|
"FinancialInformation2014Q1.zip"
About 16Gb of password protected "Gentleman special interest" material...
Those who fail to learn history are doomed to repeat it. --- George Santayana (December 16, 1863 – September 26, 1952)
Those who fail to clear history are doomed to explain it. --- OriginalGriff (February 24, 1959 – ∞)
|
|
|
|
|
I presume you already have the material on hand?
It was broke, so I fixed it.
|
|
|
|
|
For an appropriate fee, I believe I could locate a source of such material, yes...
Those who fail to learn history are doomed to repeat it. --- George Santayana (December 16, 1863 – September 26, 1952)
Those who fail to clear history are doomed to explain it. --- OriginalGriff (February 24, 1959 – ∞)
|
|
|
|
|
Hmmm... could the Tasmanian Devil be ZIPped?
You'll never get very far if all you do is follow instructions.
|
|
|
|
|
What about a zip bomb?
Just for fun!!
|
|
|
|
|
A "not in my house" animated GIF.
You'll never get very far if all you do is follow instructions.
|
|
|
|
|
I'd rickroll[^] them.
modified 9-Apr-14 16:20pm.
|
|
|
|
|
Ha! Had to look that up! Very funny! I now have my link and will implement. Thanks!
"Go forth into the source" - Neal Morse
|
|
|
|
|
Damn, a missed opportunity, I should have linked it and rickrolled you.
|
|
|
|
|
too funny
|
|
|
|
|
If you want hints, entertainment and Unix information, read 'Aggressive Network Self Defense' by Neil Wyler.
|
|
|
|
|
I'd put something on there that made the server seem to be monitored by the FBI or something.
"Sony Playstation Hacked Account List"
"FBI GOV Logins"
"SSH Vulnerabilities"
and as a bonus,
"How to hack a client FTP connection"
|
|
|
|
|
|
Nice read! Thanks for the suggestion.
"Go forth into the source" - Neal Morse
|
|
|
|
|
Be careful, if a few of us did something like that it could potentially bring down the Internet ...
|
|
|
|
|
Get copies of some nasty viruses, name them something enticing, and let them have at it!
|
|
|
|
|
kmoorevs wrote: What useful content might you leave for a theif hacker?
Back in college, a friend of mine was playing around with the compression code and figured out how to create very small files that could not be successfully uncompressed -- they required more space than the size of a disk. He used to leave them in his account as honeypots for unsuspecting budding college hackers. Make such a file and give it a name like it came from TurboTax and you'll catch them
We can program with only 1's, but if all you've got are zeros, you've got nothing.
|
|
|
|
|
I remember one called 42.zip
|
|
|
|
|
Thanks for all the suggestions! I decided to take the high road by leaving an old fashioned ReadMe.txt.
'Hacking is illegal. There is nothing to see here so move along. Repeated visits to this account will be reported for abuse. Have a nice day Administrator.'
The Administrator account with password 'admin' has been set for read only and removed from all Windows User Groups. Also all settings for remote desktop have been disabled. Internal testing works as expected...no drag-drop, pasting, or creating content is allowed. It seems secure...I hope I haven't missed something. It would be pretty stupid if the gag backfired.
"Go forth into the source" - Neal Morse
|
|
|
|
|
Doing it on your production box is folly. Do it on a distinct box with a firewall between it and your real servers. Not all hacks rely on improperly set up boxes, some exploit bugs.. I guarantee you Windows didn't give you settings for closing all the bugs they didn't know about.
We can program with only 1's, but if all you've got are zeros, you've got nothing.
|
|
|
|
|
|
I would put a big zip file (1GB or more) named CustomersDatabaseBackup, inside I would put a program named Restore that blocks input on their computers and displays a nice CIA or FBI logo with "You're being traced" written on big red letters.
|
|
|
|
|
The downside is that my server resources and bandwidth suffers. The more I think about it, the more I think (at least now) I may have hit upon a pretty good solution. They (I am assuming 'they' are bots and not real people) should be getting through pretty quickly, and find a single text file. They retrieve this file, and they disconnect finding nothing of interest. Anyway, the trap is set and I shall be watching the activity log to see if it works. I actually expect that once they 'break in' they may want to store some payload. The account is read-only so it shouldn't be possible.
I'm probably going to try out Ubuntu under a VM just as an FTP server. If it works, I'll just move those services over to it and at least solve the problem for the types of attacks I am getting with fail2ban.
"Go forth into the source" - Neal Morse
|
|
|
|
|
I apologize if this seems like a programming question, but I could not find an appropriate forum - so let's just call it a technical discussion.
Anyway, I'm trying to find a SDK to incorporate into a C# Windows Forms commercial software product that allows for converting PDF files to RTF. It can be anything from freeware/open-source to licensed software as long as it doesn't cost more than $3K per year, and nothing with royalties attached to it. And not BCL Technologies' EasyConverter as that is what I'm replacing.
Of course, there are several products out there, so I'm just looking for suggestions and recommendations at this point. For instance, does anyone have experience with any of the products listed here: http://softwaresolution.informer.com/PDF-to-RTF-Converter/[^]
Thanks
-NP
Never underestimate the creativity of the end-user.
modified 9-Apr-14 14:19pm.
|
|
|
|
|
If in doubt, there is always here: http://www.codeproject.com/Questions/ask.aspx[^]
Those who fail to learn history are doomed to repeat it. --- George Santayana (December 16, 1863 – September 26, 1952)
Those who fail to clear history are doomed to explain it. --- OriginalGriff (February 24, 1959 – ∞)
|
|
|
|