Forum Replies Created

Viewing 15 replies - 46 through 60 (of 62 total)
  • It would be a lot easier if you got a big hard disk and then made those files accessible thru your site. The problem I see using paths is that each Mac will look locally for them – on their own MAC not yours.

    Each PC will not have a clue what to do with them as the file/folder structure is very different from the MAC.

    Also, browsers will not allow you to access local files from the web..that’s a security constraint. If you find a workaround, post it.

    Theoretically you can do it. All P2P software and bit torrents do.

    Good luck.

    why use a program when you can do it directly with FF using an addon?

    For 1, do you use lots of plugins? If so try deactivating selectively.

    You want a single login for both?

    Thread Starter sleepw

    (@sleepw)

    I’m not trying to make them appear, I’m trying to make them disappear.

    I already deleted the editor since I edit from notepad locally. Now I’m trying to delete Widgets..don’t use them, never will.

    do you try searching for the posts in the sql file you exported for your backup?

    If you mean for yourself, yes.
    If you mean can other people see a file on your pc..no..you would need to have that pc setup as a webserver on the net which is doable if your ISP allowed you to. (note ISP, not your webhost as you would be the webhost)

    i’m sorry..peace..just thought it was funny at the time

    E7E7E7

    Thread Starter sleepw

    (@sleepw)

    Now that’s a more useful post.

    I do have access to my raw log files but parsing through them is quite a chore and I don’t necessarily know what I’m looking for. Most of the requests seem to be GET and I didn’t see any .exe but again I have no clue what strings to look for..and yes there were several .ru’s but they are probably spam attempts.

    Aside from the db backup I also have a mirror of my site locally (WAMP) the file number and dates match where they should, but I have not gone to the point to compare the contents of the files – which can be done with certain utilities such as FolderMatch.

    Injection attacks are fairly easy to troubleshoot as they usually break the CSS – either way, a quick look at the page source will reveal the extra code.

    I’m curious about what happened not as a retrospective..but rather to proactively be able to identify the likely point of entry and seal it up. For example, I don’t allow user registration, if I remove that functionality by modifying the code will it seal a point of entry.

    Every hacker knows where the front door is – I’d like to lock it permanently or at least make it harder than my neighbor’s.

    Finally, I was never pissed off and my jokes were meant as jokes, nothing more.

    Thread Starter sleepw

    (@sleepw)

    Missing tables is annoying, so are error messages. Not exactly evidence of a “hack”.

    Ok and let’s leave the martians out of this, they’re always getting a bad rap.

    First, I’m not your grandmother. I build computers from scratch and I program. I know my way around a database and I don’t drop tables, not the binary kind.

    Second, I was nowhere near my databases. Had not touched my site since upgrading several weeks before.

    You still with me? If it wasn’t me, if it wasn’t my host, then who the hell dropped those tables. You’re not curious because it did not happen to you, but I am.

    The damage was inconsequential, but I want to know what the hell went on. How can the blog be up one day and down the next without any intervention on my part?

    Think about it. Or did you just conclude that I”m making this shit up because I’m bored.

    Thread Starter sleepw

    (@sleepw)

    Scenario 1: Hacker gets in to PC despite Hardware Firewall, Software Firewall, and up to date Virus protection. Why? Because it has to be my PC not the millions of PCs without firewalls and AV.

    Hacker installs key logger. Forgoes stealing online banking and trading passwords because it will be much more fun to break into my website instead. Forgoes all my image galleries and photographic content. Skips the forums. Skips all the databases except the blog. Goes into blog. Hmm. Should he delete the content or 9 other tables. Why not delete all 12 tables.

    Nah, he just deletes the tables that don’t have content. What’s the result? Error messages on the site! OMG, there are error messages all over the site. Table does not exist. I almost have a heart attack…all that work lost. Wait a minute not only is the site backed up but he/she didn’t touch the content! Thank God I was hacked by a mental retard. Site is back up in 15 minutes.

    Scenario 2. Bot finds vulnerability with my WP 2.6.2 installation. Tries to delete all tables but for some reason 3 survive including the content.

    Yeah, Scenario 1 is really much more likely. But hey, what the hell let’s be arrogant about it…2.6.2 can’t be hacked.

    Thread Starter sleepw

    (@sleepw)

    Now if you show us some horses instead of zebras, we’ll talk about horses.

    Yeah, and at the same time I’ll try to find a Neanderthal in the jaws of a fossil T-Rex so you’ll have proof that there was indeed a Caveman vs Dinosaur War.

    Thread Starter sleepw

    (@sleepw)

    You do have backups and know how to restore them, right?

    I thought the toothfairy did those?
    🙂

    1. There are no accounts, no users other than myself.

    2. I don’t go into myphpadmin except to do backups..the export function is very different from the sql drop statement, so no I didn’t drop any tables.

    3.Someone knows my password and userid? Only if they managed to install a keylogger on my PC when I wasn’t watching. If I was a hacker and I had a password and userid I would have deleted all the blog content first. Then I would have deleted my forums, my pixelpost galleries, my coppermine galleries, and I would have defaced what was left over. None of that happened.

    Yes I did restore from backup – lost 1 or 2 posts which I restored manually given the content table was not touched. Given I was using 2.6.2 when I was hacked, all I can do now is wait for the next hack. I will be checking my raw log files this time.

    If you hear hoof beats, you should look for horses, not zebras.

Viewing 15 replies - 46 through 60 (of 62 total)