OT; IP address?

To the ISP in question. Note you also need the exact time of the incident since with some ISPs the IP addresses are dynamically allocated and reused - so the same address can be used by a number of unrelated users over a period of time.

Reply to
John Rumm
Loading thread data ...

That's what I always thought (I read the original papers when it happened). But apparently it used two different binaries, and sent both to the system under attack...

And the mechanism was a bit more compliacted than that:

formatting link

Reply to
Bob Eager

I am amazed at how many linux/unix users do nothing at all even though stuff like root kits have been around for years. I suppose its to be expected, they keep telling each other that they are immune so often that they actually start to believe it. The reality is different of course. There is a lot of evidence that botnets are controlled by hacked unix machines, windows machines generally can't handle many connections without the user noticing a problem and then reinstalling/running AV software, this losses the rather valuable botnet. The users of these hacked unix machines will be telling everyone that unix is safe.

>
Reply to
dennis

The sendmail running on many linux systems had exploits three years ago that I know of. Postfix has replaced it on most systems AFAIK, some of the sendmail exploits were never fixed AFAIK so anyone still running sendmail is probably exploitable. There have been a number of security updates to postfix to remove exploitable holes. Just running linux/unix does *not* make you safe whatever linux/unix users say.

Cue the usual windows is worse answer from linux users who still don't get it.

Reply to
dennis

yes but in this case the reported IP was in fact in use by TMH earlier in the year. An Ebay upcock i suspect.  

Reply to
Mark

Remember the key loggers run on *your* computer and hence have full access to the raw keypress data long before it gets into a SSL stream.

Reply to
John Rumm

formatting link

You can apparently make a pretty good stab at recovering keystroke information from just an audio stream of someone typing. Each key/typist combination has a unique sound that will yield to a basic frequency distribution analysis.

Reply to
John Rumm

TNP wasn't suggesting a keylogger - "and are you using unencrypted wireless in your house?"

Reply to
Clive George

It is pretty safe using open wireless to do your banking, provided you use a trusted DNS. The actual banking site will be https so all the data is encrypted before being put on the wireless even if the actual wireless is not encrypted.

Reply to
dennis

formatting link

It is the same when hand generated Morse code is sent, you can recognise the 'hand'.

Dave

Reply to
Dave

.. | -.- -. --- .-- | . -..- .- -.-. - .-.. -.-- | .-- .... .- - |

-.-- --- ..- | -- . .- -. | ..--.. |

;-)

Reply to
Bruce

- .... .- - .----. ... . .- ... -.-- ..-. --- .-. -.-- --- ..- - --- ... .- -.--

Reply to
John Rumm

STOP THAT NOW !

Reply to
geoff

.. -.. --- -. --- - ..- -. -.. . .-. ... - .- -. -.. .-- .... .- - .. ... --. --- .. -. --. --- -.

Adam

Reply to
ARWadsworth

In message , ARWadsworth writes

You - COAT

Reply to
geoff

Don't you call me a .----. ... . .- ... -.-- !

Reply to
The Medway Handyman

-. . .. - .... . .-. -.. --- . ... --. . --- ..-. ..-. -... -.-- - .... . .-.. --- --- -.- ... --- ..-. .. - .-.-.-

Reply to
John Rumm

.-- --- ..- .-.. -.. -. --- - -.. .-. . .- -- --- ..-. .. - --- .-.. -.. -.-. .... .- .--. .-.-.-

Reply to
John Rumm

-.-- --- ..- ...- . .--. ..- .-.. .-.. . -..

Reply to
Andy Burns

.-- .... .- - | .... .- ...- . | .. | ... - .- .-. - . -.. | ..--.. |?

Reply to
Bruce

HomeOwnersHub website is not affiliated with any of the manufacturers or service providers discussed here. All logos and trade names are the property of their respective owners.