Quote:
Originally Posted by split_joel
I just got to put my two cents in this thread. How many times has chris made seucirty post and tried to help people out, there's no reason why anyone should attack him regardless of how much we all can't stand him *lol* just kidding. All I am saying is he's tryin to help simple as that. Bring the drama somewhere else.
|
Should have at least put in a dime, your two cents are pretty much worthless.
While the idea of this thread seems like a good one, it seems to be lacking some information. I fail to see how this specifically had anything to do with NATS in the first place, and why it was included in the subject. It made it sound as if it was specifically related to NATS.
Though, the thread did take a turn for the comedic side I must admit, as the lies continue to pour in and be danced around. How on earth would putting the rooted drive in your mail server, to mount the file system from it, allow the same hacker to connect to your mail server?
Oddities aside, if your intent is to provide information to the public to help awareness of this issue, do you have anymore useful information you could provide in regards to the affected servers? Such as any commonalities in them. What OS were they running? Were any of them running outdated Apache/PHP installs? Was this a common thing across the board? Since these don't sound to all be NATS servers, what other scripts do they all have that could be the point or origin?
Just trying to get some better ideas of the issue at hand that you are seeing, as I'm sure everyone here would appreciate more detailed information.