Subj : Ghosts in the Machine To : CONSTANCE RAWLEY From : TODD HENSON Date : Tue Oct 31 2000 11:47 pm > Hello Todd, > > CR> You too? Did you see the recent posts in the Fidonews Echo about > CR> hackers invading someone's computer and installing a directory > CR> above the root directory? I didn't even think that was possible! > CR> They don't have to be collecting information on you, Todd. They > CR> might just want to use your computer to launch attacks on other > CR> computers. > > TH> Hmmm....I never heard of installing a directory above the root. > TH> I wouldn't even know what means. > > I don't know how they do it. The report I read said that the directory > was installed above the root and it was hidden. And this was done by > someone who had accessed the computer from a remote site. Makes reaching out across the web kinda scary sometimes. > TH> But I guess you're right about how others might want to use the > TH> computers of others. > > I've read that these types of hacker attacks are occurring more > frequently due to a combination of service providers and modems that > allow computers to stay connected to the Internet 24 / 7. > > Computers that are online all of the time give hackers plenty of > opportunity to carry out their exploits. Heck, you'd think that they would just unplug their cable modems when they weren't surfing. I'm not aware if that would cause any problems. > > TH> So, how are you today, Constance? > > It's nothing that can't be cured, though the remedies that some suggest > sound a little extreme. :-) Speaking of remedies, why did you leave > Holysmoke, yet continue to participate here? What is it that you're Reasons for becoming tired of places like Holysmoke are obvious. As for here, it's more fun. :-) > seeking or trying to accomplish? Why, world domination of course! --- Platinum Xpress/Win/WINServer v3.0pr5 * Origin: Get all your fido mail here: www.docsplace.org (1:18/140) .