Jump to content

ShortCut

Active Members
  • Posts

    5
  • Joined

  • Last visited

Everything posted by ShortCut

  1. Appreciate all the input and thoughts. I understand the basics of networking, but right now I'm in the middle of mastering (if anyone actually can) SQL Server and have little time for much else. Spitz
  2. Since my main focus has always been hardware hacks and OS's this problem is a little outside my realm. Two days ago my boss complained that he had 1400 returned emails in his inbox. It seems that our email server may have been breached and somebody used it to send thousands of Chinese spam emails. Now our company has been put on the email blacklist and we are fighting to get this runaway train to stop. The morning we discovered the issue, we immediately killed the sales@sybatech.com email address in Microsoft Exchange. Any ideas? Here's one of the headers (I also attached a saved copy of the email): Received: from mail.sybatech.com (unknown [173.165.112.213]) by mx16 (Coremail) with SMTP id QsCowECJHVc7AgRQjXUuBg--.993S2; Mon, 16 Jul 2012 19:59:56 +0800 (CST) Received: from localhost (localhost.localdomain [127.0.0.1]) by mail.sybatech.com (Postfix) with ESMTP id 994A82A8100; Mon, 16 Jul 2012 06:59:52 -0500 (CDT) Received: from mail.sybatech.com ([127.0.0.1]) by localhost (emailserver [127.0.0.1]) (amavisd-new, port 10024) with LMTP id 07050-01-5; Mon, 16 Jul 2012 06:59:33 -0500 (CDT) Received: from hvwkns (unknown [42.49.128.155]) by mail.sybatech.com (Postfix) with ESMTP id 0C08C2A80FD; Mon, 16 Jul 2012 06:59:22 -0500 (CDT) Message-ID: <20120716200750226845@sybatech.com> From: =?utf-8?B?5r2Y5a6B5aiF?= <sales@sybatech.com> To: <gusuhang@163.com> Subject: =?utf-8?B?5pyJ5pWI6LCDeuWyl+iwg3XolqrlkozkvIFx5Lia5bi46KeB5YqzZuWKqOS6iWrorq4=?= =?utf-8?B?5aSE55CG5a+5c+etlu+8gQ==?= Date: Mon, 16 Jul 2012 20:07:45 +0800 MIME-Version: 1.0 Content-Type: multipart/mixed; boundary="----=_NextPart_000_0E37_01A48561.19A8AAF0" X-mailer: Thfifmdkl 2 X-Virus-Scanned: by ClamAV 0.83 X-CM-TRANSID: QsCowECJHVc7AgRQjXUuBg--.993S2 X-Coremail-Antispam: 1Uf129KBjDUn29KB7ZKAUJUUUUU529EdanIXcx71UUUUU7v73 VFW2AGmfu7bjvjm3AaLaJ3UbIYCTnIWIevJa73UjIFyTuYvjxUVk9NUUUUU
  3. I feel much the same way. If you are broadcasting ANY kind of unencrypted signal, there should be no law against "listening" to those signals. As a Ham Radio operator, I'm used to the idea that whatever I say is fair game for anyone else to listen to. It's kind of like looking into other people's cars. It may be perceived as suspicious, but when I walk through a parking lot I can't help but take glances inside people's cars. It's not illegal and its assumed that by driving a car in public and parking in a public place that people are going to be able to see what's in your ride.
  4. http://www.zdnet.com/blog/networking/google-may-be-able-to-legally-listen-in-to-your-wi-fi-networking/2239?tag=nl.e539 This article describes Google, but the ramifications reach out to the hacker community as well. Shortcut
×
×
  • Create New...