<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://www.wikiworld.com/index.php?action=history&amp;feed=atom&amp;title=HackerHeadaches</id>
	<title>HackerHeadaches - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://www.wikiworld.com/index.php?action=history&amp;feed=atom&amp;title=HackerHeadaches"/>
	<link rel="alternate" type="text/html" href="https://www.wikiworld.com/index.php?title=HackerHeadaches&amp;action=history"/>
	<updated>2026-05-06T15:09:18Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.45.1</generator>
	<entry>
		<id>https://www.wikiworld.com/index.php?title=HackerHeadaches&amp;diff=1709&amp;oldid=prev</id>
		<title>imported&gt;Import: Imported current content</title>
		<link rel="alternate" type="text/html" href="https://www.wikiworld.com/index.php?title=HackerHeadaches&amp;diff=1709&amp;oldid=prev"/>
		<updated>2026-01-28T11:54:25Z</updated>

		<summary type="html">&lt;p&gt;Imported current content&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;&lt;br /&gt;
The [[EIES Legacy]] invited hacked since 1978, our first hacker, was connecting to random addresses on [[TelEnet]], an international preinternet network, when we hit EIES, which unlike most systems of the day was friendly, is said &amp;quot;Welcome, Name or number?&amp;quot;, he answered &amp;quot;John&amp;quot; which was his name, the system responded, &amp;quot;access code?&amp;quot;, he typed something and the system responded, &amp;quot;Access code is incorrect.  Type ? for help.&amp;quot;.  He typed &amp;quot;?&amp;quot; and was given an explanation of access codes, how they were assigned etc., and &amp;quot;Often your initials are used for your initial access code.&amp;quot;  He tried his initials, no go, &amp;quot;ja&amp;quot;, &amp;quot;jb&amp;quot;, Eurika====, he became John Boyde who had no used his account, The hacker chose choice 5 for the directory and found a user whose account had been established and unused for a long time, signed on using the initials and charnge the identity and screen name to his alias.&lt;br /&gt;
====&lt;br /&gt;
&lt;br /&gt;
Ever since then, it seems about every 9 months or so we have had hackers at our door.  Usually it meant shutting down development and rebuilding all our machines at a tremendous cost.  It was not fun.  They left Trojans in the system so once in they were in, without a full time system administrator there is no way of keeping them out indefinitely.&lt;br /&gt;
&lt;br /&gt;
Last week, we had a web service hack attack, exploiting &amp;quot;holes&amp;quot; cause by improper installation of public domain software they allowed hackers to infest their server use it for gateway over indosat for [[Islam]]ic messages on a secrete pirate IRC network they install on the server.&lt;br /&gt;
&lt;br /&gt;
If you use public domain tools on your web servers and are not a security expert, be sure to have a quality company like [[XanthusInc]] do a security audit for you so that your company is not culpable in the [[InformationWar]]====  [[XanthusInc]] offers Gigahertz security managed servers for as little as $300 per month.&lt;br /&gt;
====&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Are you endorsing broadening the scope of &amp;quot;culpability&amp;quot; or merely calling attention to the de-jure reality of it?&lt;br /&gt;
&lt;br /&gt;
  &amp;#039;&amp;#039;&amp;#039;&amp;#039;just calling attention to it.&amp;#039;&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
----&lt;br /&gt;
You are lucky it was terrorists types and not the child porn traders. That&amp;#039;s a common trick for any of the warez pirates and others who wish to remain out of site. Supposedly, organized crime of a less nihilistic nature is now also doing so for the money that can be made in the exchange of &amp;#039;illicit&amp;#039; data, but that&amp;#039;s just rumors buzzing around as far as I know.&lt;br /&gt;
&lt;br /&gt;
Did you call in the FBI, or just rebuild your system? It does sound like something they would be interested in. The originating IPs, who and what being exchanged, etc.&lt;br /&gt;
&lt;br /&gt;
There are only a few major tips for most people computing on networks to stay as safe and secure as they can. They are:&lt;br /&gt;
#) Never leave accounts and applications set to the defaults.&lt;br /&gt;
#) Keep your system and applications up to date on patches.&lt;br /&gt;
#) Scan everything, even safe looking attachments from friends.&lt;br /&gt;
&lt;br /&gt;
You stick to those 3 rules, you tend to stay safe. There are still lots of other gotchas, of course, but the average user shouldn&amp;#039;t need them. Now, the average network administrator on the other hand... ;) ---StarPilot&lt;br /&gt;
&lt;/div&gt;</summary>
		<author><name>imported&gt;Import</name></author>
	</entry>
</feed>