> These are all things that are... well... forces for good in 
> the right hands,
> but in others they're stepping stones useful to hack a 
> machine if you know
> what you're doing.

So you're trying to deny you're responsible! Nah, just j/k.

You're right, of course. For example, guns can also be used for... umm ...
oh, no... bad analogy   ;-)


> My guess is is someone uploaded these files to a 
> web-reachable part of the
> site, and used them to ultimately make your machines zombie slaves.

Methinks uploading wasn't necessary   ;-)

But the zombie slaves part was spot on... until we cured them with new
network passwords all-round.


-- 
Aidan Whitehall <[EMAIL PROTECTED]>
Netshopper UK Ltd
Advanced Web Solutions & Services

http://www.netshopperuk.com/
Telephone +44 (01744) 648650
Fax +44 (01744) 648651

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Structure your ColdFusion code with Fusebox. Get the official book at 
http://www.fusionauthority.com/bkinfo.cfm

Archives: http://www.mail-archive.com/cf-talk@houseoffusion.com/
Unsubscribe: http://www.houseoffusion.com/index.cfm?sidebar=lists

Reply via email to