Announcement

Collapse
No announcement yet.

FORUM ALERT--ALL MEMBERS PLEASE READ!!!

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • #16
    No need to panic yet.

    Two things could happen. First, the hacker uses your password to post garbage here and elsewhere if your passwords and usernames are the same.

    Second, if you're running services like telnet, ftp, finger, etc, these are always at risk so nothing different unless our username and password happen to be the same as here, which would be stupid in any case. If your running windows, most ISPs filter non tcp/ip paquets, so again, it's the same kind of attack as usual.

    So basically, it shouldn't be more "dangerous" than usual, except again for possibility of impersonation (should be close to the word I am thinking about) on this board or other boards. If you use the same username and password for financial or commercial things, like registration where you buy your favorite things online, there is a minuscule chance of possible fraud, so better to change that password on the commercial/financial site. Better to change it anyway..

    I got me a nice firewall the other day. It's the DSL/Cable router by Linksys. It connects 4 computers and provides a firewall too, so no more attacks and Quake probes for me :-)
    Salmonius

    Comment


    • #17
      can anybody tell me if this IP is in the range that i should be worried about???

      IP: 212.186.59.146
      DNS: chello212186059146.12.vie.surfer.at

      this is in my bid "intruders" list and is a "subseven" port probe. the reason i ask is because i found a "strange" file in the root of my win2k disk(ntfs). the file was called "pad.esi" and it was 99.9 megs. it was also written the same day as the attack and my black ice engine was stopped when i got home that night from work. i deleted it straight away. it doesn't appear to belong to any of my programs, as everything is running fine.

      since i'm on a road runner network and this system is up all the time, this file could have been written to my system relatively quickly...i would like to believe that i prevented my machine from being used in a malicious attack on someone??

      chucky

      ps-the file and attack were done on 7-22-2000 @ 7:23 pm US EDT


      [This message has been edited by Chucky Cheese (edited 25 July 2000).]

      Comment


      • #18
        Pass that info onto Ant, Chucky.
        That exact IP addy tried to get into my system, although I think my BI stopped him. I caught him after the first 9 probes, and perm blocked that addy...
        Core2 Duo E7500 2.93, Asus P5Q Pro Turbo, 4gig 1066 DDR2, 1gig Asus ENGTS250, SB X-Fi Gamer ,WD Caviar Black 1tb, Plextor PX-880SA, Dual Samsung 2494s

        Comment


        • #19
          Jorden-> The reason of us Tweakers coming to MURC all of the sudden, is that someone put a link in one of our forums to the hackthread.
          And yesterday, we've talked about it in our chatroom.
          That's why.
          The path I walk alone is endlessly long.<br>It's 30 minutes by bike, 15 by bus.<br><i><font size="1">Puni puni poemi</font></i>

          Anime worth watching:
          <img src="http://home.hccnet.nl/k.schulten/zooi/cw-banner-01.gif">

          Comment


          • #20
            Yet another reason to post to the board from work - much more robust firewall protection than at home! Always safer (except for that whole 'you may get fired' thing...)

            If we post from home & from work, does that give this pinhead two IPs to hack (or just the IP registered to the e-mail address we gave at registration)? I'm not worried about work but I use ZA at home (and AV2000). I'll look for that file in my root directory.

            What a punk.
            PIII 550@605
            IWill Motherboard VD133
            VIA Chipset
            512MB PC133 CAS2 Crucial
            G400 DH 32MB (6.51 Drivers)
            DirectX 8.0a
            SB Live! Value
            8x DVD (Toshiba)
            6x4x24 CDRW (Sony)
            Intel Pro/100+ NIC
            3Com CMX Cable Modem
            Optiquest V95 19"
            HP 812C Color Ink Jet
            Microtek flatbed scanner
            Intellimouse Explorer
            Surround Sound w/two subwoofers
            AND WAY TOO MANY GAMES!!!

            Comment


            • #21
              Greebe,

              when we are on the NET..*WE* are our IPs', that is our identity!!! there is NO seperation of the two...

              its' sort of like being ONE in a crowd and having a SNIPER take just you out...

              chucky

              Comment


              • #22
                Kaj, I didn't know Unexplained through ICQ, I just followed his trail through his given ICQ number, as all other Mods here did, but they got stuck on the Dutch site.

                I know you closed that thread on Tweakers, but it was something I wanted to correct, in case other Dutchmen read that thread and think I was in on this "shithead"'s actions.

                Jord.

                edit: Kaj, heb je Pimmetje's pagina's op PCGeeks al eens helemaal gelezen? Hij had wel een erg grote mond over taalgebruik dat slecht is/was, maar zelf bakt ie er ook niet veel van. Ideetje om volgende keer onder z'n neus te duwen? /edit

                [This message has been edited by Jorden (edited 25 July 2000).]
                Jordâ„¢

                Comment


                • #23
                  About Un; he likes to think that the case has been closed, he told me that he got rid of the files copied from MURC and GoT (yes, he got our PW's too)and he even said that Ant called him to congratulate him on his action!

                  I have however, a hard time to believe that last thing, because Ant would have made that clear @ MURC, as far as I can tell after reading some posts made by Ant and the way you guys speak about him.

                  Jorden-> Taalvaardigheid is iets wat de meeste mensen op internet onbekend is, helaas...
                  Bij ons is dat af en toe een enorme hindernis; als iemand een probleem beschrijft, en daarbij leestekens en [enter]-s vergeet, wordt de zaak onleesbaar
                  Dan heb ik al eigenlijk geen zin meer om het bericht te lezen...

                  [This message has been edited by Kaj (edited 25 July 2000).]
                  The path I walk alone is endlessly long.<br>It's 30 minutes by bike, 15 by bus.<br><i><font size="1">Puni puni poemi</font></i>

                  Anime worth watching:
                  <img src="http://home.hccnet.nl/k.schulten/zooi/cw-banner-01.gif">

                  Comment


                  • #24
                    CC, first off DUH!
                    Secondly, I started a dialog with "Un" via ICQ the moment I discovered the MURC forums had been hacked. It's possible that I wasn't on the "Hit" list due to my level headedness over this issue. I haven't been "protecting" him in anyway, either here or via ICQ and have expressed my concerns to him. I personally feel that both sides took a rather immature approach to dealing with this situation. I asked him to not respond to us being upset and included why to boot! Problem is, our antagonistic postings apparently egged him to rebel through his peers.

                    He has informed me that he now realises this was wrong (a tad late tho). I do believe he had the best intentions from the get go, but sadly this had deteriorated

                    So instead of thrashing me, do what is neccessary and forward that info on to the proper authorities and get on with your life.
                    "Be who you are and say what you feel, because those who mind don't matter, and those who matter don't mind." -- Dr. Seuss

                    "Always do good. It will gratify some and astonish the rest." ~Mark Twain

                    Comment


                    • #25
                      Then again, how do we know you're not one of the notorious hackers??
                      Yeah, i'd hack the box i already have root on
                      I can't say I like the look of this Rick.
                      Ph34r m3 l33t h4x0r sk1llz 0r 1'll p4ck3t j00! Just kidding...

                      I have absolutely NOTHING to do with his "hack", i was the one who had to clean up the mess..
                      Now I don't know how far Tweakers is a forum and site that lets hackers do these kinds of things, provoked or not, without going to the local police, but that he downloaded the passwords and memberfiles from their forum is as illegal as hell. (Wetboek van Strafrecht kijk maar eens in Computercriminaliteit II, Rick)
                      We'll definately look in the matter, and follow whatever justice (gerechtelijke??) steps we feel neccesary.
                      Unexplained WILL face the consequences of his actions.

                      Rick Jansen, ServerAdmin www.tweakers.net

                      Comment


                      • #26
                        Ph34r m3 l33t h4x0r sk1llz 0r 1'll p4ck3t j00!

                        Now someone might explain that to me, I read it as "Fear me (my?) elite hacker skills or I'll packet (???) you!"

                        About you, Rick, being part of the notorious hackers, I already said I don't believe that, especially as I now daily skim headlines in GoT, although I haven't reg'ed there (yet).

                        It's just good to have you people over here as well. I might register at your forum, in case you need me

                        Jord.
                        Jordâ„¢

                        Comment


                        • #27
                          Jorden, a free translation will be - Fear my elite hacker skills or I'll packet you (to death), in othre words, show respect or I'll send some malformed TCP packets your way to show you some BSOD (blue screens of death) and worse. Nice threat...
                          Anyway, everybody, relax. if you want to read stuff about how to protect yourself check http://neworder.box.sk

                          H4p1 r1d1n6 & h4v3 ph4n !

                          ------------------
                          Cloudy
                          Asus P2B-DS, 2 x Celeron 400@75Mhz, 192Mb Ram, SB Live! Platinum,
                          2 x IBM 4.3Gb scsi,IBM 22GB IDE, Pioneer DVD ROM scsi, G400 32MB DH (Oc to 111.1%).
                          Cloudy
                          Asus P2B-DS, 2 x Celeron 450 (400@75Mhz), 192Mb Ram, SB Live! Platinum,
                          2 x IBM 4.3Gb scsi,IBM 22GB IDE, Pioneer DVD ROM scsi, G400 32MB DH.

                          Comment


                          • #28
                            Let me say this:
                            • My IP is static (212.187.63.14), I have nothing to do with those other hack-attempts. Do not get paranoid.
                            • I destroyed all passwords.
                            • This forum STILL is NOT secure. There is a possibility other people are messing with your accounts right now. I do not take any responsibility for that.
                            • Jorden: Mij op enkele taalfouten pakken vind ik gewoon laag. Dat je het er niet mee eens bent, ok. Maar dat je dan zo ontzettend infantiel moet doen komt mij m'n strot uit.


                            I will awnser all questions through E-Mail ( unexplained@pc-geeks.net ) or ICQ (47515512).

                            Comment


                            • #29
                              My IP is static (212.187.63.14), I have nothing to do with those other hack-attempts. Do not get paranoid.

                              I destroyed all passwords.


                              Please tell me how you think to convince us of your statements? You surely must know you already lost all your ceredibility with us (if you ever had any).

                              Maybe I am wrong, but I think it's safe to speak for all people on your forum: please get the **** out of here, and never, ever post here again. Even if our forum is not 100% safe (which no forum ever will be anyway), only people like you will exploit these security exploits.

                              Just go away!, and only hack things when you were asked to by the people responsible for the stuff you hack.

                              [This message has been edited by dZeus (edited 26 July 2000).]

                              Comment


                              • #30
                                I do not take any responsibility for that.
                                And why should you be or anyone else think that you are. Except of course if you gave someone else an idea. Unlike what you think we don't need little brother watching us. Especially you.
                                ][|_||\|§0\/\/

                                Comment

                                Working...
                                X