Jump to content

Sysvr4

Members
  • Content Count

    883
  • Joined

  • Last visited

Posts posted by Sysvr4

  1. Ok, so let's try to figure this out a bit... mind answering a couple of questions about it?1. Is the email address you registered with FCP the same as the one you registered with Neteller?2. Is the password you registered for both the same?3. Did your email account have an email from Neteller detailing your account information?4. Is your email address registered via a free web-based email provider? (ala yahoo, gmail, hotmail, etc)Your answers to this may help us determine how they're getting the information. I have a theory, but don't want to disclose it until such time as we get more information on the topic.Oh, btw, anyone else whose Neteller has been hacked, feel free to reply here with the answers to the above. It may very well help us figure this out.Jeff

  2. Hey guys,I've been meaning to post this for a while, but have had no time due to work and a house remodel. But I see a lot of you manually posting your BRs and progress here and I wanted to mention a little programming project I took upon myself a while back that covers this exact purpose:http://www.mobney.comIt's free, you can share your results with others, you can even just make the graph public and include it via <IMG SRC> tags in your blog.Anyway, flame me for "spamming" if you want, but you might keep in mind I'm not making a dime off the site. Just thought some of you might find it useful.Jeff

  3. We can't rule out some player's e-mail addresses being found when the forum was hacked into a few months back as the hackers would have had access to e-mail addresses.
    Thanks for the reply, Bob. I wasn't aware at the time of my posting that the forum server had been compromised. I wonder if you could disclose the type of information held on the compromised server. For instance, was it just the information we registered with on the forum (ie, our names, email, and street addresses) or was there more sensitive information as well (neteller, etc)?
    The hackers did not have access to the forum passwords as we don't even have access to them and the forum and poker accounts are totally separate and not connected in any way.
    Well, if my experience is any measure, they probably DID have access to the passwords, but I imagine they were in encrypted form only. Meaning that if they had enough time and computing power, they could run an MD5 or crypt() brute-force password cracker and eventually determine a good number of our passwords. Would that be an accurate statement?
    We haven't provided our e-mail database to any other companies other then the On Game Network. That being said there's no question that some spammers do have some FCP e-mail addresses.
    Fair enough.
    The most likely way that the spammer received your e-mail address is via a Network Sniffer that is installed somewhere on one of the servers located between our e-mail server and your e-mail server on the internet. If one were on a server while we were sending out a mass e-mail they would get a number of FCP addresses.
    I have to take issue with this assessment, but please don't take this rebuttal personally.What you have described is jut not how internet email (as defined by the various RFCs on SMTP) works. It works more like the following (simplified greatly for obvious reasons):1. You send an email to user@domain.com2. Your outgoing SMTP server says, "I'll take that message and deliver it for you"3. Your outgoing SMTP server does a DNS query to determine the controlling mail server (MX record) for the recipient domain (in our example, domain.com)4. Your outgoing SMTP server connects directly to that controlling server and hands the message off to it for delivery5. The mail server for the recipient domain delivers the message to a local account or another sub-server in that domain (but, and this is important, almost never through an external network)Thus, there is no "server located between our e-mail server and your e-mail server on the internet". It goes directly from your server to my server. Now, that said, there is the remote possibility that someone installed a network sniffer on a router between your server and mine, but I can tell you that, from my experience, it's nearly impossible to do. The vast majority of internet routers are made by Cisco and run their proprietary IOS software. You have to install a special list of packet matching rules on the router (having full access to it in order to do so) and then point it to a local server to store the raw packets. Then you have to logon to that server and decode the packets and their payload from hex into something readable. Like I said, it's not impossible, but it's non-trivial.An attacker *could* have installed a sniffer on your server while it was compromised and very easily stored and analyzed any information going through it. If possible, if you could disclose what kind of information that might be, I'm sure many here would appreciate it (including me).Again, I appreciate your reply and help you can provide me and other users with regard to what information may have been compromised. Thanks,Jeff
  4. Is this a free webmail account such as hotmail, yahoo?
    Good point, I was just getting ready to update my post about this.The email account is on a server that I manage personally. There's not another human in the world with access to it. Essentially, I am my own email provider, and I'm pretty sure I didn't sell it.Jeff
  5. When I signed up for FCP, I used a unique email address for it. I have never used the address before or since, not once. So why am I getting the following paypal phishing attempt sent to that same address?There are only two plausible explanations: a. FCP sold the address to someone (I actually find thing sort of unlikely given that it's a phisher and not a spammer) or...b. FCP has piss-poor security and the address was somehow stolen. This might also lend credence to the rash of Neteller attacks being related to FCP. Oh, before any of you say that it's probably due to poor security on my end and the phisher got it that way, I'll say two things. First, I have a degree in computer science and I've managed security on unix, windows, and mac servers for networks of tens of thousands of people. I am extremely well-versed in computer and network security. Second, if someone COULD hack my computer to get the address, why would they need to bother phishing for my information?So which is it FCP guys?Jeffpaypal.png

  6. I suppose it's possible CO had us beat before the river and was slowplaying, but I think it's unlikely....Granted, he may fold these hands, but he won't expect that river to have helped us, so he may make a crying call if we bet (or even try a bluff-raise).
    I think that's the crux of the hand. Is villain more likely to call with a hand like A-high or bluff with it? I don't know the answer to that obviously, but my default there is to assume he'll bluff it more often than call. Especially given how dangerous this board looks, I think he's less likely to call. I do think it's fairly close without a better read.That said, I still think bet/call is the worst option. I find it hard to believe that villain simultaneously would be more likely to check behind on the river and bluff raise the river. Just doesn't make sense. If he's a bluffer, he'd just bet the river. check/call or bet/fold, I say.Jeff
  7. I gotta go against the grain here a bit. When the river completes multiple draws, I'm much more likely to check OOP. I think check/call is just fine here since you're not likely to get called by many hands you beat and the only way you get value out of this river is if he bluffs it. I think bet/call would be a very bad line, so IMO:c/c > b/f >> bet/callJeff

  8. I was kinda mad because I hadn't realized BB dropped pf and thought it was going to be 4 to the flop and I wanted to jam that flop with my monster draw. Oh well.
    I'm sure you capped PF for both equity and fold equity. I probably wouldn't have capped, but I think it's a tad unreasonable to be mad when you get a result like this just cuz you hit the flop. If you missed the flop and this was the result I imagine you'd feel differently :)JeffPS - If BB didn't misclick you need to add him to your buddy list.
  9. I love your commentary on what you were thinking. As I read thru the hand I was thinking the same thing :)PF - goodFlop - I probably check raise here. Plenty of draws and I think it gives more information.Turn - Wow. I hate all options. I think I dislike calling the most tho, given how you played it. Here again tho, I think if you c/r the flop you can see if button takes back the lead with a 3-bet and make a more informed decision on the turn.River - Good, but you should delete the actions of your villains to get unbiased opinions.Jeff/now to read replies

×
×
  • Create New...