Στις 17/11/2013 7:37 μμ, ο/η Zero Piraeus έγραψε:
:
I'd really rather not, but since this is a public accusation of criminal
behaviour:
On Sun, Nov 17, 2013 at 07:16:34PM +0200, Nikos wrote:
Is this your doing?
[18:03:55 secure root@4385109 /lib64]cPs# ls -al |grep libkey
lrwxrwxrwx 1 root root 20 Jun 22 2012 libkeyutils.so.1 ->
libkeyutils.so.1.3.0*
-rwxr-xr-x 1 root root 10192 Jun 22 2012 libkeyutils.so.1.3*
-rwxr-xr-x 1 root root 32920 Jun 22 2012 libkeyutils.so.1.3.0*
[18:03:57 secure root@4385109 /lib64]cPs# rpm -qf libkeyutils.so.1.3.0
file /lib64/libkeyutils.so.1.3.0 is not owned by any package
It appears that my server has been compromised with a malicious
payload designed to sniff for and steal server passwords.
I'am sure this is your doing Zero Piraeus.
It is not my doing. Please desist from defaming me. I will not respond
here, or except through legal counsel should that prove necessary, to
further communications from you.
I will, however, point out that the last time you were embarrassed in
public over your inability to maintain the security of your business and
that of your clients, I attempted in private to assist you in resolving
your issue.
-[]z.
You did, but chances are you also imported a good password sniffer whn
you logged in as root.
You had also altered my .htaccess file.
What is now proved was at first only imagined!
--
https://mail.python.org/mailman/listinfo/python-list