Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. The Lounge
  3. I just got screwed over by a classmate… [modified]

I just got screwed over by a classmate… [modified]

Scheduled Pinned Locked Moved The Lounge
comsysadminsecurityregexquestion
33 Posts 18 Posters 0 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • R R tsumami

    We got a project due in 2 weeks and the teacher wanted to see how things where coming along. I showed him my project, what I was doing, what I had in mind, the problems I encountered just about everything I had been working on the last month. He was impressed and went off to check on someone else. About en hour later he calls me to his desk along with another class mate. Apparently we have identical projects, and when I say identical I mean identical, even the spellings errors match. I tried to convince the teacher that I made it myself, showed him my notes and backup’s, everything I had on the project. Even showed him the files I spread across the web as backups (my ftp at home, e-mail and a web-ftp I use for just about anything). Of course my classmate insists he made it and somehow convinced the teacher. The teacher isn’t unreasonable but since he can’t be sure who made it we both have to restart our projects, we do get 2 weeks extra. But I just can’t figure out how he got the files. I never leave my laptop/usb-drives unattended, the laptop is virus/Trojan free (I’m extremely careful when it comes to my laptop), there has been no unauthorised access on my ftp at home or the web-ftp and this particular e-mail has a 32 char password generated from 4 different 8 char password generators and is changed every week if I’m working on a project. And to rap it up all the files are encrypted. Yeah I’m somewhat paranoid, but this case proves that it’s not enough. I thought my security was good enough but apparently it’s still lacking. I know that every security can be cracked/hacked but this guy has had a few to many blows to the head and I don’t see him cracking it within 2 days. He got all my files from 2 days back. Am I missing something that just screws this kind of protection? On a side note, the time with the teacher was the only time I accessed the ftp/mail that was not from my home network (and I don’t even want to start about the security I have there). *Edit* fixed bin to been

    saru mo ki kara ochiru (even monkeys fall from trees) Usualy i'm that monkey. If you want an intelligent answer, Don't ask me. To understand Recursion, you must first understand Recursion.

    modified on Thursday, November 11, 2010 9:25 AM

    CPalliniC Offline
    CPalliniC Offline
    CPallini
    wrote on last edited by
    #3

    Oh, don't bother. Here, for instance, we are used doing someone else's homework... :-\

    If the Lord God Almighty had consulted me before embarking upon the Creation, I would have recommended something simpler. -- Alfonso the Wise, 13th Century King of Castile.
    This is going on my arrogant assumptions. You may have a superb reason why I'm completely wrong. -- Iain Clarke
    [My articles]

    In testa che avete, signor di Ceprano?

    S 1 Reply Last reply
    0
    • R R tsumami

      We got a project due in 2 weeks and the teacher wanted to see how things where coming along. I showed him my project, what I was doing, what I had in mind, the problems I encountered just about everything I had been working on the last month. He was impressed and went off to check on someone else. About en hour later he calls me to his desk along with another class mate. Apparently we have identical projects, and when I say identical I mean identical, even the spellings errors match. I tried to convince the teacher that I made it myself, showed him my notes and backup’s, everything I had on the project. Even showed him the files I spread across the web as backups (my ftp at home, e-mail and a web-ftp I use for just about anything). Of course my classmate insists he made it and somehow convinced the teacher. The teacher isn’t unreasonable but since he can’t be sure who made it we both have to restart our projects, we do get 2 weeks extra. But I just can’t figure out how he got the files. I never leave my laptop/usb-drives unattended, the laptop is virus/Trojan free (I’m extremely careful when it comes to my laptop), there has been no unauthorised access on my ftp at home or the web-ftp and this particular e-mail has a 32 char password generated from 4 different 8 char password generators and is changed every week if I’m working on a project. And to rap it up all the files are encrypted. Yeah I’m somewhat paranoid, but this case proves that it’s not enough. I thought my security was good enough but apparently it’s still lacking. I know that every security can be cracked/hacked but this guy has had a few to many blows to the head and I don’t see him cracking it within 2 days. He got all my files from 2 days back. Am I missing something that just screws this kind of protection? On a side note, the time with the teacher was the only time I accessed the ftp/mail that was not from my home network (and I don’t even want to start about the security I have there). *Edit* fixed bin to been

      saru mo ki kara ochiru (even monkeys fall from trees) Usualy i'm that monkey. If you want an intelligent answer, Don't ask me. To understand Recursion, you must first understand Recursion.

      modified on Thursday, November 11, 2010 9:25 AM

      I Offline
      I Offline
      Indivara
      wrote on last edited by
      #4

      Your classmate is a snake. How hard are your passwords? Could he have done a brute-force attack?

      R 1 Reply Last reply
      0
      • R R tsumami

        We got a project due in 2 weeks and the teacher wanted to see how things where coming along. I showed him my project, what I was doing, what I had in mind, the problems I encountered just about everything I had been working on the last month. He was impressed and went off to check on someone else. About en hour later he calls me to his desk along with another class mate. Apparently we have identical projects, and when I say identical I mean identical, even the spellings errors match. I tried to convince the teacher that I made it myself, showed him my notes and backup’s, everything I had on the project. Even showed him the files I spread across the web as backups (my ftp at home, e-mail and a web-ftp I use for just about anything). Of course my classmate insists he made it and somehow convinced the teacher. The teacher isn’t unreasonable but since he can’t be sure who made it we both have to restart our projects, we do get 2 weeks extra. But I just can’t figure out how he got the files. I never leave my laptop/usb-drives unattended, the laptop is virus/Trojan free (I’m extremely careful when it comes to my laptop), there has been no unauthorised access on my ftp at home or the web-ftp and this particular e-mail has a 32 char password generated from 4 different 8 char password generators and is changed every week if I’m working on a project. And to rap it up all the files are encrypted. Yeah I’m somewhat paranoid, but this case proves that it’s not enough. I thought my security was good enough but apparently it’s still lacking. I know that every security can be cracked/hacked but this guy has had a few to many blows to the head and I don’t see him cracking it within 2 days. He got all my files from 2 days back. Am I missing something that just screws this kind of protection? On a side note, the time with the teacher was the only time I accessed the ftp/mail that was not from my home network (and I don’t even want to start about the security I have there). *Edit* fixed bin to been

        saru mo ki kara ochiru (even monkeys fall from trees) Usualy i'm that monkey. If you want an intelligent answer, Don't ask me. To understand Recursion, you must first understand Recursion.

        modified on Thursday, November 11, 2010 9:25 AM

        S Offline
        S Offline
        Slacker007
        wrote on last edited by
        #5

        It's not "bin" it's "been". Sorry, I really don't like being a spelling/grammar nazi because I suck at spelling in the first place but I had to say something. :)

        R I 2 Replies Last reply
        0
        • R Ray Cassick

          What about logs? Seems to me that the systems you use as storage should have logged the originating IP address of all access. Use that as a starting point and trace backwards from there.


          LinkedIn[^] | Blog[^] | Twitter[^]

          R Offline
          R Offline
          R tsumami
          wrote on last edited by
          #6

          I already checked the logs with the logs I keep myself when I access the ftp/mail. Got allot of attempt but none got through

          saru mo ki kara ochiru (even monkeys fall from trees) Usualy i'm that monkey. If you want an intelligent answer, Don't ask me. To understand Recursion, you must first understand Recursion.

          R 1 Reply Last reply
          0
          • R R tsumami

            We got a project due in 2 weeks and the teacher wanted to see how things where coming along. I showed him my project, what I was doing, what I had in mind, the problems I encountered just about everything I had been working on the last month. He was impressed and went off to check on someone else. About en hour later he calls me to his desk along with another class mate. Apparently we have identical projects, and when I say identical I mean identical, even the spellings errors match. I tried to convince the teacher that I made it myself, showed him my notes and backup’s, everything I had on the project. Even showed him the files I spread across the web as backups (my ftp at home, e-mail and a web-ftp I use for just about anything). Of course my classmate insists he made it and somehow convinced the teacher. The teacher isn’t unreasonable but since he can’t be sure who made it we both have to restart our projects, we do get 2 weeks extra. But I just can’t figure out how he got the files. I never leave my laptop/usb-drives unattended, the laptop is virus/Trojan free (I’m extremely careful when it comes to my laptop), there has been no unauthorised access on my ftp at home or the web-ftp and this particular e-mail has a 32 char password generated from 4 different 8 char password generators and is changed every week if I’m working on a project. And to rap it up all the files are encrypted. Yeah I’m somewhat paranoid, but this case proves that it’s not enough. I thought my security was good enough but apparently it’s still lacking. I know that every security can be cracked/hacked but this guy has had a few to many blows to the head and I don’t see him cracking it within 2 days. He got all my files from 2 days back. Am I missing something that just screws this kind of protection? On a side note, the time with the teacher was the only time I accessed the ftp/mail that was not from my home network (and I don’t even want to start about the security I have there). *Edit* fixed bin to been

            saru mo ki kara ochiru (even monkeys fall from trees) Usualy i'm that monkey. If you want an intelligent answer, Don't ask me. To understand Recursion, you must first understand Recursion.

            modified on Thursday, November 11, 2010 9:25 AM

            D Offline
            D Offline
            David Crow
            wrote on last edited by
            #7

            What about date/time stamps on the files? Surely the ones on his files would be after yours. How about the teacher asking each of you what the project does? You should be able to explain it in detail whereas the other person would (likely) not.

            "One man's wage rise is another man's price increase." - Harold Wilson

            "Fireproof doesn't mean the fire will never come. It means when the fire comes that you will be able to withstand it." - Michael Simmons

            "Man who follows car will be exhausted." - Confucius

            R D 2 Replies Last reply
            0
            • R R tsumami

              We got a project due in 2 weeks and the teacher wanted to see how things where coming along. I showed him my project, what I was doing, what I had in mind, the problems I encountered just about everything I had been working on the last month. He was impressed and went off to check on someone else. About en hour later he calls me to his desk along with another class mate. Apparently we have identical projects, and when I say identical I mean identical, even the spellings errors match. I tried to convince the teacher that I made it myself, showed him my notes and backup’s, everything I had on the project. Even showed him the files I spread across the web as backups (my ftp at home, e-mail and a web-ftp I use for just about anything). Of course my classmate insists he made it and somehow convinced the teacher. The teacher isn’t unreasonable but since he can’t be sure who made it we both have to restart our projects, we do get 2 weeks extra. But I just can’t figure out how he got the files. I never leave my laptop/usb-drives unattended, the laptop is virus/Trojan free (I’m extremely careful when it comes to my laptop), there has been no unauthorised access on my ftp at home or the web-ftp and this particular e-mail has a 32 char password generated from 4 different 8 char password generators and is changed every week if I’m working on a project. And to rap it up all the files are encrypted. Yeah I’m somewhat paranoid, but this case proves that it’s not enough. I thought my security was good enough but apparently it’s still lacking. I know that every security can be cracked/hacked but this guy has had a few to many blows to the head and I don’t see him cracking it within 2 days. He got all my files from 2 days back. Am I missing something that just screws this kind of protection? On a side note, the time with the teacher was the only time I accessed the ftp/mail that was not from my home network (and I don’t even want to start about the security I have there). *Edit* fixed bin to been

              saru mo ki kara ochiru (even monkeys fall from trees) Usualy i'm that monkey. If you want an intelligent answer, Don't ask me. To understand Recursion, you must first understand Recursion.

              modified on Thursday, November 11, 2010 9:25 AM

              W Offline
              W Offline
              W Balboos GHB
              wrote on last edited by
              #8

              If he really stole your work, perhaps he's outlived his usefulness ? ? ?

              "The difference between genius and stupidity is that genius has its limits." - Albert Einstein

              "As far as we know, our computer has never had an undetected error." - Weisert

              "If you are searching for perfection in others, then you seek dissappointment. If you are searching for perfection in yourself, then you seek failure." - Balboos HaGadol Mar 2010

              S 1 Reply Last reply
              0
              • I Indivara

                Your classmate is a snake. How hard are your passwords? Could he have done a brute-force attack?

                R Offline
                R Offline
                R tsumami
                wrote on last edited by
                #9

                They are at least 16 chars long randomly generated from two 8 char password generators and then put together. A real pain to remember but i refuse to carry them around on a peice of paper or in a file. But there were no anomaly’s in the logs when compared to the personal logs I keep.

                saru mo ki kara ochiru (even monkeys fall from trees) Usualy i'm that monkey. If you want an intelligent answer, Don't ask me. To understand Recursion, you must first understand Recursion.

                1 Reply Last reply
                0
                • R R tsumami

                  I already checked the logs with the logs I keep myself when I access the ftp/mail. Got allot of attempt but none got through

                  saru mo ki kara ochiru (even monkeys fall from trees) Usualy i'm that monkey. If you want an intelligent answer, Don't ask me. To understand Recursion, you must first understand Recursion.

                  R Offline
                  R Offline
                  Ray Cassick
                  wrote on last edited by
                  #10

                  Do you work on wireless alot? Maybe he was sniffing when you were doing a save? He got it somehow :)


                  LinkedIn[^] | Blog[^] | Twitter[^]

                  R 1 Reply Last reply
                  0
                  • D David Crow

                    What about date/time stamps on the files? Surely the ones on his files would be after yours. How about the teacher asking each of you what the project does? You should be able to explain it in detail whereas the other person would (likely) not.

                    "One man's wage rise is another man's price increase." - Harold Wilson

                    "Fireproof doesn't mean the fire will never come. It means when the fire comes that you will be able to withstand it." - Michael Simmons

                    "Man who follows car will be exhausted." - Confucius

                    R Offline
                    R Offline
                    R tsumami
                    wrote on last edited by
                    #11

                    I'm going to have to check on the date/time stamps. The teacher questioned us about the project separately so we couldn’t hear what the other said, and somehow he convinced the teacher that it could be his project.

                    saru mo ki kara ochiru (even monkeys fall from trees) Usualy i'm that monkey. If you want an intelligent answer, Don't ask me. To understand Recursion, you must first understand Recursion.

                    modified on Thursday, November 11, 2010 9:29 AM

                    1 Reply Last reply
                    0
                    • R R tsumami

                      We got a project due in 2 weeks and the teacher wanted to see how things where coming along. I showed him my project, what I was doing, what I had in mind, the problems I encountered just about everything I had been working on the last month. He was impressed and went off to check on someone else. About en hour later he calls me to his desk along with another class mate. Apparently we have identical projects, and when I say identical I mean identical, even the spellings errors match. I tried to convince the teacher that I made it myself, showed him my notes and backup’s, everything I had on the project. Even showed him the files I spread across the web as backups (my ftp at home, e-mail and a web-ftp I use for just about anything). Of course my classmate insists he made it and somehow convinced the teacher. The teacher isn’t unreasonable but since he can’t be sure who made it we both have to restart our projects, we do get 2 weeks extra. But I just can’t figure out how he got the files. I never leave my laptop/usb-drives unattended, the laptop is virus/Trojan free (I’m extremely careful when it comes to my laptop), there has been no unauthorised access on my ftp at home or the web-ftp and this particular e-mail has a 32 char password generated from 4 different 8 char password generators and is changed every week if I’m working on a project. And to rap it up all the files are encrypted. Yeah I’m somewhat paranoid, but this case proves that it’s not enough. I thought my security was good enough but apparently it’s still lacking. I know that every security can be cracked/hacked but this guy has had a few to many blows to the head and I don’t see him cracking it within 2 days. He got all my files from 2 days back. Am I missing something that just screws this kind of protection? On a side note, the time with the teacher was the only time I accessed the ftp/mail that was not from my home network (and I don’t even want to start about the security I have there). *Edit* fixed bin to been

                      saru mo ki kara ochiru (even monkeys fall from trees) Usualy i'm that monkey. If you want an intelligent answer, Don't ask me. To understand Recursion, you must first understand Recursion.

                      modified on Thursday, November 11, 2010 9:25 AM

                      S Offline
                      S Offline
                      Super Lloyd
                      wrote on last edited by
                      #12

                      Interesting story! Down with the classmate, lose him! :P

                      A train station is where the train stops. A bus station is where the bus stops. On my desk, I have a work station.... _________________________________________________________ My programs never have bugs, they just develop random features.

                      1 Reply Last reply
                      0
                      • S Slacker007

                        It's not "bin" it's "been". Sorry, I really don't like being a spelling/grammar nazi because I suck at spelling in the first place but I had to say something. :)

                        R Offline
                        R Offline
                        R tsumami
                        wrote on last edited by
                        #13

                        Dang, I thought i had it right this time. I allways seem to **** up that 1.

                        saru mo ki kara ochiru (even monkeys fall from trees) Usualy i'm that monkey. If you want an intelligent answer, Don't ask me. To understand Recursion, you must first understand Recursion.

                        1 Reply Last reply
                        0
                        • S Slacker007

                          It's not "bin" it's "been". Sorry, I really don't like being a spelling/grammar nazi because I suck at spelling in the first place but I had to say something. :)

                          I Offline
                          I Offline
                          Indivara
                          wrote on last edited by
                          #14

                          So it should be #!/been/sh?

                          S S 2 Replies Last reply
                          0
                          • R Ray Cassick

                            Do you work on wireless alot? Maybe he was sniffing when you were doing a save? He got it somehow :)


                            LinkedIn[^] | Blog[^] | Twitter[^]

                            R Offline
                            R Offline
                            R tsumami
                            wrote on last edited by
                            #15

                            I avoid wireless as much as possible and always use a cable at school because the connecting is not what you call stable.

                            saru mo ki kara ochiru (even monkeys fall from trees) Usualy i'm that monkey. If you want an intelligent answer, Don't ask me. To understand Recursion, you must first understand Recursion.

                            1 Reply Last reply
                            0
                            • R R tsumami

                              We got a project due in 2 weeks and the teacher wanted to see how things where coming along. I showed him my project, what I was doing, what I had in mind, the problems I encountered just about everything I had been working on the last month. He was impressed and went off to check on someone else. About en hour later he calls me to his desk along with another class mate. Apparently we have identical projects, and when I say identical I mean identical, even the spellings errors match. I tried to convince the teacher that I made it myself, showed him my notes and backup’s, everything I had on the project. Even showed him the files I spread across the web as backups (my ftp at home, e-mail and a web-ftp I use for just about anything). Of course my classmate insists he made it and somehow convinced the teacher. The teacher isn’t unreasonable but since he can’t be sure who made it we both have to restart our projects, we do get 2 weeks extra. But I just can’t figure out how he got the files. I never leave my laptop/usb-drives unattended, the laptop is virus/Trojan free (I’m extremely careful when it comes to my laptop), there has been no unauthorised access on my ftp at home or the web-ftp and this particular e-mail has a 32 char password generated from 4 different 8 char password generators and is changed every week if I’m working on a project. And to rap it up all the files are encrypted. Yeah I’m somewhat paranoid, but this case proves that it’s not enough. I thought my security was good enough but apparently it’s still lacking. I know that every security can be cracked/hacked but this guy has had a few to many blows to the head and I don’t see him cracking it within 2 days. He got all my files from 2 days back. Am I missing something that just screws this kind of protection? On a side note, the time with the teacher was the only time I accessed the ftp/mail that was not from my home network (and I don’t even want to start about the security I have there). *Edit* fixed bin to been

                              saru mo ki kara ochiru (even monkeys fall from trees) Usualy i'm that monkey. If you want an intelligent answer, Don't ask me. To understand Recursion, you must first understand Recursion.

                              modified on Thursday, November 11, 2010 9:25 AM

                              L Offline
                              L Offline
                              Lost User
                              wrote on last edited by
                              #16

                              At the school I went to it did not matter if you were the stealer or victim. The reasoning was more for when friends help class mates. There is no way for your teacher to know for sure that the 2 of you are not actually friends. So in the end it did not matter if he or you convinced the teacher that it was "Your" project. In the end you are both required to re-build under university rules. Again that was my school. Yours might be similar though. Check the cheating policies. Anyways, sucks that you have to start over. Good luck!

                              Computers have been intelligent for a long time now. It just so happens that the program writers are about as effective as a room full of monkeys trying to crank out a copy of Hamlet.

                              1 Reply Last reply
                              0
                              • I Indivara

                                So it should be #!/been/sh?

                                S Offline
                                S Offline
                                Slacker007
                                wrote on last edited by
                                #17

                                yeah, that's the ticket. :laugh:

                                1 Reply Last reply
                                0
                                • W W Balboos GHB

                                  If he really stole your work, perhaps he's outlived his usefulness ? ? ?

                                  "The difference between genius and stupidity is that genius has its limits." - Albert Einstein

                                  "As far as we know, our computer has never had an undetected error." - Weisert

                                  "If you are searching for perfection in others, then you seek dissappointment. If you are searching for perfection in yourself, then you seek failure." - Balboos HaGadol Mar 2010

                                  S Offline
                                  S Offline
                                  Slacker007
                                  wrote on last edited by
                                  #18

                                  Balboos wrote:

                                  If he really stole your work, perhaps he's outlived his usefulness ? ? ?

                                  I agree. Off with his head.

                                  1 Reply Last reply
                                  0
                                  • CPalliniC CPallini

                                    Oh, don't bother. Here, for instance, we are used doing someone else's homework... :-\

                                    If the Lord God Almighty had consulted me before embarking upon the Creation, I would have recommended something simpler. -- Alfonso the Wise, 13th Century King of Castile.
                                    This is going on my arrogant assumptions. You may have a superb reason why I'm completely wrong. -- Iain Clarke
                                    [My articles]

                                    S Offline
                                    S Offline
                                    Soulus83
                                    wrote on last edited by
                                    #19

                                    ...in the hopes to screw some classmates too! ;P

                                    1 Reply Last reply
                                    0
                                    • R R tsumami

                                      We got a project due in 2 weeks and the teacher wanted to see how things where coming along. I showed him my project, what I was doing, what I had in mind, the problems I encountered just about everything I had been working on the last month. He was impressed and went off to check on someone else. About en hour later he calls me to his desk along with another class mate. Apparently we have identical projects, and when I say identical I mean identical, even the spellings errors match. I tried to convince the teacher that I made it myself, showed him my notes and backup’s, everything I had on the project. Even showed him the files I spread across the web as backups (my ftp at home, e-mail and a web-ftp I use for just about anything). Of course my classmate insists he made it and somehow convinced the teacher. The teacher isn’t unreasonable but since he can’t be sure who made it we both have to restart our projects, we do get 2 weeks extra. But I just can’t figure out how he got the files. I never leave my laptop/usb-drives unattended, the laptop is virus/Trojan free (I’m extremely careful when it comes to my laptop), there has been no unauthorised access on my ftp at home or the web-ftp and this particular e-mail has a 32 char password generated from 4 different 8 char password generators and is changed every week if I’m working on a project. And to rap it up all the files are encrypted. Yeah I’m somewhat paranoid, but this case proves that it’s not enough. I thought my security was good enough but apparently it’s still lacking. I know that every security can be cracked/hacked but this guy has had a few to many blows to the head and I don’t see him cracking it within 2 days. He got all my files from 2 days back. Am I missing something that just screws this kind of protection? On a side note, the time with the teacher was the only time I accessed the ftp/mail that was not from my home network (and I don’t even want to start about the security I have there). *Edit* fixed bin to been

                                      saru mo ki kara ochiru (even monkeys fall from trees) Usualy i'm that monkey. If you want an intelligent answer, Don't ask me. To understand Recursion, you must first understand Recursion.

                                      modified on Thursday, November 11, 2010 9:25 AM

                                      realJSOPR Online
                                      realJSOPR Online
                                      realJSOP
                                      wrote on last edited by
                                      #20

                                      I have a solution, but you'd have to get him to stand on a plastic tarp so things are easier to clean up...

                                      .45 ACP - because shooting twice is just silly
                                      -----
                                      "Why don't you tie a kerosene-soaked rag around your ankles so the ants won't climb up and eat your candy ass..." - Dale Earnhardt, 1997
                                      -----
                                      "The staggering layers of obscenity in your statement make it a work of art on so many levels." - J. Jystad, 2001

                                      N S 2 Replies Last reply
                                      0
                                      • R Ray Cassick

                                        What about logs? Seems to me that the systems you use as storage should have logged the originating IP address of all access. Use that as a starting point and trace backwards from there.


                                        LinkedIn[^] | Blog[^] | Twitter[^]

                                        realJSOPR Online
                                        realJSOPR Online
                                        realJSOP
                                        wrote on last edited by
                                        #21

                                        I think the fact that we was using double-spaces after periods provided an attack vector for a key logger.

                                        .45 ACP - because shooting twice is just silly
                                        -----
                                        "Why don't you tie a kerosene-soaked rag around your ankles so the ants won't climb up and eat your candy ass..." - Dale Earnhardt, 1997
                                        -----
                                        "The staggering layers of obscenity in your statement make it a work of art on so many levels." - J. Jystad, 2001

                                        M 1 Reply Last reply
                                        0
                                        • realJSOPR realJSOP

                                          I have a solution, but you'd have to get him to stand on a plastic tarp so things are easier to clean up...

                                          .45 ACP - because shooting twice is just silly
                                          -----
                                          "Why don't you tie a kerosene-soaked rag around your ankles so the ants won't climb up and eat your candy ass..." - Dale Earnhardt, 1997
                                          -----
                                          "The staggering layers of obscenity in your statement make it a work of art on so many levels." - J. Jystad, 2001

                                          N Offline
                                          N Offline
                                          Nagy Vilmos
                                          wrote on last edited by
                                          #22

                                          I'm with you! Covering miscreants in gunge always works well.


                                          Panic, Chaos, Destruction. My work here is done. or "Drink. Get drunk. Fall over." - P O'H

                                          1 Reply Last reply
                                          0
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Don't have an account? Register

                                          • Login or register to search.
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups