Any accounts that were used by me had been dormant for at least three months. I changed the password to the account and shared it with other hackers. I overlooked checking cron for any scheduled scripts that were looking for disk hogs. We were discovered after a user was notified via a cron process that complained about our excessive disk usage. At the time, we didnt really care because the Well only contained a backup of the information we had stored. The same files were mirrored on several sites in the Netherlands, among others, that Shimomura and the FBI had never found. (No, I dont have any copies.)While accessing the Well, I was carefree because my location was masked through many other computer systems and the cellular telecommunications network. I could have taken precautions by installing a covert backdoor to avoid the typical UNIX accounting and logging, but I didnt bother. To avoid any traps and traces, I routinely compromised the local exchange carriers and cellular providers to gain access to their switches. Even if my connection was identified, I routed my data calls in a certain way that was very difficult to track in a reasonable amount of time. In one report, Shimomura had claimed that he and the FBI were unsuccessful at tracing any calls to the point of origin, but were only able to identify the cellular carrier.
http://interviews.slashdot.org/article.pl?sid=03/02/04/2233250&mode=thread&tid=103&tid=123&tid=172
Tuesday, February 4, 2003
Popular Posts
-
The concept of dragons was probably brought to Japan around 2,000 years ago, along with the technology for paddy agriculture. Their images h...
-
...These measures, based on the US Digital Millennium Copyright Act (DMCA) give far too much power to publishers, at the expense of individu...
-
His system, he said, starts with a laser that sends part of its beam into photo detectors which produce electrical signal that feed back to ...
-
Someone that gets it. Service-oriented software, when done correctly in a platform-agnostic way can be flexible, cheap, and can motivate m...
-
...why was this given the file name of skyfall?... Certain information, while not specific as to target, gives the government reason to beli...
-
When it comes to buying equipment, think g, not b. New 802.11g hardware is nearly five times faster than 802.11b gear, and it will interoper...
-
This edition provides a prose rendering of The Epic of Gilgamesh, the cycle of poems preserved on clay tablets surviving from ancient Mesopo...
-
From the bygone debates over DDR vs. RDRAM to the current controversy over Apples DDR implementations, one issue is commonly misunderstood i...
-
In my mind, this is a huge waste of effort. Put a base on Mars instead of the Moon -- there's huge science finds waiting there to be dis...
-
Personally, I believe that consciousness is an emergent property of complex, ordered (yet chaotic) systems which are not necessarily biologi...