December 21st, 2007 01:26 AM
Thx for the concern but am not intrested in de scribbiedidlydoo tools. Am more intrested in 'global' views so we can protect ourselfs against it.
It looks like (if its true) an ilaberate and...
December 21st, 2007 01:17 AM
The trojan/rootkit posibility has been explored, nothing has been found... we took the computers almost completly apart, sector by sector
At this moment we're looking into human aspect...
December 20th, 2007 02:12 AM
Good stuff, but now some root cause analysis... what is the common used way to 'hijak' an emailadres?
Thx for the input... i will razzle and dazzle them at the meeting of tommorow... for shizzl
December 20th, 2007 02:07 AM
Not a bad idear, for a second post ;) We dont own the webserver...
December 19th, 2007 06:42 PM
Yep, he changes frequently his passwords and the last week he's using a lot of diffrent computers (thats what he said).
Spyware: Yep, is possible but we didnt detected any known spyware/trojan......
December 19th, 2007 06:38 PM
That I am sure about
:) Its not the goal of my question to get to hacking part... am more intrested in the information how i can defuse the situation. And thats why i posted it
December 19th, 2007 03:18 PM
I have a problem with one of my client; he accuses his ISP of forwarding his email to the competition. So I was wondering what kind of action a hacker needs to take to realize this....
October 13th, 2002 01:12 PM
Thx guyes and girls,
I'm again closer to develop a bigger knowledge of computer security... thx alot... see you all on my next simple? questions
October 2nd, 2002 11:57 PM
Thx for your suggestions, I'm a novice in the security game and would like to get deeper into the matter. So I'm looking to learn more things, for example what are weird tcp packets? Another...
September 29th, 2002 05:04 PM
What are the symptoms of a hi-jacked system. With other words how do I know that a system is hijacked?
September 29th, 2002 04:10 PM
doesn't matter if an attack is launched by a muslim, a jew, an american or a horse... If the attack is good enough it would damage any network or system. So do't try to put hackers or attacks in...