Subj : Ghosts in the Machine To : TODD HENSON From : CONSTANCE RAWLEY Date : Tue Oct 31 2000 03:09 pm Hello Todd, CR> You too? Did you see the recent posts in the Fidonews Echo about CR> hackers invading someone's computer and installing a directory CR> above the root directory? I didn't even think that was possible! CR> They don't have to be collecting information on you, Todd. They CR> might just want to use your computer to launch attacks on other CR> computers. TH> Hmmm....I never heard of installing a directory above the root. TH> I wouldn't even know what means. I don't know how they do it. The report I read said that the directory was installed above the root and it was hidden. And this was done by someone who had accessed the computer from a remote site. TH> But I guess you're right about how others might want to use the TH> computers of others. I've read that these types of hacker attacks are occurring more frequently due to a combination of service providers and modems that allow computers to stay connected to the Internet 24 / 7. Computers that are online all of the time give hackers plenty of opportunity to carry out their exploits. TH> So, how are you today, Constance? It's nothing that can't be cured, though the remedies that some suggest sound a little extreme. :-) Speaking of remedies, why did you leave Holysmoke, yet continue to participate here? What is it that you're seeking or trying to accomplish? Constance --- Platinum Xpress/Win/WINServer v3.0pr4 * Origin: BBS Networks @ www.bbsnets.com 808-839-5016 (1:10/345) .