Jump to content

Sysvr4

Members
  • Content Count

    883
  • Joined

  • Last visited

Community Reputation

0 Neutral

About Sysvr4

  • Rank
    Poker Forum Groupie

Profile Information

  • Location
    Nashvegas
  1. I bet and call usually, fold if raised by a really passive player (of which there are few at 5/10).Jeff
  2. Kinda looks like SB made a set or two pair since I can't really see T9. I play it the same, but I'd bet the river if a non-scary board pairing gave me aces up and he checked to me.Jeff
  3. Ok, so let's try to figure this out a bit... mind answering a couple of questions about it?1. Is the email address you registered with FCP the same as the one you registered with Neteller?2. Is the password you registered for both the same?3. Did your email account have an email from Neteller detailing your account information?4. Is your email address registered via a free web-based email provider? (ala yahoo, gmail, hotmail, etc)Your answers to this may help us determine how they're getting the information. I have a theory, but don't want to disclose it until such time as we get more information on the topic.Oh, btw, anyone else whose Neteller has been hacked, feel free to reply here with the answers to the above. It may very well help us figure this out.Jeff
  4. Hey guys,I've been meaning to post this for a while, but have had no time due to work and a house remodel. But I see a lot of you manually posting your BRs and progress here and I wanted to mention a little programming project I took upon myself a while back that covers this exact purpose:http://www.mobney.comIt's free, you can share your results with others, you can even just make the graph public and include it via <IMG SRC> tags in your blog.Anyway, flame me for "spamming" if you want, but you might keep in mind I'm not making a dime off the site. Just thought some of you might find it useful.Jeff
  5. Thanks for the reply, Bob. I wasn't aware at the time of my posting that the forum server had been compromised. I wonder if you could disclose the type of information held on the compromised server. For instance, was it just the information we registered with on the forum (ie, our names, email, and street addresses) or was there more sensitive information as well (neteller, etc)? Well, if my experience is any measure, they probably DID have access to the passwords, but I imagine they were in encrypted form only. Meaning that if they had enough time and computing power, they could run an MD5 or crypt() brute-force password cracker and eventually determine a good number of our passwords. Would that be an accurate statement? Fair enough. I have to take issue with this assessment, but please don't take this rebuttal personally.What you have described is jut not how internet email (as defined by the various RFCs on SMTP) works. It works more like the following (simplified greatly for obvious reasons):1. You send an email to user@domain.com2. Your outgoing SMTP server says, "I'll take that message and deliver it for you"3. Your outgoing SMTP server does a DNS query to determine the controlling mail server (MX record) for the recipient domain (in our example, domain.com)4. Your outgoing SMTP server connects directly to that controlling server and hands the message off to it for delivery5. The mail server for the recipient domain delivers the message to a local account or another sub-server in that domain (but, and this is important, almost never through an external network)Thus, there is no "server located between our e-mail server and your e-mail server on the internet". It goes directly from your server to my server. Now, that said, there is the remote possibility that someone installed a network sniffer on a router between your server and mine, but I can tell you that, from my experience, it's nearly impossible to do. The vast majority of internet routers are made by Cisco and run their proprietary IOS software. You have to install a special list of packet matching rules on the router (having full access to it in order to do so) and then point it to a local server to store the raw packets. Then you have to logon to that server and decode the packets and their payload from hex into something readable. Like I said, it's not impossible, but it's non-trivial.An attacker *could* have installed a sniffer on your server while it was compromised and very easily stored and analyzed any information going through it. If possible, if you could disclose what kind of information that might be, I'm sure many here would appreciate it (including me).Again, I appreciate your reply and help you can provide me and other users with regard to what information may have been compromised. Thanks,Jeff
  6. Hey Zach, been remodeling the house, so little time for poker. Nearly done now tho :)Jeff
  7. I created that address the same day. I do this for every site that requires email registration for exactly this purpose.Jeff
  8. It's important because if they didn't sell it and it was stolen, it's likely that's the same way all these folks' neteller account details got out.Jeff
  9. Good point, I was just getting ready to update my post about this.The email account is on a server that I manage personally. There's not another human in the world with access to it. Essentially, I am my own email provider, and I'm pretty sure I didn't sell it.Jeff
  10. When I signed up for FCP, I used a unique email address for it. I have never used the address before or since, not once. So why am I getting the following paypal phishing attempt sent to that same address?There are only two plausible explanations: a. FCP sold the address to someone (I actually find thing sort of unlikely given that it's a phisher and not a spammer) or...b. FCP has piss-poor security and the address was somehow stolen. This might also lend credence to the rash of Neteller attacks being related to FCP. Oh, before any of you say that it's probably due to poor security on my end and the phisher got it that way, I'll say two things. First, I have a degree in computer science and I've managed security on unix, windows, and mac servers for networks of tens of thousands of people. I am extremely well-versed in computer and network security. Second, if someone COULD hack my computer to get the address, why would they need to bother phishing for my information?So which is it FCP guys?Jeff
  11. Hand 1 - You can sometimes find a river fold here, but do it too much and it'll be a much worse leak than calling 100% of the time.Hand 2 - Quite the standard.Jeff
  12. The only worse card for you on the river is the T Fold to the first bet on the river.Jeff
  13. Haven't read replies. River is a check/call after he caps the turn.Jeff
×
×
  • Create New...