September 29th, 2005

mask

Thursday, September 29



Totally hacked again... Not Good... Not good in many many ways.... bastards"
(and do I ever look like a nimrod in that picture... hahahaha)

See below for the "story so far!"

Absolutely bazing outside...
windy like mad last night...
and bedroom window open :D
We were all snuggled in so deep,
I bet there was steam rising from our bed. :)

The rain started at breakfast...

Fall with a chip on it's shoulder.
(I'm freezing... i should have brought a big sweater!!)

wearing
~ geek egg on my face... grrrrr!
~ red ftls
~ my fav cargos... khaki and comfy
~ long sleeve slacker shirt...
planning
~ deciding on a web host...
~ more documentation at work... loads on my plate.
~ Survivor Tonight.
wishing
~ I didn't have to give up ... but this attack stuff is a) killing my time and b) potentially litigious.
~ to send a bit of positive energy out to debby... just 'cuz...
~ and a bit of a congrats!!! for bitchcakes_xo regarding sugar-cait's marks!!!!

///

The story so far?
Last night... we totally enjoyed watching Lost... and when we went upstairs after... the net was down.
Yeah... well down translated into my server was dead... frozen solid.
Reboot...45 seconds... frozen solid.
ahhhhhhhhhhhhhhhhhhhhhh!
Reboot... same deal.
Reboot... vi messages log... frozen
Reboot... vi maillog frozen... but wait... what's that?
videotron? sending email to someone at videotron?
Reboot... service stop sendmail
wait... wait... wait... no freeze...
Ok, think think think...
Check temp directory...
Temp dir !!!!!!
files in temp?
cafu3.tx.t - huge list of a million users at videotron and at sympatico...
keyring-05kgmC - a directory with a socket file in it...
gconfd-root - a directory with other sockets...
other text files... that turn into web pages when they're embeded in an email... (PHISHING EXPEDITION!!!)
and a few others...

Someone hacked me again... setup an exploit of sendmail (I think) and began a spam attack from my host...
AND I THOUGHT IT WAS SECURE... so fuck if I know...
The files are all owned by apache... is that a clue that the exploit is through Apache? WTF?!!!!

BUT IT'S OVER
~ I'm going to shut down the server and contract a hosting service. Fuck this noise.
  • Current Mood
    very bummed!!
newavi

(no subject)

what I need... is a way to run sendmail without it kicking in a vast process to move all the queues.
How do I clear the sendmail mail queue?

my domain email is on my registration ... and my registraur charges 45$ to process a change manually... and if I can't read my mail from corto.ca ... then I can acknowledge the "confirm change" info when I go to my registraur to change ... ie. my fricking email address.