> These are all things that are... well... forces for good in
> the right hands,
> but in others they're stepping stones useful to hack a
> machine if you know
> what you're doing.
So you're trying to deny you're responsible! Nah, just j/k.
You're right, of course. For example, guns can also be used for... umm ...
oh, no... bad analogy ;-)
> My guess is is someone uploaded these files to a
> web-reachable part of the
> site, and used them to ultimately make your machines zombie slaves.
Methinks uploading wasn't necessary ;-)
But the zombie slaves part was spot on... until we cured them with new
network passwords all-round.
--
Aidan Whitehall <[EMAIL PROTECTED]>
Netshopper UK Ltd
Advanced Web Solutions & Services
http://www.netshopperuk.com/
Telephone +44 (01744) 648650
Fax +44 (01744) 648651
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Structure your ColdFusion code with Fusebox. Get the official book at
http://www.fusionauthority.com/bkinfo.cfm
Archives: http://www.mail-archive.com/cf-talk@houseoffusion.com/
Unsubscribe: http://www.houseoffusion.com/index.cfm?sidebar=lists