From: Darrell Fuhriman <darrell@teleport.com>
To: Anonymous <nobody@REPLAY.COM>
Message Hash: f0208989410854f5dbc92e88494dcd8bbe2e5fcf674d5e4d3e4f148558b1b754
Message ID: <Pine.SUN.3.91.951214010119.19728A-100000@claudia.teleport.com>
Reply To: <199512140038.BAA02939@utopia.hacktic.nl>
UTC Datetime: 1995-12-14 15:42:59 UTC
Raw Date: Thu, 14 Dec 1995 23:42:59 +0800
From: Darrell Fuhriman <darrell@teleport.com>
Date: Thu, 14 Dec 1995 23:42:59 +0800
To: Anonymous <nobody@REPLAY.COM>
Subject: Re: And the standard continues to lower...
In-Reply-To: <199512140038.BAA02939@utopia.hacktic.nl>
Message-ID: <Pine.SUN.3.91.951214010119.19728A-100000@claudia.teleport.com>
MIME-Version: 1.0
Content-Type: text/plain
> >http://www.bluewaterp.com/~bcrissey/
Oh no.. It's not...
# nslookup www.bluewaterp.com
Server: sandra.teleport.com
Address: 192.108.254.11
Name: www.teleport.com
Addresses: 192.108.254.16, 192.108.254.17, 192.108.254.18
Aliases: www.bluewaterp.com
Ack! it is!! Oh no..
> The scheme is to send 4 digits of the credit card at a time. The
> "explanation" follows.
I've had a little chat with the web people downstairs about this. I
don't know what they were thinking when they have this guy permission to
run this..
I thought about sticking a packet sniffer on the network, and sending him
all his "secure" transactions.
I'm going to look over the code for obvious problems (heh heh that's an
understatement), but a cursory glance leads me to think it's an entry in
the Annual Poor Code Formatting contest.
Ugh.. I'm so embarrased.
Darrell Fuhriman
Teleport System Administration
Return to December 1995
Return to “nobody@REPLAY.COM (Anonymous)”