01-03-2008, 08:21 AM
|
|
lurker
Industry Role:
Join Date: Aug 2002
Location: atlanta
Posts: 57,021
|
Quote:
Originally Posted by TheDoc
Paul and Will76, did both of you end up with the short ends of the stick?
Yeah, we know hacks/exploits targeted at NATS have taken place for years. Every host, program owner, and webmaster knows this. It's not some secret that you guys want to find out about.
NATS job is NOT to provide security. It’s to provide a program backend, only. YOUR job is to secure it, your hosts and yours, period.
So how did those accounts get breached before? That's very simple logic, let me help. When a NATS "Machine" is exploited they got your ass, your pw's, ect.. (Exploits targeted at NATS machines happen daily) Once they have the admin data they can start running the bot that pulls the data.
So get it through your heads, NATS thought the attacks were different. Different enough that even Admins at the same host didn’t know it was the same attackers.
Why don't you guys go bash the Program Owners who failed basic 101 security? Why not yell at the hosts they host with? NATS job is to provide us the software, not the security.
I put my trust into my host, and my own skills not in software that I have ask for support on and can’t modify myself.
|
I dont have a horse in this but just from reading all of this your trying way too hard.
|
|
|