The Arcive of Official vBulletin Modifications Site.It is not a VB3 engine, just a parsed copy! |
|
#61
|
|||
|
|||
You and I both know what's happening here, and it's not that.
|
#62
|
||||
|
||||
Quote:
Quote:
Quote:
DO NOT USE THE SAME PASSWORD FOR EVERY SITE! Buy a cheap black ledger book from an office supply store/wal-mart etc and write down the passwords for each site, keep in your desk drawer for easy reference. You can also have your broswer remember passwords, I do the ledger book because if the right virus hits your pc then all that info is known as well. |
Благодарность от: | ||
Max Taxable |
#63
|
||||
|
||||
You don't know neither does DJ .
|
#64
|
|||
|
|||
I actually do this to an extent.
I use the same password for all sites I'm a member of (e.g., YouTube), However, on sites where I'm a staff member, such as KH-Flare, I use a different password, which is currently the only site I have a different password on. The other sites I'm staff on aren't big / don't have a lot on them at the moment, so I use the same password as places I'm of a member of, but it's a secure password. Then there are also sites that you're staff on, but you're only a sectional moderator that, of course, doesn't have access to the admin or moderator control, so it doesn't really matter. I actually look at the security more than the uniqueness when it comes to passwords |
#65
|
|||
|
|||
What hasn't been disclosed and concerns me is whether the hackers had access to customer records and financial information, and the support system which must contain a large amount of fairly sensitive customer information...
|
#66
|
||||
|
||||
Not really sure what financial information you mean.
All the log files that were examined do not show any attemped access of customer data in the support system, they basically targeted the vb user table. |
#67
|
|||
|
|||
Welcome to I was right.
Quote:
The right thing was not IB employees initially taking the Baghdad Bob role. |
#68
|
||||
|
||||
Just to keep this clear...
No one has yet said vbulletin DOT COM wasn't possibly hacked. The meter was this site, vbulletin DOT ORG. From the link in post #3, there is NO claim of vb dot org being part of this "hack." And many here have expressed their doubts a exploit for version 4 would also automatically mean this site which uses version 3 was also "hacked." As far as I can tell, only the author of the first post is claiming it's also vB dot org which was "hacked." There isn't one shred of proof of that and it's not even a claim the illiterate script kiddies with their dummied up screenshot and their "patch for sale" are even making. |
#69
|
||||
|
||||
Just got this e mail:
Quote:
|
Благодарность от: | ||
taz112768 |
#70
|
||||
|
||||
So... can someone explain how exactly they hacked vb.com. Can we have some more detailed answers?
|
Thread Tools | |
Display Modes | |
|
|
X vBulletin 3.8.12 by vBS Debug Information | |
---|---|
|
|
More Information | |
Template Usage:
Phrase Groups Available:
|
Included Files:
Hooks Called:
|