Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. The Lounge
  3. I just got screwed over by a classmate… [modified]

I just got screwed over by a classmate… [modified]

Scheduled Pinned Locked Moved The Lounge
comsysadminsecurityregexquestion
33 Posts 18 Posters 0 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • W W Balboos GHB

    If he really stole your work, perhaps he's outlived his usefulness ? ? ?

    "The difference between genius and stupidity is that genius has its limits." - Albert Einstein

    "As far as we know, our computer has never had an undetected error." - Weisert

    "If you are searching for perfection in others, then you seek dissappointment. If you are searching for perfection in yourself, then you seek failure." - Balboos HaGadol Mar 2010

    S Offline
    S Offline
    Slacker007
    wrote on last edited by
    #18

    Balboos wrote:

    If he really stole your work, perhaps he's outlived his usefulness ? ? ?

    I agree. Off with his head.

    1 Reply Last reply
    0
    • CPalliniC CPallini

      Oh, don't bother. Here, for instance, we are used doing someone else's homework... :-\

      If the Lord God Almighty had consulted me before embarking upon the Creation, I would have recommended something simpler. -- Alfonso the Wise, 13th Century King of Castile.
      This is going on my arrogant assumptions. You may have a superb reason why I'm completely wrong. -- Iain Clarke
      [My articles]

      S Offline
      S Offline
      Soulus83
      wrote on last edited by
      #19

      ...in the hopes to screw some classmates too! ;P

      1 Reply Last reply
      0
      • R Ray Cassick

        What about logs? Seems to me that the systems you use as storage should have logged the originating IP address of all access. Use that as a starting point and trace backwards from there.


        LinkedIn[^] | Blog[^] | Twitter[^]

        realJSOPR Offline
        realJSOPR Offline
        realJSOP
        wrote on last edited by
        #20

        I think the fact that we was using double-spaces after periods provided an attack vector for a key logger.

        .45 ACP - because shooting twice is just silly
        -----
        "Why don't you tie a kerosene-soaked rag around your ankles so the ants won't climb up and eat your candy ass..." - Dale Earnhardt, 1997
        -----
        "The staggering layers of obscenity in your statement make it a work of art on so many levels." - J. Jystad, 2001

        M 1 Reply Last reply
        0
        • R R tsumami

          We got a project due in 2 weeks and the teacher wanted to see how things where coming along. I showed him my project, what I was doing, what I had in mind, the problems I encountered just about everything I had been working on the last month. He was impressed and went off to check on someone else. About en hour later he calls me to his desk along with another class mate. Apparently we have identical projects, and when I say identical I mean identical, even the spellings errors match. I tried to convince the teacher that I made it myself, showed him my notes and backup’s, everything I had on the project. Even showed him the files I spread across the web as backups (my ftp at home, e-mail and a web-ftp I use for just about anything). Of course my classmate insists he made it and somehow convinced the teacher. The teacher isn’t unreasonable but since he can’t be sure who made it we both have to restart our projects, we do get 2 weeks extra. But I just can’t figure out how he got the files. I never leave my laptop/usb-drives unattended, the laptop is virus/Trojan free (I’m extremely careful when it comes to my laptop), there has been no unauthorised access on my ftp at home or the web-ftp and this particular e-mail has a 32 char password generated from 4 different 8 char password generators and is changed every week if I’m working on a project. And to rap it up all the files are encrypted. Yeah I’m somewhat paranoid, but this case proves that it’s not enough. I thought my security was good enough but apparently it’s still lacking. I know that every security can be cracked/hacked but this guy has had a few to many blows to the head and I don’t see him cracking it within 2 days. He got all my files from 2 days back. Am I missing something that just screws this kind of protection? On a side note, the time with the teacher was the only time I accessed the ftp/mail that was not from my home network (and I don’t even want to start about the security I have there). *Edit* fixed bin to been

          saru mo ki kara ochiru (even monkeys fall from trees) Usualy i'm that monkey. If you want an intelligent answer, Don't ask me. To understand Recursion, you must first understand Recursion.

          modified on Thursday, November 11, 2010 9:25 AM

          realJSOPR Offline
          realJSOPR Offline
          realJSOP
          wrote on last edited by
          #21

          I have a solution, but you'd have to get him to stand on a plastic tarp so things are easier to clean up...

          .45 ACP - because shooting twice is just silly
          -----
          "Why don't you tie a kerosene-soaked rag around your ankles so the ants won't climb up and eat your candy ass..." - Dale Earnhardt, 1997
          -----
          "The staggering layers of obscenity in your statement make it a work of art on so many levels." - J. Jystad, 2001

          N S 2 Replies Last reply
          0
          • realJSOPR realJSOP

            I have a solution, but you'd have to get him to stand on a plastic tarp so things are easier to clean up...

            .45 ACP - because shooting twice is just silly
            -----
            "Why don't you tie a kerosene-soaked rag around your ankles so the ants won't climb up and eat your candy ass..." - Dale Earnhardt, 1997
            -----
            "The staggering layers of obscenity in your statement make it a work of art on so many levels." - J. Jystad, 2001

            N Offline
            N Offline
            Nagy Vilmos
            wrote on last edited by
            #22

            I'm with you! Covering miscreants in gunge always works well.


            Panic, Chaos, Destruction. My work here is done. or "Drink. Get drunk. Fall over." - P O'H

            1 Reply Last reply
            0
            • R R tsumami

              We got a project due in 2 weeks and the teacher wanted to see how things where coming along. I showed him my project, what I was doing, what I had in mind, the problems I encountered just about everything I had been working on the last month. He was impressed and went off to check on someone else. About en hour later he calls me to his desk along with another class mate. Apparently we have identical projects, and when I say identical I mean identical, even the spellings errors match. I tried to convince the teacher that I made it myself, showed him my notes and backup’s, everything I had on the project. Even showed him the files I spread across the web as backups (my ftp at home, e-mail and a web-ftp I use for just about anything). Of course my classmate insists he made it and somehow convinced the teacher. The teacher isn’t unreasonable but since he can’t be sure who made it we both have to restart our projects, we do get 2 weeks extra. But I just can’t figure out how he got the files. I never leave my laptop/usb-drives unattended, the laptop is virus/Trojan free (I’m extremely careful when it comes to my laptop), there has been no unauthorised access on my ftp at home or the web-ftp and this particular e-mail has a 32 char password generated from 4 different 8 char password generators and is changed every week if I’m working on a project. And to rap it up all the files are encrypted. Yeah I’m somewhat paranoid, but this case proves that it’s not enough. I thought my security was good enough but apparently it’s still lacking. I know that every security can be cracked/hacked but this guy has had a few to many blows to the head and I don’t see him cracking it within 2 days. He got all my files from 2 days back. Am I missing something that just screws this kind of protection? On a side note, the time with the teacher was the only time I accessed the ftp/mail that was not from my home network (and I don’t even want to start about the security I have there). *Edit* fixed bin to been

              saru mo ki kara ochiru (even monkeys fall from trees) Usualy i'm that monkey. If you want an intelligent answer, Don't ask me. To understand Recursion, you must first understand Recursion.

              modified on Thursday, November 11, 2010 9:25 AM

              L Offline
              L Offline
              Lost User
              wrote on last edited by
              #23

              Maybe he paid someone else to break in.

              Join the cool kids - Come fold with us[^]

              1 Reply Last reply
              0
              • R R tsumami

                We got a project due in 2 weeks and the teacher wanted to see how things where coming along. I showed him my project, what I was doing, what I had in mind, the problems I encountered just about everything I had been working on the last month. He was impressed and went off to check on someone else. About en hour later he calls me to his desk along with another class mate. Apparently we have identical projects, and when I say identical I mean identical, even the spellings errors match. I tried to convince the teacher that I made it myself, showed him my notes and backup’s, everything I had on the project. Even showed him the files I spread across the web as backups (my ftp at home, e-mail and a web-ftp I use for just about anything). Of course my classmate insists he made it and somehow convinced the teacher. The teacher isn’t unreasonable but since he can’t be sure who made it we both have to restart our projects, we do get 2 weeks extra. But I just can’t figure out how he got the files. I never leave my laptop/usb-drives unattended, the laptop is virus/Trojan free (I’m extremely careful when it comes to my laptop), there has been no unauthorised access on my ftp at home or the web-ftp and this particular e-mail has a 32 char password generated from 4 different 8 char password generators and is changed every week if I’m working on a project. And to rap it up all the files are encrypted. Yeah I’m somewhat paranoid, but this case proves that it’s not enough. I thought my security was good enough but apparently it’s still lacking. I know that every security can be cracked/hacked but this guy has had a few to many blows to the head and I don’t see him cracking it within 2 days. He got all my files from 2 days back. Am I missing something that just screws this kind of protection? On a side note, the time with the teacher was the only time I accessed the ftp/mail that was not from my home network (and I don’t even want to start about the security I have there). *Edit* fixed bin to been

                saru mo ki kara ochiru (even monkeys fall from trees) Usualy i'm that monkey. If you want an intelligent answer, Don't ask me. To understand Recursion, you must first understand Recursion.

                modified on Thursday, November 11, 2010 9:25 AM

                T Offline
                T Offline
                Todd Smith
                wrote on last edited by
                #24

                I take it you did all of the work for the project on your own laptop? What do you use the USB drive for (backups)? And what OS are you running? Trojans / mallware / rootkits etc. can be installed by simply plugging in a USB device into your computer (I'm assuming Windows here). At that point it doesn't matter what protection you have on your ftp / web-ftp etc. as its easy to bypass everything and in a harder to trace fashion once they can keylog etc. What email account are you referring to? One from school? He could have put a packet sniffer on the network as well so if you're doing anything on an unsecured protocol ....

                Todd Smith

                R 1 Reply Last reply
                0
                • I Indivara

                  So it should be #!/been/sh?

                  S Offline
                  S Offline
                  Steve Mayfield
                  wrote on last edited by
                  #25

                  bin there, dun that ;P

                  Steve _________________ I C(++) therefore I am

                  1 Reply Last reply
                  0
                  • realJSOPR realJSOP

                    I have a solution, but you'd have to get him to stand on a plastic tarp so things are easier to clean up...

                    .45 ACP - because shooting twice is just silly
                    -----
                    "Why don't you tie a kerosene-soaked rag around your ankles so the ants won't climb up and eat your candy ass..." - Dale Earnhardt, 1997
                    -----
                    "The staggering layers of obscenity in your statement make it a work of art on so many levels." - J. Jystad, 2001

                    S Offline
                    S Offline
                    Steve Mayfield
                    wrote on last edited by
                    #26

                    and didn't you just put together a new "tool" that needs a good workout ;)

                    Steve _________________ I C(++) therefore I am

                    1 Reply Last reply
                    0
                    • realJSOPR realJSOP

                      I think the fact that we was using double-spaces after periods provided an attack vector for a key logger.

                      .45 ACP - because shooting twice is just silly
                      -----
                      "Why don't you tie a kerosene-soaked rag around your ankles so the ants won't climb up and eat your candy ass..." - Dale Earnhardt, 1997
                      -----
                      "The staggering layers of obscenity in your statement make it a work of art on so many levels." - J. Jystad, 2001

                      M Offline
                      M Offline
                      MikoTheTerrible
                      wrote on last edited by
                      #27

                      That deserves a 5!  :thumbsup:

                      "The computer industry is the only industry that is more fashion-driven than women's fashion. Maybe I'm an idiot, but I have no idea what anyone is talking about. What is it? It's complete gibberish. It's insane. When is this idiocy going to stop?" -- Oracle CEO Larry Ellison

                      1 Reply Last reply
                      0
                      • T Todd Smith

                        I take it you did all of the work for the project on your own laptop? What do you use the USB drive for (backups)? And what OS are you running? Trojans / mallware / rootkits etc. can be installed by simply plugging in a USB device into your computer (I'm assuming Windows here). At that point it doesn't matter what protection you have on your ftp / web-ftp etc. as its easy to bypass everything and in a harder to trace fashion once they can keylog etc. What email account are you referring to? One from school? He could have put a packet sniffer on the network as well so if you're doing anything on an unsecured protocol ....

                        Todd Smith

                        R Offline
                        R Offline
                        R tsumami
                        wrote on last edited by
                        #28

                        Yeah, most of it on my laptop, and some of it on my PC. The usb drive is for backup and sometimes to transfer data between the PC and laptop, And I'm not ruling trojans, mallware and like out completely but its highly unlikely. I have a separate pc, on a separate network to "mess around" with and keep both my laptop and normal pc clean. And the only usb drives that have been used on them have never been used on other machines. The e-mail is hosted on the server of my brother-in-law who is also a security freak. And as far as I know about packet sniffers it would require you to transmit the files somewhere first. I do all my uploading at home and its close to impossible (for him) to get access to that. At most he could have gotten that way would be what I was looking up I guess that all I can do now is take it easy today and get ready to burn some midnight fuel to restart and finish this project on time.

                        saru mo ki kara ochiru (even monkeys fall from trees) Usualy i'm that monkey. If you want an intelligent answer, Don't ask me. To understand Recursion, you must first understand Recursion.

                        1 Reply Last reply
                        0
                        • R R tsumami

                          We got a project due in 2 weeks and the teacher wanted to see how things where coming along. I showed him my project, what I was doing, what I had in mind, the problems I encountered just about everything I had been working on the last month. He was impressed and went off to check on someone else. About en hour later he calls me to his desk along with another class mate. Apparently we have identical projects, and when I say identical I mean identical, even the spellings errors match. I tried to convince the teacher that I made it myself, showed him my notes and backup’s, everything I had on the project. Even showed him the files I spread across the web as backups (my ftp at home, e-mail and a web-ftp I use for just about anything). Of course my classmate insists he made it and somehow convinced the teacher. The teacher isn’t unreasonable but since he can’t be sure who made it we both have to restart our projects, we do get 2 weeks extra. But I just can’t figure out how he got the files. I never leave my laptop/usb-drives unattended, the laptop is virus/Trojan free (I’m extremely careful when it comes to my laptop), there has been no unauthorised access on my ftp at home or the web-ftp and this particular e-mail has a 32 char password generated from 4 different 8 char password generators and is changed every week if I’m working on a project. And to rap it up all the files are encrypted. Yeah I’m somewhat paranoid, but this case proves that it’s not enough. I thought my security was good enough but apparently it’s still lacking. I know that every security can be cracked/hacked but this guy has had a few to many blows to the head and I don’t see him cracking it within 2 days. He got all my files from 2 days back. Am I missing something that just screws this kind of protection? On a side note, the time with the teacher was the only time I accessed the ftp/mail that was not from my home network (and I don’t even want to start about the security I have there). *Edit* fixed bin to been

                          saru mo ki kara ochiru (even monkeys fall from trees) Usualy i'm that monkey. If you want an intelligent answer, Don't ask me. To understand Recursion, you must first understand Recursion.

                          modified on Thursday, November 11, 2010 9:25 AM

                          R Offline
                          R Offline
                          RyanEK
                          wrote on last edited by
                          #29

                          So how did you deal with your classmate? Was there a confrontation? Were insults hurled and fists flying? That's what I want to know :)

                          R 1 Reply Last reply
                          0
                          • D David Crow

                            What about date/time stamps on the files? Surely the ones on his files would be after yours. How about the teacher asking each of you what the project does? You should be able to explain it in detail whereas the other person would (likely) not.

                            "One man's wage rise is another man's price increase." - Harold Wilson

                            "Fireproof doesn't mean the fire will never come. It means when the fire comes that you will be able to withstand it." - Michael Simmons

                            "Man who follows car will be exhausted." - Confucius

                            D Offline
                            D Offline
                            Dan Neely
                            wrote on last edited by
                            #30

                            Those are very easy to falsify though. I wouldn't consider them definitive for anything.

                            3x12=36 2x12=24 1x12=12 0x12=18

                            1 Reply Last reply
                            0
                            • R R tsumami

                              We got a project due in 2 weeks and the teacher wanted to see how things where coming along. I showed him my project, what I was doing, what I had in mind, the problems I encountered just about everything I had been working on the last month. He was impressed and went off to check on someone else. About en hour later he calls me to his desk along with another class mate. Apparently we have identical projects, and when I say identical I mean identical, even the spellings errors match. I tried to convince the teacher that I made it myself, showed him my notes and backup’s, everything I had on the project. Even showed him the files I spread across the web as backups (my ftp at home, e-mail and a web-ftp I use for just about anything). Of course my classmate insists he made it and somehow convinced the teacher. The teacher isn’t unreasonable but since he can’t be sure who made it we both have to restart our projects, we do get 2 weeks extra. But I just can’t figure out how he got the files. I never leave my laptop/usb-drives unattended, the laptop is virus/Trojan free (I’m extremely careful when it comes to my laptop), there has been no unauthorised access on my ftp at home or the web-ftp and this particular e-mail has a 32 char password generated from 4 different 8 char password generators and is changed every week if I’m working on a project. And to rap it up all the files are encrypted. Yeah I’m somewhat paranoid, but this case proves that it’s not enough. I thought my security was good enough but apparently it’s still lacking. I know that every security can be cracked/hacked but this guy has had a few to many blows to the head and I don’t see him cracking it within 2 days. He got all my files from 2 days back. Am I missing something that just screws this kind of protection? On a side note, the time with the teacher was the only time I accessed the ftp/mail that was not from my home network (and I don’t even want to start about the security I have there). *Edit* fixed bin to been

                              saru mo ki kara ochiru (even monkeys fall from trees) Usualy i'm that monkey. If you want an intelligent answer, Don't ask me. To understand Recursion, you must first understand Recursion.

                              modified on Thursday, November 11, 2010 9:25 AM

                              M Offline
                              M Offline
                              Mycroft Holmes
                              wrote on last edited by
                              #31

                              What you don't know is that his brother is in the security class in the next classroom and their project is to hijack the project of the most paranoid student in your classroom.

                              Never underestimate the power of human stupidity RAH

                              R 1 Reply Last reply
                              0
                              • R RyanEK

                                So how did you deal with your classmate? Was there a confrontation? Were insults hurled and fists flying? That's what I want to know :)

                                R Offline
                                R Offline
                                R tsumami
                                wrote on last edited by
                                #32

                                Nothing yet. He stayed away from me yesterday. And for some reason hasn't shown up today. Still thinking up what I’m going to do with him. He can expect his next few days to be a living hell.

                                saru mo ki kara ochiru (even monkeys fall from trees) Usualy i'm that monkey. If you want an intelligent answer, Don't ask me. To understand Recursion, you must first understand Recursion.

                                1 Reply Last reply
                                0
                                • M Mycroft Holmes

                                  What you don't know is that his brother is in the security class in the next classroom and their project is to hijack the project of the most paranoid student in your classroom.

                                  Never underestimate the power of human stupidity RAH

                                  R Offline
                                  R Offline
                                  R tsumami
                                  wrote on last edited by
                                  #33

                                  I wish they had a class like that. We only get like 2 hours a week about security and its all the basic stuff.

                                  saru mo ki kara ochiru (even monkeys fall from trees) Usualy i'm that monkey. If you want an intelligent answer, Don't ask me. To understand Recursion, you must first understand Recursion.

                                  1 Reply Last reply
                                  0
                                  Reply
                                  • Reply as topic
                                  Log in to reply
                                  • Oldest to Newest
                                  • Newest to Oldest
                                  • Most Votes


                                  • Login

                                  • Don't have an account? Register

                                  • Login or register to search.
                                  • First post
                                    Last post
                                  0
                                  • Categories
                                  • Recent
                                  • Tags
                                  • Popular
                                  • World
                                  • Users
                                  • Groups