outlawhendrix
Young Ape
I really wish i could just have 30 seconds with whomever did this so i could urinate in the cooling fan on their computer tower. It's refreshing and solves one of the worlds many problems!
Hackers are simply a waste of space. What exactly do they do this crap for?...
Any good case for using Macs. It's not impossible to hack them but it's definitely much harder.
Err no....Mac desktops seem to be more secure than Windows desktops...
Err no...
Suggestion: Top25 at some point in time now, may want to start searching their system for 'malicious coding' that the hacker may have placed. There's the possibility that a 'keystroke' program may have been installed for remoting at a later date by this same hacker (ie, user id's and passwords)...
Unless the backup is corrupt and they don't know it.Since they are restoring it from a backup, that's a non-issue.
A lot of hacking now uses automated scripts to search for vulnerabilities. Vulnerable computers might be looted of valuable data (credit card numbers, etc.), or used to send spam email or host "phishing" sites, or to perpetrate denial-of-service attacks, etc. There's a lot of money at stake: phishing, spamming, pump & dump stock frauds, malware distribution, and extortion schemes, just to name a few. I'd wager that the typical malicious hacker is more likely to be involved in organized crime (the Russian mafia, for example) than to be some awkward loner in his mom's basement.
I really doubt it's a password issue.The best thing anyone can do is have a secure password.
This isn't a Mac vs. PC thing. I don't know the details of this incident, but when it comes to web servers being hacked or defaced, it's often a specific application that's to blame, not the OS.
I'm a fan of Macs (I'm typing this from a MacBook), but IMHO Macs really aren't competitive performance or cost-wise in the server market. Mac desktops seem to be more secure than Windows desktops, but there's nothing special about Macs that make them inherently more secure servers than other flavors of UNIX or Linux. (I don't know much about Microsoft's server OS variants, so I can't comment on them.)
I see brute force attacks against passwords in my logs all the time. Probably automated and bounced off of an innocent server.I really doubt it's a password issue.
Most server side exploits aren't due to weak passwords since even with a weak password, trying to brute force it takes too long for scripted attacks.
This is probably something really basic like not checking the input data properly leading to a buffer overrun, which often leads to remote code execution.
While using strong password is definately a good idea, it's not a panacea. Especially since these days almost every form of attack is either exploiting a known bug (which means the patch is usually available but just not applied for whatever reasons) or through social engineering (click here for naked pictures of <fill in the name of hottie de jour>).
For consumer desktops/laptops, the single best thing you can do is keep up with the available patches and just exercise common sense when clicking on things on the web and certainly exercise a healthy dose of skepticism when faced with email attachments of any sort.
I won't argue the competive cost of the Macserve versus the PC server but the performance of the Macserver has consistently outperformed PC servers just as the Mac laptops and desktops have consistently outperformed PCs. I remember reading a few years back that a university on the east coast needed a new supercomputer and "built" one by linking something like 100 Macservers together. This was when they were running dual processor 1.2 GB processers.
The Mac operating systems have always been harder to hack into than windows. That's mainly a function of the strict control that Apple maintains over it software as opposed to all the bugs and backdoors that seem to be inherent in Windows.
Just because there are attacks don't mean they are successful. In the VAST majority of successful exploits, it's not through the front door (i.e., brute forcing the password). Hollywood may have you believe that there are super hackers out there with almost ESP like powers at guessing passwords, but in reality, successful password attacks are rare simply because they are so damn easy to protect against: lockouts after a certain number of failed attempts, enforcing strong password policies, enforcing password recycle policies, etc... And all of those can be fully automated with a half-way decent policy infrastructure.I see brute force attacks against passwords in my logs all the time.