You are not logged in. Login Now
 0-24   25-49   50-74   75-99   100-124   125-149   150-174   163-187   188-212 
 213-222          
 
Author Message
25 new of 222 responses total.
willard
response 188 of 222: Mark Unseen   Jun 15 14:14 UTC 2000

It's also funny to use in party... "if ur from bangalore and u like
american girls with big booms, type !yes now"
dpc
response 189 of 222: Mark Unseen   Jun 16 14:21 UTC 2000

When I tried to retrieve my mail just now here is what happened:

Ok: !mail

/tmp: write failed, file system is full
panic: Message temporary file corrupted

/tmp: write failed, file system is full
terminated: IOT

Should I panic?  Could someone check this out?  Thanx!
goose
response 190 of 222: Mark Unseen   Jun 16 15:25 UTC 2000

when I logged in just now, it took my login and passwd, started to log me in
and then before giving me a prompt it went back to the login prompt complete
with beep and I had to log in again.  In light of recent events should I be
worried about another passwd sniffer?
iggy
response 191 of 222: Mark Unseen   Jun 16 15:45 UTC 2000

only if it is around your crotch...
hahaha
janc
response 192 of 222: Mark Unseen   Jun 16 16:10 UTC 2000

Dave:  Sounds like /tmp filled up.  This shouldn't have caused you to
lose any mail.

Chris:  I don't know what caused that, but it wouldn't have been a
password sniffer.  I think those just monitor packets on the network,
without interupting their flow.  A password sniffer would normally not
be noticable.
goose
response 193 of 222: Mark Unseen   Jun 17 03:30 UTC 2000

Yeah, bad choice of word, I was thinking more of a passwd "grabber".
janc
response 194 of 222: Mark Unseen   Jun 17 03:47 UTC 2000

Trojan horse, that pretends to be the login program, but instead grabs
your password, saves it, prints a "password incorrect" message, and
drops you to the real login prompt so you'll never guess what happened.

I haven't heard of this being done on a modern Unix system.  Normally
telnetd won't allocate a pseudo-tty to a new person connecting in if
there are still any processes open on it, so for as long as the Trojan
hangs around, nobody else would connect to that pseudo tty so nothing
would happen.  You'd probably have to do something clever like exploit a
race condition to get the Trojan in on a pseudotty that was actually
connected to someone.  I don't know enough about this stuff to say it
can't be done, but I'd be surprised.
gelinas
response 195 of 222: Mark Unseen   Jun 17 05:02 UTC 2000

An easier way: modify .login to mimic the prompt a second time.  An easy
way to promulgate the modified .login is with a message like "for a great
time, telnet to trojan-source.com and login as sucker with the password
gotcha."
jazz
response 196 of 222: Mark Unseen   Jun 17 16:13 UTC 2000

        I've seen programs that closely mimic the NT login screen and xlockmore
being used to troll for student passwords (and occsasionally, for the bold,
lab administrator passwords), before.  
gull
response 197 of 222: Mark Unseen   Jun 17 23:50 UTC 2000

Is this why you're supposed to hit Ctrl-Alt-Del before logging into NT?
keesan
response 198 of 222: Mark Unseen   Jun 18 01:34 UTC 2000

What is the proper procedure for someone who changed their password but
apparently typed it wrong to obtain the correct spelling?  Our friend read
the book and typed in trouble at the login prompt, Wednesday, and says nobody
has gotten back to her to help, or if they have, they emailed and she cannot
read her mail.  (I emailed staff to send me her password or phone her).

Does anyone else have to dial three times on average to connect rather than
getting 'no carrier'?
twinkie
response 199 of 222: Mark Unseen   Jun 18 03:38 UTC 2000

re: 197 -- Yes.

gelinas
response 200 of 222: Mark Unseen   Jun 18 04:13 UTC 2000

No, it's not.  The three-fingered salute is required because it seemed a good
idea to Microsoft.
mcnally
response 201 of 222: Mark Unseen   Jun 18 06:41 UTC 2000

  Actually, that *is* the reasoning behind the Ctrl-Alt-Del combo being used
  for NT login.  Since that's one of the few (only?) keypress combos that a
  user program can't catch, it's a great choice for login.  It's one of the
  better non-obvious ideas in NT
twinkie
response 202 of 222: Mark Unseen   Jun 18 07:58 UTC 2000

re: 200 -- I really hope you're being sarcastic. Otherwise, I'd suggest
finding someone with a two-by-four and asking them to smack the ignorance out
of you.

gypsi
response 203 of 222: Mark Unseen   Jun 18 08:53 UTC 2000

Re #201 - You would have laughed at me during my first day at UMI.  To start
my computer (NT), it told me to hit Ctrl-Alt-Del to bring up the login
prompt.  I thought it was a practical joke until my boss assured me that it
would not restart the computer.  =)
tpryan
response 204 of 222: Mark Unseen   Jun 18 13:15 UTC 2000

        I continue to get non-connections upon dialing in, also.
gelinas
response 205 of 222: Mark Unseen   Jun 18 17:16 UTC 2000

No, I wasn't being sarcastic.  Microsoft does a lot of things that make
absolutely NO sense to anyone else.  Why not this?  #201 explains something
I didn't know, much more usefully than a 2x4 would.
mdw
response 206 of 222: Mark Unseen   Jun 18 21:57 UTC 2000

Actually, under windows & dos, it's perfectly feasible to catch
ctrl-alt-del.  I gather under NT it's a "SAK" key - the one that engages
the attention of some "trusted" part of the OS that is presumably harder
to compromise, but I sure wouldn't want to bet it's impossible to
compromise.
i
response 207 of 222: Mark Unseen   Jun 19 04:03 UTC 2000

My understanding is that an OS could make *any* keystroke combination
uncatchable...so long as it's a real protected-mode OS that doesn't let
applications programs play with the keyboard controller, interrupt tables,
etc. (like DOS, Win3.X, etc. do).  Ctrl-Alt-Del is treated as special by
the PC BIOS - but the BIOS stuff pretty much goes away when a protected
OS takes over.  The big reason to use Ctrl-Alt-Del as the uncatchable
key combination in NT is that *very* few old DOS, Win3.X, etc. programs
that one might want to run under NT have any legit need to intercept it.
scott
response 208 of 222: Mark Unseen   Jun 20 20:07 UTC 2000

The modem server is finally able to get the rest of its brain from the new
gryps box, so modems should be working normally again.
tpryan
response 209 of 222: Mark Unseen   Jun 20 21:59 UTC 2000

        Thank you for the fix-up.  I noticed it this afternoon.
aruba
response 210 of 222: Mark Unseen   Jun 21 02:52 UTC 2000

Thanks Scott!
janc
response 211 of 222: Mark Unseen   Jun 21 04:38 UTC 2000

Thanks Scott.  Also thanks to Charles (arthurp) who built the new gryps
for us.
aruba
response 212 of 222: Mark Unseen   Jun 21 04:51 UTC 2000

THanks Charles!
 0-24   25-49   50-74   75-99   100-124   125-149   150-174   163-187   188-212 
 213-222          
Response Not Possible: You are Not Logged In
 

- Backtalk version 1.3.30 - Copyright 1996-2006, Jan Wolter and Steve Weiss