerned Party" just happens to be paid by one of the **AA's? Think about it. They tell a news org about this "hole" they've discovered, saying, "It's dangerous! Don't use it!", with no proof that would convince even your slightly above average user. Now, us geek types might not flinch, but a whole lot of others out there might. Oh well, just my 2c US.
Ermm, its actually a bit worse than some think.. (Score:1, Informative)
If this is any kind of domain controller, remember that your SAM file can be downloaded, and if your system has microsoft network file sharing open or is running any part of the IIS suite, your as good as hacked. It can be downloaded and brute hacked with L0pht crack.
If you run any of the popular online games such as Quake 3 arena or Return to Castle Wolfenstein, your cd key is stored in plain text. All of a sudden you can't play because it is in use by '3l33t hax0r' 24x7. Other games such as Starcraft and HalfLife keep the key in the registry, which is also accessible. (see above)
Any kind of online login is vulnerable. These h4x0rz can use your sign in to Amazon.com and "One Click" a library to their address with your credit card. Your online porn accounts, your SSH and PGP private key, the list goes on.
And lets not forget those pictures of your wife you took with the new digital camera in your bedroom.
Toodles, who thinks its funny that people feel this is an insignificant security hole, and that the hole in XP was a threat to all mankind.
Re:Ermm, its actually a bit worse than some think. (Score:1)
Are they sure the people didn't do it themselves? (Score:4, Interesting)
My inner paranoid, who left the fetal position to read the RIAA thread, thinks this is a music industry plot. I want to say that that is totally preposterous, but after they asked for legislation to make it legal for them to hack our hard drives, I can't totally dispel the suspicion.
What's new? (Score:2)
Then there's Windows. People sharing their drives (God knows why you'd share a drive unless you have more than one computer in your house, but who knows), and those people were exposed by Sharesniffer (which seems to have disappeared, otherwise I'd provide a link. It's IP address now resolves to 10.10.10.10).
Okay, so now there's a flaw in Morpheus that isn't published, and you'd probably have to be a programmer to expose it anyway. Big deal.
Just my personal opinion, but this isn't too newsworthy.
Come on! Tell us something NEW (Score:1)
A total BGO - "Blinding Glimpse of the Obvious" I mean come on! The day any file sharing software is secure is not happening any time soon. POST DECENT ARTICLES ON SLASHDOT PLEASE.
This is not a big deal! (Score:1, Redundant)
This so-called hole only allows access to the folder of files the Morpheus user specifically designated for sharing.
If they're not sharing their "My Documents" folder, hackers can't download the files contained in that folder.
The same goes for a user's Quake 3 directory, Half-Life folder, SAM database, wifey porno pics, etc. If the folders containing these files are not shared through Morpheus, THIS HACK WILL NOT ALLOW ACCESS TO THESE FILES.
Try it on your own machine and you'll see what I mean.
Re: (Score:1)
Not A Hack (Score:5, Informative)
just HTTP to the person's port 1214 and morpheus (or Kazaa or whatever FastTrack client i suppose) gives you a list of shared files.
THERE IS NO DANGER FROM THIS "EXPLOIT"
i think that someone creative should write a really short perl script to scan IP netblocks on port 1214, connect to HTTP and list the shared files, then create an index. you could also add port 139 to scan WFW shares while you are at it. you could create your own FastTrack "supernode" with this method, if you were really inclined.
when i read the story header i thought that it meant that any file on my hard drive was accessible via some nimda/codeRed type exploit. this is not the case.
VERDICT: story not worth posting.
Muerte
Re:Not A Hack (Score:4, Redundant)
They did. It's called Morpheus. But it's not quite as crude.
Already done (Score:3, Informative)
Although the project's primary goal is to provide a Free alternative to the FastTrack network, giFT includes a tool that scans arbitrary IP address ranges on port 1214 and indexes the results, offering the discovered files through either an http or Gtk+ interface. It's a waste of bandwidth, but some would argue that it gets the work done.
I hope people support giFT in creating a secure, Free Sofware alternative to FastTrack. All these stories of spyware and root holes (even if unsubstantiated) are quite disturbing.
Re:Not A Hack (Score:3, Informative)
Using the Morpheus program, they found a way of getting a random list of people using the service. They could then obtain details of the content of a user's hard drive and make copies of any file. "We're not sure what it is that makes some Morpheus members vulnerable to this," said one, who asked to remain anonymous.
If you were referring to the 'exploit' someone posted earlier about pointing a web browser at a node, then that obviously isn't any kind of exploit. However, the issue they mention in the article sounds very different.. the article even mentions a worm.. They also say that not all users are affected, the issue you describe would affect everyone (assuming no firewall that blocks connections to 1214).
Re:Not A Hack (Score:4, Informative)
Search for something with Morpheus and it'll come back with a list of hosts that have it. If it communicates with those hosts directly, you can get their IPs with netstat -n.
Morpheus has an option within the program that does this...you can select one of the search results and tell Morpheus to go looking for whatever else that user has shared. You can download any available file through the Morpheus interface or from the HTTP server that the remote Morpheus puts up on port 1214.
How about "some dumbshit's stupid enough to tell Morpheus to share C:\ and everything underneath it"?
The story is either a hoax or is FUD of some sort. You wouldn't think the Beeb would screw up this badly, but nobody's perfect.
A Worm??? (Score:3, Interesting)
A worm???
Like Code Red? Or NIMDA?
This sounds like some crack addled reporters posing as computer hackers.
Scenario 1: There is a hole and it will be confirmed through trustworthy channels. It is a buffer overflow or http path traversal problem. The reporters or editors got confused when the brainiacs described it to them and attempted to describe it in terms everyone understands, hence a coding mistake from FastTrak or Morpheus being described as a 'worm'.
Scenario 2: There is a worm exploiting Morpheus. Fat chance the first we hear of this is from BBC.
Scenario 3: They discovered that Morpheus uses http over port 1214 as a transport layer and were amazed to find out that some people have shared their entire hard drive. Wanna find everyone that has their entire hard drive shared? Just search for some windows component that shouldn't be shared. Try it, you'll be amazed. Others have covered this in greater detail, including variations that make even more sense.
Scenario 4: Conspiracy. Also more details in other posts.
Re:A Worm??? (Score:2)
Re:A Worm??? (Score:2)
Re:Not A Hack (Score:2)
As far as being able to access any file on your hard drive, I haven't found anything about that. This also appears to be fairly old news.
Re:Not A Hack (Score:2)
Actually, according to this [tech-report.com], it sounds like the problem is that the http server doesn't obey the other rules you set, i.e. to share or not share certain file types, bandwidth limits, number of upload limits, etc.
I would speculate that the people who posted that are idiots. The guy who had Zone Alarm Pro must have clicked OK when it asked if Morpheus could act as a server, and yet he is shocked that he is able to access it as a client, "penetrating" Zone Alarm Pro.
Since HTTP is the normal method used by Morpheus for file transfers, it is doubtful that the restrictions Morpheus imposes on outgoing connections do not apply just because you use a different HTTP client. I have in fact tested myself and determined that it does not share files you don't choose to share, that it respects limits on both bandwidth and number of uploads, and that such transfers are listed under Uploads on the Morpheus server like any other outgoing transfer.
In short, this is the normal method Morpheus uses for peer-to-peer connections, not an exploit.
Maybe they just need a clue-train... (Score:2, Interesting)
Re: (Score:2, Informative)
Kazaa (Score:1)
Spyware > Insecure
or
Insecure > Spyware?!
Surprised? (Score:1)
Hardly a hack, just a feature (Score:1)
I wonder... (Score:1)
Not an Exploit (Score:1)
4. Exploit
Here are the steps for exploiting this hole:
1. Open M/K.
2. Search for anything you'd like to download.
3. Start downloading it.
4. Open a MS-DOS prompt and type "netstat -n" without the quoting marks. (This
should display all the active connections with IP numbers, not hostnames).
You should get something like 'xxx.xxx.xxx.xxx:1214" in the 'Foreign Address' column.
Where xxx.xxx.xxx.xxx is an IP Address.
5. Open your webbrowser and type in 'http://xxx.xxx.xxx.xxx:1214' and press enter.
6. Voila! You got the list of the shared files from xxx.xxx.xxx.xxx. Now you can download
any file you want, however if the user is full (meaning that he's got no more slots left)
you wont be able to download anything.
Err... isn't the same as Right Mouse Button -> Find from the same -> User built into Morpheous?
-Bill
Re:Not an Exploit (Score:1)
Err... isn't the same as Right Mouse Button -> Find from the same -> User built into Morpheous?
Yeah, but if you do it the slightly harder way, you're a 1337 hacker.
Security Hole in Morpheus (Score:4, Funny)
Burritos! (Score:1)
This is not new or news (Score:1)
If you are running morpheus or kazaa or whatever client of the fasttrack network you can try this: open up your browser and type "http://localhost:1214"
you will see an index of all the files you are currently sharing. Just for fun you can also try to download files. If you know of a friend who is running kazaa or morpheus, find his ip and place in the place of localhost. See if he has any good pr0n.
I seriously doubt this constitutes a breach of security it doesn't reveal any information that isn't available already.
that's it. move along.
big whoop (Score:1)
Uh oh! Security Hole! (Score:3, Insightful)
It's called "being an friggin idiot and setting the server root to /". However, just like Morpheus and Kazaa, it only takes place under special conditions, notably when "Directory Browsing" is turned on in Apache, called "Virtual Directory Browsing" in IIS.
This bug, previously encountered before, is casually referred to as the "idiot-moron exploit." Tell me you've never seen .doc files shared on WinMX, et al before. Of course for Apache, IIS, etc, your file permissions have to be set correctly... However, Kazaa runs as the current user, so it only has access to whatever the current user does.... SHARING EXPLICITLY WHAT IS IN THAT DIRECTORY! So, say, for example, I "accidentally" place naked_picture_of_my_cute_girlfriend.jpeg in "My Shared Folder".... It's not a freakin' bug if someone has access to that!
Kazaa has always used HTTP as its protocol, and this "interface", should you call it, it probably what it uses to get that respective user's database of files. Duh. Click on them, and look at all their files in Kazaa, or use a web browser. Hardly a difference. Unless of course the docroot is C:\. But then again, is that an exploit??? This is ridiculous. Please Slashdot, check the validity of the articles before posting!! :)
EXPLOIT? Don't think so... (Score:5, Informative)
This comes from the fact that the FastTrack protocol transfers and requests files via the HTTP protocol, thus any HTTP speaking application (such as a web browser) should be able to do the same as a Morpheus client, which is really only a fancy web browser.
In fact, the OpenFTP has a program which does in fact scan IP address ranges from the 1214 port number, indexes the files, and then provides these for searching on the OpenFT network. They even have a memory-dump function which dumps the entire memory block of the Linux KazAa client kza (no longer available), and searches for IP addresses to index.
I would question the so-called 'group' the BBC contacted. It's either an ultra-liberal doomsday security group like that of Steve Gibson or is a very good (?) attempt by the RIAA to scare people off the FT network, which now has peaked at over 700,000 connected nodes.
But as for a security threat, there is no concern. The only files accessible on the internal web server are those which have been specifically selected to be shared, and a dynamic wwwroot is then generated based on selected directories (usually just My Shared Files).
Remote download queues... (Score:2)
Since the "hack" apparently allows downloads via HTTP, my guess is that Morpheus's built-in queue for those downloading from you will no effect... thus if you find yourself trying to download a file but are stuck in someone's queue, this might be a way to get around that and begin the download immediately.
If you're behind a NAT firewall you're probably protected because a direct HTTP connection is required.
I haven't verified anything yet, but initial observation supports my theory... now back to testing.
Re:Remote download queues... (Score:2)
Kazaa makes files world-readable if .... (Score:5, Informative)
The common factor observed in ALL cases was ANY file present with high ASCII in the filename. (I'd guess mostly or entirely on Win32 systems using an Oriental character set, judging by the MP3s present.)
Note: I do not have Kazaa installed myself, nor any of its kin. I was viewing these unexpectedly available files with plain old Netscape 3.
There were complaints about similar events on the Kazaa "report bugs" forum. (After reading that forum for a while, no way in hell would I install the Kazaa client -- since it also had a habit of randomly wiping out files on some systems.)
Anyway, it wouldn't surprise me at all if Morpheus has a similar bug.
Re:Kazaa makes files world-readable if .... (Score:2)
Disabling sharing and then reconnecting to the localhost displayed a blank HTML page. I don't see any flaws here. Tried a variety of directory traversal tricks and they all failed. I suppose there could be a buffer overflow...
Re:Kazaa makes files world-readable if .... (Score:2)
Anyway, I saw it enough times, with enough consistency, to be quite certain the bug exists and is a hazard to the user's privacy -- I was able to wander freely among their files and view/download anything I wished.
Re:Kazaa makes files world-readable if .... (Score:2)
Re:Kazaa makes files world-readable if .... (Score:2)
Re:Kazaa makes files world-readable if .... (Score:2)
Or are you saying dumb config mistakes are only possible if you don't have good English?
Yeah, HTTP on a different port ... (Score:4, Interesting)
If you really want to make a 'hidden service', you'd make the client break the files up into smaller packages (much like warez RARs), name them random files from the Internet Cache folder, send them on port 80, include a file that tells the receiving end how to put them back together, and you'd be set. It would just look like someone was browsing the Internet. It would be four megabytes worth of webdata
~LoudMusic
Anonymous genius cracks Morpheus! (Score:2, Interesting)
It should be obvious to anybody reading this thing that the "random list of shared personal filez" and such is a big user booboo. Obviously some people are st00p1d enough to leave personal details n docs in a shared folder..
How much did the RIAA pay to get this posted?
So, direct connect is worse! (Score:2)
It is a huge security hole. (Direct Connect has next to no authentication of, uh, anything)
Only think is that only one user has the utility that is able to do this and he is not giving it out to anybody else.
Suffice to say though everybody is scared shitless of him. When he walks into a HUB everybody else zips up and doesn't say a word.
Bugtraq info (Score:2)
http://www.securityfocus.org/archive/1/211663 [securityfocus.org]
who found the hole? (Score:2)
Does this include sending reports of security holes to high-profile news sites?
not_cub
Oh please... (Score:4, Informative)
Re:Oh please... (Score:1)
Re:Oh please... (Score:2)
- A.P.
Re:Oh please... (Score:2)
~z
Re:Slashdot Not Newsworthy (Score:2, Insightful)
Re:Slashdot Not Newsworthy (Score:2)
Did you think my post was at +2 because it got moderated up? Once again, you could have easially found out that I post at +2 and got moderated down on this one several times.
In the future, try not to bash someone (or moderate them down as the case may be) just because you dislike or disagree with what they have to say.