Posted 18 April 2012 - 09:42 PM
Posted 20 April 2012 - 01:11 AM
Posted 20 April 2012 - 03:05 AM
Posted 20 April 2012 - 09:13 AM
Posted 20 April 2012 - 09:45 AM
Posted 20 April 2012 - 10:00 AM
Posted 20 April 2012 - 08:09 PM
I agree that is how they got into our site, but our administrator password is highly secure, so I do not know how they figured that one out
Posted 20 April 2012 - 11:51 PM
this "hacker" doesn't just hack the admin account, it hacks any account which may be able to log into the machine including the infamous backup account OR test account that is never deleted. there may be a number of accounts besides the administrator account that can gain access to the server and i STRONGLY ENCOURAGE anyone who watches over a domain controller or any server to REMOVE ANY ACCOUNT THAT IS NOT NECESSARY.
Posted 24 April 2012 - 04:39 PM
Edited by ITC, 24 April 2012 - 04:56 PM.
Posted 24 April 2012 - 05:43 PM
Posted 25 April 2012 - 12:01 PM
Posted 25 April 2012 - 12:06 PM
Posted 25 April 2012 - 12:12 PM
Edited by Balon, 25 April 2012 - 12:13 PM.
Posted 25 April 2012 - 06:18 PM
Beautiful avatar by Plumbeck!
Posted 25 April 2012 - 06:36 PM
Just a thought, but considering all of these versions are probably by the same guy, and if the phone number in the Malware Protection version is legitimate, could we have the authorities trace the phone to the hacker's residence to stop him?
0 members, 1 guests, 0 anonymous users