On Thursday, 24 בJuly 2008 23:39, Oron Peled wrote:
While I do have a faint hope to see this thread die eventually, and I
avoided saying anything so far, I do want to make one or two contributions,
mostly factual, and some based on my own experience and beliefs,
so bear with me.
1. SPAM is here
On Friday, 25 בJuly 2008 14:12, sara fink wrote:
> Hacking into the system-> privelege escalation-> spamming (and this is only
> one aspect after the system was hacked). DDos is a much nicer effect
> from the hacker standpoint of view.
Actually, this is not quite so.
The hackers/hacking scene
On 7/25/08, Imri Zvik <[EMAIL PROTECTED]> wrote:
> Why do you think any system was hacked?
>
> It seems you do not understand how it works - they don't hack into any ISP
> managed system. They don't need to. They either:
>
> 1. phish the username and password.
> 2. get it from *your* computer using
According to this article (pg. 30-31) in one of Petah Tikva's local
newspapers, the municipal education department decided to switch to
Linux.
Congratulations to the unnamed activists who did the public relations
work behind the curtains!
--- Omer
--
MS-
On Fri, Jul 25, 2008 at 07:09:49PM +0300, sammy ominsky wrote:
>
> On 25/07/2008, at 18:54, Dotan Cohen wrote:
>
> >A very friendly and knowledgeable Frenchman from the Debian list just
> >emailed me about an Israeli spammer that is sending him megabytes of
> >spam everyday- in Hebrew! It appears
On 25/07/2008, at 18:54, Dotan Cohen wrote:
A very friendly and knowledgeable Frenchman from the Debian list just
emailed me about an Israeli spammer that is sending him megabytes of
spam everyday- in Hebrew! It appears that this is a case of (4) from
your list. How do I determine the ISP from
2008/7/25 Imri Zvik <[EMAIL PROTECTED]>:
> Why do you think any system was hacked?
>
> It seems you do not understand how it works - they don't hack into any ISP
> managed system. They don't need to. They either:
>
> 1. phish the username and password.
> 2. get it from *your* computer using a troj
Why do you think any system was hacked?
It seems you do not understand how it works - they don't hack into any ISP
managed system. They don't need to. They either:
1. phish the username and password.
2. get it from *your* computer using a trojan.
3. try and guess easy passwords/usernames.
4. a
On Fri, Jul 25, 2008 at 6:30 PM, Imri Zvik <[EMAIL PROTECTED]> wrote:
> I cannot discuss this further when you refuse to give ANY factual data. You
> publicy trash people (the abuse@ and all the other people behind that ISP)
> with quite a harsh words, and refuse to back it up with facts.
>
So do
There is a program called trickle. It shapes everything you want. download
speed and upload speed. All you have to do is run a command lie this:
trickle -d -u your application. In this case it
will be vpn. I used it for p2p application.
Homepage:http://www.monkey.org/~marius/trickl
On Fri, Jul 25, 2008 at 1:58 PM, Imri Zvik <[EMAIL PROTECTED]> wrote:
> 1. This is not a question, but a statement, and quite a stupid one if I
> may. Do you really expect a serious answer? How are those related?
Indeed it's a statement. If you didn't understand the sarcasm, too bad.
>
>
> 2. P
1. This is not a question, but a statement, and quite a stupid one if I may. Do
you really expect a serious answer? How are those related?
2. Please clarify this question.
From: sara fink [mailto:[EMAIL PROTECTED]
Date: Fri 25/07/2008 13:49
To: Imri Zvik
Why ISP will spend time to block spammers, when they spend their time to
block/shape/inspect p2p, voip and other protocols. After all this saves much
more money.
I would like to ask a more general question. If spammers from abroad use
Israeli ISP, it means that their systems were already compromi
I cannot discuss this further when you refuse to give ANY factual data. You
publicy trash people (the abuse@ and all the other people behind that ISP) with
quite a harsh words, and refuse to back it up with facts.
You, yet again, dismiss my attempts to help you, saying it's won't help (???).
It
14 matches
Mail list logo