On Tue, 13 Oct 2015 04:15:21 -0400 (EDT), Jochen Spieker wrote:
>
> It looks like the mail was delivered directly through
> smtp02.wow.cmh.synacor.com by a user who successfully authenticated
> using the username thecoughingcanary.
On Wed, 14 Oct 2015 05:04:55 -0400 (EDT), Brian
On 10/13/2015 06:24 PM, Stephen Powell wrote:
On Tue, 13 Oct 2015 02:36:46 -0400 (EDT), Jimmy Johnson wrote:
Looks like it was mailed from MS Windows. Maybe mailed from a Windows
OS with a virus. Do you run Windows too?
No, I don't. There is no computer connected to my home network that
On Tue 13 Oct 2015 at 22:21:08 -0400, Stephen Powell wrote:
> On Tue, 13 Oct 2015 18:57:58 -0400 (EDT), Brian wrote:
> >
> > The comment was a general one and directed at all our readers. However,
> > earlier you said "Someone discovered my password somehow". You have
> >
Say that you are using the Desktop version of Android(tm). It's pretty
close to the truth.
On 10/14/15 05:33, Stuart Longland wrote:
On 14/10/15 13:23, John Hasler wrote:
Lie. Tell them you're running Windows 95.
"Ohh sorry, we only support Windows 7 or 8"
On Wed, Oct 14, 2015 at 01:33:02PM +1000, Stuart Longland wrote:
> On 14/10/15 13:23, John Hasler wrote:
> > Lie. Tell them you're running Windows 95.
>
> "Ohh sorry, we only support Windows 7 or 8"
I can truthfully say that my Android-based tablet can't get access. It's
hard for ISPs not to
On 14/10/15 13:23, John Hasler wrote:
> Lie. Tell them you're running Windows 95.
"Ohh sorry, we only support Windows 7 or 8"
--
Stuart Longland (aka Redhatter, VK4MSL)
I haven't lost my mind...
...it's backed up on a tape somewhere.
signature.asc
Description: OpenPGP digital signature
On 14/10/15 12:51, Stephen Powell wrote:
> Their level 1 help desk isn't much help anyway, if you're a Linux user.
> The last time I called their level 1 help desk for technical support, the
> conversation went something like this:
Yep, familiar story. Some can't get it through their thick heads
On Tue, 13 Oct 2015 11:22:34 -0400 (EDT), Andrew McGlashan wrote:
>
> On 13/10/2015 7:15 PM, Jochen Spieker wrote:
>> Stuart Longland: I had a similar case on my self-administered mail
>> host. A friend of mine has an account there and random hosts from
>> all over the world used his credentials
On Tue, 13 Oct 2015 22:09:53 -0400 (EDT), Stuart Longland wrote:
>
> This isn't level 1 helpdesk material, you'll actually need a technical
> contact there.
Their level 1 help desk isn't much help anyway, if you're a Linux user.
The last time I called their level 1 help desk for technical
On 14/10/15 11:53, Stephen Powell wrote:
> On Tue, 13 Oct 2015 04:15:21 -0400 (EDT), Jochen Spieker wrote:
>>
>> Stuart Longland:
>>> On 13/10/15 09:58, Stephen Powell wrote:
Unfortunately, I don't. Attached below is one of the mail delivery
failure notices, which includes the
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Hi,
On 14/10/2015 12:53 PM, Stephen Powell wrote:
> No. My id on this mail server is "zlinuxman". I have no idea who
> "thecoughingcanary" is. Nor do I understand why the SMTP server
> would allow "thecoughingcanary" to send out e-mails in my
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Hi,
On 14/10/2015 1:09 PM, Stuart Longland wrote:
>> No. My id on this mail server is "zlinuxman". I have no idea
>> who "thecoughingcanary" is. Nor do I understand why the SMTP
>> server would allow "thecoughingcanary" to send out e-mails in my
Stephen Powell writes:
> And that was that. They'll gladly take the money of a Linux user.
> But if you have problems, you're on your own.
Lie. Tell them you're running Windows 95.
--
John Hasler
jhas...@newsguy.com
Elmwood, WI USA
On Tue, 13 Oct 2015 18:57:58 -0400 (EDT), Brian wrote:
>
> The comment was a general one and directed at all our readers. However,
> earlier you said "Someone discovered my password somehow". You have
> just demolished that guess as having no basis as a likely cause.
On 10/13/2015 09:51 PM, Stephen Powell wrote:
On Tue, 13 Oct 2015 22:09:53 -0400 (EDT), Stuart Longland wrote:
This isn't level 1 helpdesk material, you'll actually need a technical
contact there.
Their level 1 help desk isn't much help anyway, if you're a Linux user.
The last time I called
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Of course ftp, clear text passwords, is also a problem; if it was
this, then every time you update files via ftp, can you then
immediately change your password when done? Mute point if they are
using their own credentials to send mail and not your
On 10/12/2015 04:58 PM, Stephen Powell wrote:
On Mon, 12 Oct 2015 16:53:05 -0400 (EDT), Stuart Longland wrote:
I'd check the backscatter case, as this requires no skill on the part of
the attacker and is the most likely case.
...
It's worth knowing how to read the headers of emails in this
On 13/10/15 16:36, Jimmy Johnson wrote:
> On 10/12/2015 04:58 PM, Stephen Powell wrote:
>> On Mon, 12 Oct 2015 16:53:05 -0400 (EDT), Stuart Longland wrote:
>>>
>>> I'd check the backscatter case, as this requires no skill on the part of
>>> the attacker and is the most likely case.
>>> ...
>>>
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On Tue, Oct 13, 2015 at 01:54:53AM -0700, Jimmy Johnson wrote:
[...]
> >It's a popular client to spoof too.
>
> I'm just saying that there is a possible bot running and the chances
> are it's running in a windows environment, maybe even in a v-box,
On 10/13/2015 12:06 AM, Stuart Longland wrote:
On 13/10/15 16:36, Jimmy Johnson wrote:
On 10/12/2015 04:58 PM, Stephen Powell wrote:
On Mon, 12 Oct 2015 16:53:05 -0400 (EDT), Stuart Longland wrote:
I'd check the backscatter case, as this requires no skill on the part of
the attacker and is
On 13/10/15 18:22, to...@tuxteam.de wrote:
> On Tue, Oct 13, 2015 at 01:54:53AM -0700, Jimmy Johnson wrote:
>
> [...]
>
>>> It's a popular client to spoof too.
>
>> I'm just saying that there is a possible bot running and the chances
>> are it's running in a windows environment, maybe even in a
Stuart Longland:
> On 13/10/15 09:58, Stephen Powell wrote:
>>
>> Unfortunately, I don't. Attached below is one of the mail delivery
>> failure notices, which includes the headers of the original message.
>> But I don't understand what it all means.
…
>> Authentication-Results:
On 10/13/2015 02:02 AM, Stuart Longland wrote:
On 13/10/15 18:22, to...@tuxteam.de wrote:
On Tue, Oct 13, 2015 at 01:54:53AM -0700, Jimmy Johnson wrote:
[...]
It's a popular client to spoof too.
I'm just saying that there is a possible bot running and the chances
are it's running in a
On Mon 12 Oct 2015 at 19:58:59 -0400, Stephen Powell wrote:
> On Mon, 12 Oct 2015 16:53:05 -0400 (EDT), Stuart Longland wrote:
> >
> > I'd check the backscatter case, as this requires no skill on the part of
> > the attacker and is the most likely case.
> > ...
> > It's worth knowing how to read
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 13/10/2015 7:15 PM, Jochen Spieker wrote:
> Stuart Longland: I had a similar case on my self-administered mail
> host. A friend of mine has an account there and random hosts from
> all over the world used his credentials to send legitimately
>
On Mon 12 Oct 2015 at 23:36:46 -0700, Jimmy Johnson wrote:
> >X-MSMail-Priority: Normal
>
> >X-Mailer: Microsoft Outlook Express 6.00.2800.1081 <
>
> >X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2800.1081
>
>
> Looks like it was mailed from MS Windows. Maybe mailed from a Windows OS
>
Andrew McGlashan:
> On 13/10/2015 7:15 PM, Jochen Spieker wrote:
>>
>> Stuart Longland: I had a similar case on my self-administered mail
>> host. A friend of mine has an account there and random hosts from
>> all over the world used his credentials to send legitimately
>> looking spam. We never
On Wed 14 Oct 2015 at 02:22:34 +1100, Andrew McGlashan wrote:
> On 13/10/2015 7:15 PM, Jochen Spieker wrote:
> > Stuart Longland: I had a similar case on my self-administered mail
> > host. A friend of mine has an account there and random hosts from
> > all over the world used his credentials to
On 10/13/2015 05:43 PM, Stephen Powell wrote:
On Mon, 12 Oct 2015 12:36:27 -0400 (EDT), Brian wrote:
I tend to think passwords (except the very simplest or guessable ones)
are not "discovered" but handed over.
1. My password is known only to me. Even my wife doesn't
On Mon, 12 Oct 2015 12:36:27 -0400 (EDT), Brian wrote:
>
> I tend to think passwords (except the very simplest or guessable ones)
> are not "discovered" but handed over.
1. My password is known only to me. Even my wife doesn't know it.
2. My password is a random sequence
On Tue 13 Oct 2015 at 18:43:24 -0400, Stephen Powell wrote:
> On Mon, 12 Oct 2015 12:36:27 -0400 (EDT), Brian wrote:
> >
> > I tend to think passwords (except the very simplest or guessable ones)
> > are not "discovered" but handed over.
>
> 1. My password is known only
On 14/10/15 08:43, Stephen Powell wrote:
> In short, I have not "handed it over".
… "wittingly".
You may not have consciously done it, but that doesn't mean it wasn't
effectively "handed over". Some possibilities:
- Presently undetected malware intercepting the password being entered
on your
On Tue, 13 Oct 2015 02:36:46 -0400 (EDT), Jimmy Johnson wrote:
>
> Looks like it was mailed from MS Windows. Maybe mailed from a Windows
> OS with a virus. Do you run Windows too?
No, I don't. There is no computer connected to my home network that
even has Windows installed.
--
.''`.
On Tue, 13 Oct 2015 04:15:21 -0400 (EDT), Jochen Spieker wrote:
>
> Stuart Longland:
>> On 13/10/15 09:58, Stephen Powell wrote:
>>>
>>> Unfortunately, I don't. Attached below is one of the mail delivery
>>> failure notices, which includes the headers of the original message.
>>> But I don't
On Mon 12 Oct 2015 at 10:43:42 -0400, Stephen Powell wrote:
> About a week ago, I discovered hundreds of "mail delivery failure"
> messages in my inbox. Investigation revealed that they were all for
> SPAM e-mails that I did not send. I am guessing that this means one
> of two things:
>
> (1)
Hi,
> About a week ago, I discovered hundreds of "mail delivery failure"
> messages in my inbox. Investigation revealed that they were all for
> SPAM e-mails that I did not send. I am guessing that this means one
> of two things:
>
> (1) Someone discovered my password somehow, logged into my
About a week ago, I discovered hundreds of "mail delivery failure"
messages in my inbox. Investigation revealed that they were all for
SPAM e-mails that I did not send. I am guessing that this means one
of two things:
(1) Someone discovered my password somehow, logged into my ISP
account as me,
Stephen Powell:
>
> About a week ago, I discovered hundreds of "mail delivery failure"
> messages in my inbox. Investigation revealed that they were all for
> SPAM e-mails that I did not send. I am guessing that this means one
> of two things:
…
> (2) Someone sent out a bunch of SPAM, spoofing
On 13/10/15 00:57, Florian Pelgrim wrote:
>> (2) Someone sent out a bunch of SPAM, spoofing my e-mail address
>> > as the sender, and the delivery failures came to me.
>> >
>> > How can I tell which is the case, and if it's (2), is there anything
>> > I can do to defend myself against this sort
On Mon, 12 Oct 2015 16:53:05 -0400 (EDT), Stuart Longland wrote:
>
> I'd check the backscatter case, as this requires no skill on the part of
> the attacker and is the most likely case.
> ...
> It's worth knowing how to read the headers of emails in this
> circumstance as it can give you vital
40 matches
Mail list logo