Comment Re:News Flash (Score 1) 878
I thought it was pike.
"Pike is a dynamic programming language with a syntax similar to Java and C."
I thought it was pike.
"Pike is a dynamic programming language with a syntax similar to Java and C."
Imagine the smell when all 120 lost climbers thaw.
I did this years ago. By planting bogus email addresses from my mail domain on the web and feeding these addresses directly to a statistical spam filter I would get instantly updated on the changes in spam templates. Because the spammers were feeding the filter themselves I get a very low FP-ratio and extremely tight spam blocking.
I'm still using fvwm and have been doing it for 10+ years. Over the years I've tried switching to gnome or KDE several times but found them too be too slow and lacking features and ended up back in fvwm again. I even tried gnome + sawfish for a while but the constant lisp hacking got the best of me. Fvwm has for a long time and still handle multiple monitors perfectly well and I'm still very happy with it.
How is the bank assuming google has the power to figure out the accidental recipient's real name and address, without going to court themselves?
Manually compromising servers and installing a tool that causes all those servers to rendezvous with or receive commands from a central control point to execute instructions would make them a botnet.
The key question would be: do the compromised servers also run a program that periodically polls a control station for commands, or does the script kiddie manually command individual compromised servers?
I actually encountered this a few years ago, a Red Hat box had been carelessly placed on the internet with a poor dba username password combo. The attacker had not gained root access. But he did manage to install zombie software on the computer in
Curious, I took a copy of the software he had installed before I wiped the server. I then proceeded to connect to his irc server using the credentials found in the zombie software. I ended up in an irc channel with the actual owner of the botnet sitting there. Because I kept my servers original irc-name he started prodding me with dcc-commands to find out the status of his returning zombie. After a while I responded and told him he had been discovered, we had a brief chat before he banned me from the irc-server. Seemed like a script kiddie, he used "LOL" in every sentence and lots of numbers, the net seemed to be run manually with some 30 "clients" in it. I gave his client IP to his ISP in Romania together with the logs, doubt anything came out of it though.
If you subtract the storage medium?
My company has some servers located on Malta, we were down for about 8 hours before they could re-route the traffic. Ironically, we have better routing through Europe now than before the break.
To get back on your feet, miss two car payments.