amuck-landowner

Search results

  1. Aldryic C'boas

    ChicagoVPS / CVPS Hacked. New SolusVM exploit? [PT 2/2]

    Well, he did find the time to come in here and try to brush off the Adam/Kevin situation, so I'm sure he'll at least make just as much time to post more status updates ASAP. To do otherwise would just be downright insulting to the clients waiting to hear something important.
  2. Aldryic C'boas

    Kevin Hillstrand is a fraud

    Yeah, and like I was telling Solar if we'd had beasts like that at San Jose, sol and I would've killed ourselves trying to get them down to the truck <_< But you're right... I highly doubt Jon would've financed gear like that for him.
  3. Aldryic C'boas

    Kevin Hillstrand is a fraud

    "Real" (assuming it isn't another alias).  Ng is a fairly common east-Asian surname. 
  4. Aldryic C'boas

    Kevin Hillstrand is a fraud

    Ahahaha, the butthurt is strong in this one.  Upset over my query, I guess?  Or just so blinded by tears he cares not for who he lashes out at right now. My 'real' name has never been a secret, nor has Fran ever claimed that he had an SSN and Tax information for 'Aldryic' like you did with...
  5. Aldryic C'boas

    SolusVM database dump, what is in a full dump file

    I can't stop hearing "Huge... tracts of land" now <_< 
  6. Aldryic C'boas

    SolusVM database dump, what is in a full dump file

    Ahahahaha, bloody hell.  A node with 300GB of "physical" RAM?  Must be one hell of a chassis :P
  7. Aldryic C'boas

    SolusVM database dump, what is in a full dump file

    Sorry sir, I don't have the DB.  I'm sure it'll turn up eventually though.
  8. Aldryic C'boas

    SolusVM database dump, what is in a full dump file

    @ Welp... wasn't originally gonna say anything.  But I have a new query for those of you that were curious about his claims that "there was no more oversell". SELECT nodes.nodeid, nodes.name, COUNT(vservers.vserverid) as vservers, SUM(vservers.ram)/1073741824 AS ram FROM nodes, vservers WHERE...
  9. Aldryic C'boas

    HOW-TO: Protect from recent SolusVM exploits.

    There's a reason I chose to use my full name here (and WHT) as opposed to just 'Aldryic'.
  10. Aldryic C'boas

    HOW-TO: Protect from recent SolusVM exploits.

    I agree fully. And while I doubt we'll do the pubkey offload, what we're planning on doing with Stallion2 is setting a random root pass on the node, and not sending it via email/etc. The New VPS email will simply instruct the client to login, set a root pass for the VM, and then continue use...
  11. Aldryic C'boas

    HOW-TO: Protect from recent SolusVM exploits.

    Never was a fan of replacing one line of code with... 28. All you're needing is a random alphanumeric, which PHP cannot easily provide (And then you have to screw with php blocks in smarty, never fun). Generating a random number, then md5/SHA'ing that to 'randomize' it further with...
  12. Aldryic C'boas

    HOW-TO: Protect from recent SolusVM exploits.

    Nah, by all means go for it :P I wouldn't have posted it publicly if I didn't want folks to use it :3 General rule for my code is - if I post it publicly, anyone can use it as they see fit.
  13. Aldryic C'boas

    ChicagoVPS / CVPS Hacked. New SolusVM exploit? (Content Restored) [PT. 1/2]

    He means that the source of the claim is untrustworthy, and should not be taken at face value just because of the situation at hand.
  14. Aldryic C'boas

    HOW-TO: Protect from recent SolusVM exploits.

    We generate a random, uneditable password when any order is placed, correct. Primarily to force clients to set a new root password themselves afterward (unless they actually want to remember a random string &lt;_&lt;) as a security precaution. That's not a module/etc setting though - just a...
  15. Aldryic C'boas

    HOW-TO: Protect from recent SolusVM exploits.

    Root passes are viewable? O_o That is straight-up disastrous - they're either storing root passes in plaintext, or merely displaying the WHMCS 'password' field (also plaintext), which is absolutely useless after running `passwd` on the VM (like people should be doing).
  16. Aldryic C'boas

    HOW-TO: Protect from recent SolusVM exploits.

    Hah, nice. Looks like they've made some major improvements (as far as options, at least) on the module. Only reference I had was the module we worked with a couple years back that just threw this big nasty blob into the client area; no ability to enable/disable certain features.
  17. Aldryic C'boas

    HOW-TO: Protect from recent SolusVM exploits.

    Does the SolusVM WHMCS plugin allow changes to rootpass/hostname/etc? If so, you may want to try and disable that, just in case they're not sanitizing input <_<
  18. Aldryic C'boas

    RamNode Down?

    &amp;nbsp; That's perfect, thanks. He only made one attempt? Edit, Unrelated: I guess I'm gonna have to break down and start using a 'proper' browser... links is butchering the hell out of the BBCode and quote attempts <_<
  19. Aldryic C'boas

    RamNode Down?

    If you would, make a text file of Robert's attempts to try it against you, please. I'm putting together similar information for Nick, as I believe he's going to pursue a criminal case on this. (You also might want to grep your logs for the googlecode bit I mentioned before).
Top
amuck-landowner