View Single Post
Old 01-03-2008, 08:21 AM  
tony286
lurker
 
tony286's Avatar
 
Industry Role:
Join Date: Aug 2002
Location: atlanta
Posts: 57,021
Quote:
Originally Posted by TheDoc View Post
Paul and Will76, did both of you end up with the short ends of the stick?

Yeah, we know hacks/exploits targeted at NATS have taken place for years. Every host, program owner, and webmaster knows this. It's not some secret that you guys want to find out about.

NATS job is NOT to provide security. It’s to provide a program backend, only. YOUR job is to secure it, your hosts and yours, period.

So how did those accounts get breached before? That's very simple logic, let me help. When a NATS "Machine" is exploited they got your ass, your pw's, ect.. (Exploits targeted at NATS machines happen daily) Once they have the admin data they can start running the bot that pulls the data.

So get it through your heads, NATS thought the attacks were different. Different enough that even Admins at the same host didn’t know it was the same attackers.

Why don't you guys go bash the Program Owners who failed basic 101 security? Why not yell at the hosts they host with? NATS job is to provide us the software, not the security.

I put my trust into my host, and my own skills not in software that I have ask for support on and can’t modify myself.
I dont have a horse in this but just from reading all of this your trying way too hard.

Last edited by tony299; 01-03-2008 at 08:22 AM..
tony286 is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote