GoFuckYourself.com - Adult Webmaster Forum

GoFuckYourself.com - Adult Webmaster Forum (https://gfy.com/index.php)
-   Fucking Around & Business Discussion (https://gfy.com/forumdisplay.php?f=26)
-   -   AVN: NATS/TMM Breached for More Than a Year (https://gfy.com/showthread.php?t=796567)

TheDoc 01-03-2008 08:07 AM

Quote:

Originally Posted by Doctor Dre (Post 13597492)
John should definitly comment about the investigation and keep everybody that was affected (affiliates and sponsors) updated... At this point, keeping the investigation behind closed doors after having ignored the problem for so long will only make people logically there are some kind secrets they want to keep.

NATS/TMM works with the clients and the clients work with the Webmasters. And I don't think after a week NATS had much of an update for us.

Doctor Dre 01-03-2008 08:07 AM

Quote:

Originally Posted by Robbie (Post 13594405)
"When everything hit the boards, we went back to check [our server logs] and found the same admin account trying to access our servers every hour," he said Friday. "The IP [address] block was the same one that was blocked over a year ago, so [the person using the account] couldn't get in. It is slowing down the servers a little bit, but they're not actually getting in."

That is a quote from the story... So supposedly some big site had their servers brought down to their knees by ONE IP address attempting to log in and fail? Does anybody ever proof read or use common sense with these stories? This is almost as factual as a Bill OReilly story.

I *think* they meant that the activity in the nats admin account was slowing down the server.

buzzy 01-03-2008 08:09 AM

Quote:

Originally Posted by minusonebit (Post 13595451)
When NATS was sold to the industry, it was pitched as tool to keep the program owners honest by stopping shaving. TMM worked very hard to spin this on the boards and pretty soon affiliates started demanding NATS-based programs. The idea was that John's software, which could not be touched by the programs - would be unshaveable. Thats all good and well and had it actually functioned that way, it would have been a good thing for the industry. But these kind of things never work out this way.

Anyone who has taken college level (for that matter, probably high school level as well) courses in government, public service, democracy, world history and the like knows that concentration of power is a dangerous thing. We saw this in Nazi Germany, here in our own country and just about everywhere else throughout the world. The thing is that TMM was saying to affiliates: "Hey, trust US. We have YOUR best interests at heart. We wont let you bring in an independent third party to audit our code to prove this, but we do. You don't wanna get shaved, do you? What? You still don't believe us? You good for nothing board whore, if you publish that, We're, gonna sue you for libel!" and this has worked for a long time for TMM. They have made a good run of scaring their critics into silence and programs into using them. And this concentration of power led to the ultimate in lax, completely incompetent security: a list of passwords sitting on somebody's server.

Given the choice between NATS incompetently managing my personal data and the possibility that a dishonest sponsor *may* shave sales, at the end of the day I'll take the possibility of shaved sales. Its a small price to pay. First off, most program owners are honest, most of them are very generous with their affiliates and most of them would not consider - so its not even a really large risk. Second, dishonest people always get caught at their games eventually. iBill's greed eventually caught up to them. John's incompetence and/or crookedness has caught up to him. If you believe the story that PornGraph was actually sold before the trojans went on, then you can see it caught up with the new owners as PG is no more. Finally, program owners who fuck their affiliates through shaving probably fuck their employees, contractors, business partners and talent as well. By proxy, this means they likely already have a bad reputation and everyone knows who to stay away from anyway.

I know NATS fucked up big time, but comparing them to nazi germany? :1orglaugh:1orglaugh:1orglaugh:1orglaugh

Doctor Dre 01-03-2008 08:10 AM

Quote:

Originally Posted by Robbie (Post 13594719)
S And people who are really in the biz know that. It's always been so. And HELL NO they don't cost no 20 cents a piece! More like 20 cents per THOUSAND.
And members area email addresses? Golden? If you think so. Hell, maybe I will sell mine after all. How about that 20 cents each deal? That's a lot cheaper than that dollar quote in that story! Come on man! I'm gonna make you rich! I've got thousands and thousand of members emails! Just think of all the money you'll make!

You are totally clueless when it comes to Marketing...
Harvested emails are worth nothing.
Confirmed porn buyers (credit card + confirmed working email) are worth a TON.

Doctor Dre 01-03-2008 08:11 AM

Quote:

Originally Posted by TheDoc (Post 13597503)
NATS/TMM works with the clients and the clients work with the Webmasters. And I don't think after a week NATS had much of an update for us.

Are they investigating the money trail or not ? There was NO statement from what I have read that said anywhere that they will take the proper stepts to report this fraud to the authorities or investigate at all.

TheDoc 01-03-2008 08:13 AM

Quote:

Originally Posted by Doctor Dre (Post 13597535)
Are they investigating the money trail or not ?

I think the money trail has been exposed already.. Question is will people out who it is. Email lists are easy to pawn off as purchased from others too :/

I think TMM is on the hacker trail - but only being a week afterwards I haven't asked :)

Doctor Dre 01-03-2008 08:16 AM

Quote:

Originally Posted by TheDoc (Post 13597552)
I think the money trail has been exposed already.. Question is will people out who it is. Email lists are easy to pawn off as purchased from others too :/

I think TMM is on the hacker trail - but only being a week afterwards I haven't asked :)

The money trail has been exposed by webmasters teaming up and asking questions... that's beside the point.

Why are NATs not letting us know they are looking into things if they are ?

tony286 01-03-2008 08:21 AM

Quote:

Originally Posted by TheDoc (Post 13597466)
Paul and Will76, did both of you end up with the short ends of the stick?

Yeah, we know hacks/exploits targeted at NATS have taken place for years. Every host, program owner, and webmaster knows this. It's not some secret that you guys want to find out about.

NATS job is NOT to provide security. It’s to provide a program backend, only. YOUR job is to secure it, your hosts and yours, period.

So how did those accounts get breached before? That's very simple logic, let me help. When a NATS "Machine" is exploited they got your ass, your pw's, ect.. (Exploits targeted at NATS machines happen daily) Once they have the admin data they can start running the bot that pulls the data.

So get it through your heads, NATS thought the attacks were different. Different enough that even Admins at the same host didn’t know it was the same attackers.

Why don't you guys go bash the Program Owners who failed basic 101 security? Why not yell at the hosts they host with? NATS job is to provide us the software, not the security.

I put my trust into my host, and my own skills not in software that I have ask for support on and can’t modify myself.

I dont have a horse in this but just from reading all of this your trying way too hard.

notoldschool 01-03-2008 08:24 AM

Quote:

Originally Posted by fuckingfuck (Post 13595407)


notoldschool = IDIOT BRO


Wow, now im am complete. I feel so accomplished now. maybe we should all call minusonut a bro so maybe he will get off our industries nuts.

Not that it matters I will state again that I dont know one single person at nats other than when I need something done to my proggie. I do push quite a bit of traffic to all types of programs, and Im not talking the couple hundred clicks most of you part time affiliates push, and I know for a fact that most of the nats programs work a shit load better than some of the other garbage back ends some of these shady ass programs have. I work it from both ends so I know what proggies to stay away from because of their homemade backend. Nats is great software for sure. Atleast We know about what happened with nats and that its fixed. Im also sick of you bitches that call yourselfs adult webmasters trying to ruin a biz that in reality you are not even part of. Let me spell it out, if you have been in the biz more than a year and your not pushing atleast 10000 uniques a day somewhere, then you are NOT and adult webmaster and should keep your limited knowledge to yourselfs. You just sound like the idiots that you are.

TheDoc 01-03-2008 08:36 AM

Quote:

Originally Posted by tony404 (Post 13597626)
I dont have a horse in this but just from reading all of this your trying way too hard.

No worries Tony, I'm done with these two tools. They read past the answers and modify their own questions for personal benefit.

TheDoc 01-03-2008 08:38 AM

Quote:

Originally Posted by Doctor Dre (Post 13597568)
The money trail has been exposed by webmasters teaming up and asking questions... that's beside the point.

Why are NATs not letting us know they are looking into things if they are ?

How exactly would NATS follow the money trail? Wouldn't it take Webmasters to team up and expose it for them? And I know who they are, so what? NATS can't sue them.

NATS is looking into things, they have stated they are hunting down the hacker. Of course they can't comment more, I wouldn't either, nobody doing an investigation would.

Logic people, logic...

frank7799 01-03-2008 09:18 AM

Quote:

Originally Posted by TheDoc (Post 13597466)
NATS job is NOT to provide security. It?s to provide a program backend, only. YOUR job is to secure it, your hosts and yours, period.

Itīs not their job to provide security of their customers servers. But they - NATS - required a server access. So itīs their job to take care of it.:2 cents:

borked 01-03-2008 09:40 AM

Quote:

Originally Posted by TheDoc (Post 13597466)
So get it through your heads, NATS thought the attacks were different. Different enough that even Admins at the same host didn?t know it was the same attackers.

ORLy? which host would this be then???

TheDoc 01-03-2008 10:31 AM

Quote:

Originally Posted by borked (Post 13598357)
ORLy? which host would this be then???

Umm.. Well the old apache exploits/admin targets came in through VOIP IP exploits and not from the FL IP. So previous admin/attacks came through server level exploits first, once they had access they exploited the data the exact same way. This is why NATS made the admin/webmaster pw's one way, so they can't be pulled from the admin. A security step by NATS, mind blowing I know.

Hosts didn't know it was the same attacker each time doing the same thing in different ways. Not until recently at least and once people started posting on GFY, then people put two and two together, we saw it right here, live. Yes, I'm sure a couple of hosts knew something was going down, but they sure as hell didn't talk about it, fear, pfft..

If John ever threatened me for exposing an exploit I would have blasted his ass all of the boards. Anyone that wouldn't do the same is weak minded.

NATS has a ticket system. You have to post in for all support, ect. And icq history for those they talk to on ICQ. If all these clients really had these problems, threats, ect about the hacks/ips, exploits then why don't they just post the tickets? I'm sure people have tickets, I do, but they show NATS helping and not threating.

NATS isn't perfect, boy it's far from perfect. Clients already knew this - guess it was only time for Webmasters to find out. Support isn't the fastest, they don't always work on weekends, and you don't always get the right support person smart enough to help with your complex problem.

And since NATS doesn't monitor my NATS/server 24/7 - I take security into my own hands and my hosts, as it should be.

borked 01-03-2008 10:39 AM

so you're saying this recently exposed hack was done by the same guy that did the previous exploit?

ServerGenius 01-03-2008 10:44 AM

They better shut up about all this until they have concrete answer backed up
with facts and/or proof in a well written statement.....the guessing and
insinuations aren't doing any side good at this point.......well except for
entertainment of course........fuck it.....continue

TheDoc 01-03-2008 10:49 AM

Quote:

Originally Posted by borked (Post 13599029)
so you're saying this recently exposed hack was done by the same guy that did the previous exploit?

I think it's the same group attacking us for the last 10 years. That damn voip exploit to connect and pull data works the same, but it's a different way of doing it. Either way the same method of getting the data was done and back then it didn't have to done through a nats admin account.

So other than the login ip - no I don't have any real proof it's the same people. Other than over the last several months. But my point was more than they attack us in several ways - but they always appear to get the data the same exact way once they are in.

Do you have something that points that it's more than one group/person?

ServerGenius 01-03-2008 10:58 AM

Quote:

Originally Posted by TheDoc (Post 13599121)
I think it's the same group attacking us for the last 10 years. That damn voip exploit to connect and pull data works the same, but it's a different way of doing it. Either way the same method of getting the data was done and back then it didn't have to done through a nats admin account.

So other than the login ip - no I don't have any real proof it's the same people. Other than over the last several months. But my point was more than they attack us in several ways - but they always appear to get the data the same exact way once they are in.

Do you have something that points that it's more than one group/person?

Ok I'll bite this whole discussion about the hack, and how it was possible
to have happened....added with all the bullshit that every program could get
hacked just as the servers they're on.....that's all nice and dandy but it's
completely irrelevant to the argument........


Well ok....not completely it only serves the purpose to divert the negative
attention to a different subject in order to make it seem less bad as it already is.


So now you probably say.....well is that so? So what's the part then that DOES
matter about all this......

Brace yourselves here it comes.......The fact that it happened, TMM knowing
about it for a LONG time and didn't take proper action and informed their
clients about it.......making it appear...(I'll keep it polite tonight) that they
were trying to hide it hoping they'd be able to fix situation before it blew up
in their face like it did recently......

That's all.....continue the discussion please and show us what's your interest
in this by judging the arguments you come up with......


:2 cents:

TheDoc 01-03-2008 11:03 AM

Quote:

Originally Posted by ServerGenius (Post 13599217)
Brace yourselves here it comes.......The fact that it happened, TMM knowing about it for a LONG time and didn't take proper action and informed their clients about it.......making it appear...(I'll keep it polite tonight) that they were trying to hide it hoping they'd be able to fix situation before it blew up in their face like it did recently......

:2 cents:


Sad as it is, if this didn't come out on the boards it wouldn't have been fixed. They didn't know wtf to look for. It blew up in their faces because they aren't security admins and the true fact that John's ego blocks his brain waves sometimes doesn't help.

But we all already know this.. We all know nats fucked up, no reason to bring up the dead horse another 1000000 times. The lesson to be learned, again... Is security is YOUR responsibility and not NATS.

And I thought we were talking about previous hacks/exploits with NATS?
Do you even use NATS?

ServerGenius 01-03-2008 11:08 AM

Quote:

Originally Posted by TheDoc (Post 13599269)
Sad as it is, if this didn't come out on the boards it wouldn't have been fixed. They didn't know wtf to look for. It blew up in their faces because they aren't security admins and the true fact that John's ego blocks his brain waves sometimes doesn't help.

But we all already know this.. We all know nats fucked up, no reason to bring up the dead horse another 1000000 times. The lesson to be learned, again... Is security is YOUR responsibility and not NATS.

And I thought we were talking about previous hacks/exploits with NATS?
Do you even use NATS?

I don't I had clients who did and got insulted by TMM on numerous occasions
when the issue was raised in a few occasions which all were done directly and
very politely to them and kept non public.

And not only insulted but badmouthed behind my back to clients......

TheDoc 01-03-2008 11:11 AM

Quote:

Originally Posted by ServerGenius (Post 13599311)
I don't I had clients who did and got insulted by TMM on numerous occasions when the issue was raised in a few occasions which all were done directly and very politely to them and kept non public.

And not only insulted but badmouthed behind my back to clients......

I guess I don't get what happened, not being a dick about it, honestly.

What did TMM say to insult them? Did TMM mouth you or the clients or both? Was it face to face?

edit: read your post again, made more since this time :p

I ask, because of it was a ticket/icq, then post it so we can all rail john.

ServerGenius 01-03-2008 11:20 AM

Quote:

Originally Posted by TheDoc (Post 13599361)
I guess I don't get what happened, not being a dick about it, honestly.

What did TMM say to insult them? Did TMM mouth you or the clients or both? Was it face to face?

edit: read your post again, made more since this time :p

I ask, because of it was a ticket/icq, then post it so we can all rail john.

I'm not going to make a big deal out of this anymore....I spoke to John recently
and it was dealt with for my part.....no need to drag dead horses out again...

This kinda of behaviour wasn't exclusive towards me at the time.....there's
plenty of other threads where many different people were confronted with
the same type of behaviour.....hosting providers, sysadmins, tech people
who noticed the same thing many others did.....before it came out in the open.......

will76 01-03-2008 11:29 AM

Quote:

Originally Posted by TheDoc (Post 13597466)

NATS job is NOT to provide security. It’s to provide a program backend, only. YOUR job is to secure it, your hosts and yours, period.

.

John should hire you for PR. :upsidedow So according to you NATS job is not to protect their own admin account info to people's servers? :helpme Never mind the fact that NATS asked people to leave these accounts open and then they didn't protect them and you saying that is not their responsibility??? They ask you for a key to your house basically and then they obviously didn't do a good job keeping that key from getting stolen, someone breaks into my house using that key, and you say it is my fault because i didn't have better security inplace. You are too fucking much, you should work for too much media. :1orglaugh:1orglaugh:1orglaugh:1orglaugh:1orglaugh :1orglaugh:1orglaugh:1orglaugh:1orglaugh:1orglaugh :1orglaugh:1orglaugh

will76 01-03-2008 11:34 AM

Quote:

Originally Posted by TheDoc (Post 13597771)
No worries Tony, I'm done with these two tools. They read past the answers and modify their own questions for personal benefit.

all i do is quote you, you provide more than enough nonesense that one wouldnt have to make up or twist anything.

TheDoc 01-03-2008 11:34 AM

Quote:

Originally Posted by ServerGenius (Post 13599492)
I'm not going to make a big deal out of this anymore....I spoke to John recently
and it was dealt with for my part.....no need to drag dead horses out again...

This kinda of behaviour wasn't exclusive towards me at the time.....there's
plenty of other threads where many different people were confronted with
the same type of behaviour.....hosting providers, sysadmins, tech people
who noticed the same thing many others did.....before it came out in the open.......

Ohhh.. yeah, don't get me wrong.. I know John has been a Dick. I couldn't spin that if I tried.

I thought you ment more like, I'm going to sue you if you say anything, or something like that. Yeah John isn't very well known for being Mr. Nice Guy

TheDoc 01-03-2008 11:39 AM

Quote:

Originally Posted by will76 (Post 13599575)
Never mind the fact that NATS asked people to leave these accounts open and then they didn't protect them and you saying that is not their responsibility???

Aye, people have told me I should do John's PR work, it has been talked about. But it won't happen :/


If I give a key to my house, it's 100% my ass if the house gets broken into. No the house builder, door maker, key creator, or anyone else.. It's 100% my fault.

So if you gave NATS the keys to your program, it's your own fucking fault. Even more so when you didn't turn on the built in security feature that would have stopped this.

And agian, not all programs were breached.. Not even close to half. Most did use the ip lock feature and not all had tmm admin accounts, because you aren't forced to have them.

Your turn, please twist what was said one more time in a different direction so I can answer the same thing again for the 1000 time.

ServerGenius 01-03-2008 11:39 AM

Quote:

Originally Posted by TheDoc (Post 13599631)
Ohhh.. yeah, don't get me wrong.. I know John has been a Dick. I couldn't spin that if I tried.

I thought you ment more like, I'm going to sue you if you say anything, or something like that. Yeah John isn't very well known for being Mr. Nice Guy

Well it was also along those lines but the I'll sue you if you do this thing
don't fly with me.......the bashing normaly neither.......but since I was
presented with the opportunity I decided to throw the ball back for a change.

:thumbsup

ServerGenius 01-03-2008 12:39 PM

how about

"what if it is the security company who have your key that breaks in to your house,, whos fault would it be then ?"

minusonebit 01-03-2008 01:49 PM

Quote:

Originally Posted by TheDoc (Post 13599269)
Sad as it is, if this didn't come out on the boards it wouldn't have been fixed. They didn't know wtf to look for. It blew up in their faces because they aren't security admins and the true fact that John's ego blocks his brain waves sometimes doesn't help.

Thanks for making my case for me. John and the rest of the TMM team has no business running NATS or anything else that deals with sensitive data for exactly this reason. They esp. have no business running such an application and refusing to allow any third party to verify the safety of it when they run it encrypted. The whole thing is absolutely disgusting, I still cannot believe that there are people still sucking the NATS cock thinking this is all no big deal, just a small bump in the road that will soon pass, etc. It really says alot about this industry, the people in it and the state of affairs for both. Its good that people are taking sides on this one. Makes it real easy to tell who is upstanding and who you need to watch the fuck out for.

minusonebit 01-03-2008 02:10 PM

Quote:

Originally Posted by TheDoc (Post 13599678)
Aye, people have told me I should do John's PR work, it has been talked about. But it won't happen :/


If I give a key to my house, it's 100% my ass if the house gets broken into. No the house builder, door maker, key creator, or anyone else.. It's 100% my fault.

So if you gave NATS the keys to your program, it's your own fucking fault. Even more so when you didn't turn on the built in security feature that would have stopped this.

And agian, not all programs were breached.. Not even close to half. Most did use the ip lock feature and not all had tmm admin accounts, because you aren't forced to have them.

Your turn, please twist what was said one more time in a different direction so I can answer the same thing again for the 1000 time.

No, its not the program's faults. TMM was expected to take reasonable care to ensure that those keys (the logins) were not disclosed or used improperly. Leaving a file of user/pass pairs laying around on a server is not a proper practice and if you think it is, then you need to go back to school. Its the digital equivalent of keeping a post it note on the monitor and its fucking ridiculous. Yes, data breaches happen every day to all sorts of companies. But that does not excuse the conduct of any of those companies, it is still 100% their fault.

People like to throw up "Oh, well how wouldn't you have done it differently, Mr. Know It All?" and to that I say this: I wouldn't have done it at all. If I owned a program, I would have looked into NATS but I would have never bought it. The first red flag would be the fact that it runs on Zend. ANYTHING that requires Zend is always a concern. Next, I would have found out that not only does it run on Zend, but I am not allowed to even install it myself. Another red flag. Why would I not be permitted to install it? I paid for it. My software, right? Next I would have found that the software has never been audited by an independent third party and whats more, John won't allow you to bring a third party in, citing intellectual property concerns. Major red flag. The only people who fear independent audits at someone else's expense are those with something to hide. Sure, John might have concerns over a particular expert, but surely an exert exists that is completely independent but qualified to render a competent opinion that both sides can agree on does not present and IP concern. At this point, I'd start digging into the past of the company and when I found the PornGraph saga, I'd say "You know, this guy is always close by when things catch on fire and burn to the ground. This is a bad pairing, thanks but no thanks."

The only thing the programs are guilty of is making a poor choice on who to do business with. Responsible program owners are - right now - making plans to ditch NATS and TMM. Due to the complexity of such a move, its gonna take some time, 3 to 6 months I'd say. And because of John's history of playing dirty pool, I think most programs that are leaving him are afraid to say so publicly until they have something in place and are ready to pull the plug on NATS/TMM out of fear that John will cut the cord to their licenses in an attempt to bust any unions that start to form. So I am cool with that - for now. But in about 3 to 6 months, the question for program owners who are sticking with NATS is: why? Show me why this program should be trusted and moreover, why I should continue to trust you and not be concerned about your apparent inability to put personal friendships and personal fondness for someone aside and make the right decision for the company.

TheDoc 01-03-2008 02:27 PM

Yawn, you have no clue what you are talking about.

Dude, nats fucked up, hosts have fucked up, mpa3 fucked up really bad before, and the history of massive screwups in this business is very long. People move past them or we wouldn't have anyone to do business with.

Nobody gives a fuck but the few people that keep posting over and over on all the NATS threads. Anyone leaving NATS already had a plan to exit, otherwise I don't have a single client that has said they are leaving NATS.

Your logic is flawed too. Check this.. I bought paid for my NATS, monthly for a bit before I bought it. Most programs with any size just purchased it. So years go by and TMM/NATS isn't making a dime from me and several others but I still take up support hours, ect. I get pissed and I leave..

Did that hurt nats in the least bit? No, it helps them. Because every stable/paid up client that drops them will be replaced with 5 other smaller ones paying monthly fees.

And poor choices to do business with? Dude, this business is fucked. It's dirty, shady, and filled with money hungry dicks that will fuck their moms over for a dime. You no nothing about this business and try to toss us Tmm/nats as being super bad.. Fuck dude, the are mr clean compared to most companies that "they" do business with.

I keep telling you, that you only help TMM/NATS but you clearly do not understand even basics of brand marketing.

Validus 01-03-2008 09:09 PM

Lets hope this gets resolved soon.

minusonebit 01-03-2008 11:21 PM

Quote:

Originally Posted by TheDoc (Post 13601777)
Yawn, you have no clue what you are talking about.

Dude, nats fucked up, hosts have fucked up, mpa3 fucked up really bad before, and the history of massive screwups in this business is very long. People move past them or we wouldn't have anyone to do business with.

Nobody gives a fuck but the few people that keep posting over and over on all the NATS threads. Anyone leaving NATS already had a plan to exit, otherwise I don't have a single client that has said they are leaving NATS.

Your logic is flawed too. Check this.. I bought paid for my NATS, monthly for a bit before I bought it. Most programs with any size just purchased it. So years go by and TMM/NATS isn't making a dime from me and several others but I still take up support hours, ect. I get pissed and I leave..

Did that hurt nats in the least bit? No, it helps them. Because every stable/paid up client that drops them will be replaced with 5 other smaller ones paying monthly fees.

And poor choices to do business with? Dude, this business is fucked. It's dirty, shady, and filled with money hungry dicks that will fuck their moms over for a dime. You no nothing about this business and try to toss us Tmm/nats as being super bad.. Fuck dude, the are mr clean compared to most companies that "they" do business with.

I keep telling you, that you only help TMM/NATS but you clearly do not understand even basics of brand marketing.

Wow, you really are sucking John's dick hard. You should send him a bill for trying to whitewash the issue.

Doctor Dre 01-04-2008 10:34 AM

Quote:

Originally Posted by TheDoc (Post 13597783)
How exactly would NATS follow the money trail? Wouldn't it take Webmasters to team up and expose it for them? And I know who they are, so what? NATS can't sue them.

NATS is looking into things, they have stated they are hunting down the hacker. Of course they can't comment more, I wouldn't either, nobody doing an investigation would.

Logic people, logic...

Have they contacted the FBI or the governemental institution in charge of this kind of crimes ?

Stop spinning the question arround and putting the responsability on everybody BUT TMM.

I haven't seen any statement that said they are initiating any criminal investigation, when clearly this has been a criminal activity that touched all of us.

Somebody out there had access to my identity because of this.

And as far as the responsability, it's clearly not the webmaster's fault if the TMM admin account has been compromised. It's your responsability to secure your server, and I'm glad you were one of the guys that went further, but it was nat's admin account that got compromised, not the webmaster admin.

minusonebit 01-04-2008 11:07 AM

Quote:

Originally Posted by Doctor Dre (Post 13605765)
Have they contacted the FBI or the governemental institution in charge of this kind of crimes ?

Stop spinning the question arround and putting the responsability on everybody BUT TMM.

I haven't seen any statement that said they are initiating any criminal investigation, when clearly this has been a criminal activity that touched all of us.

Somebody out there had access to my identity because of this.

And as far as the responsability, it's clearly not the webmaster's fault if the TMM admin account has been compromised. It's your responsability to secure your server, and I'm glad you were one of the guys that went further, but it was nat's admin account that got compromised, not the webmaster admin.

Funny how he has no immediate reply to this, when he had an immediate reply for everyone and everything else. Telling.


All times are GMT -7. The time now is 06:10 PM.

Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2025, vBulletin Solutions, Inc.
©2000-, AI Media Network Inc123