Mostly harmless (corto) wrote,
Mostly harmless
corto

  • Mood:

Thursday, September 29



Totally hacked again... Not Good... Not good in many many ways.... bastards"
(and do I ever look like a nimrod in that picture... hahahaha)

See below for the "story so far!"

Absolutely bazing outside...
windy like mad last night...
and bedroom window open :D
We were all snuggled in so deep,
I bet there was steam rising from our bed. :)

The rain started at breakfast...

Fall with a chip on it's shoulder.
(I'm freezing... i should have brought a big sweater!!)

wearing
~ geek egg on my face... grrrrr!
~ red ftls
~ my fav cargos... khaki and comfy
~ long sleeve slacker shirt...
planning
~ deciding on a web host...
~ more documentation at work... loads on my plate.
~ Survivor Tonight.
wishing
~ I didn't have to give up ... but this attack stuff is a) killing my time and b) potentially litigious.
~ to send a bit of positive energy out to debby... just 'cuz...
~ and a bit of a congrats!!! for bitchcakes_xo regarding sugar-cait's marks!!!!

///

The story so far?
Last night... we totally enjoyed watching Lost... and when we went upstairs after... the net was down.
Yeah... well down translated into my server was dead... frozen solid.
Reboot...45 seconds... frozen solid.
ahhhhhhhhhhhhhhhhhhhhhh!
Reboot... same deal.
Reboot... vi messages log... frozen
Reboot... vi maillog frozen... but wait... what's that?
videotron? sending email to someone at videotron?
Reboot... service stop sendmail
wait... wait... wait... no freeze...
Ok, think think think...
Check temp directory...
Temp dir !!!!!!
files in temp?
cafu3.tx.t - huge list of a million users at videotron and at sympatico...
keyring-05kgmC - a directory with a socket file in it...
gconfd-root - a directory with other sockets...
other text files... that turn into web pages when they're embeded in an email... (PHISHING EXPEDITION!!!)
and a few others...

Someone hacked me again... setup an exploit of sendmail (I think) and began a spam attack from my host...
AND I THOUGHT IT WAS SECURE... so fuck if I know...
The files are all owned by apache... is that a clue that the exploit is through Apache? WTF?!!!!

BUT IT'S OVER
~ I'm going to shut down the server and contract a hosting service. Fuck this noise.
Subscribe
  • Post a new comment

    Error

    default userpic

    Your IP address will be recorded 

    When you submit the form an invisible reCAPTCHA check will be performed.
    You must follow the Privacy Policy and Google Terms of use.
  • 19 comments