Couldnt have said it better myself.Personally, I'd like to see proof that anything that this curtis guy said he did is true. All of the stuff he posted till now is pretty much BS, including the parts of the Solus code he posted.
Couldnt have said it better myself.Personally, I'd like to see proof that anything that this curtis guy said he did is true. All of the stuff he posted till now is pretty much BS, including the parts of the Solus code he posted.
Yup. 54 members, 104 guests are on board now.This is interesting...
80 user(s) are reading this topic
26 members, 53 guests, 0 anonymous users
Well, he claims to have the full, unencoded version of Solus... yet he posts a snippet of code that's encoded. :blink:Personally, I'd like to see proof that anything that this curtis guy said he did is true. All of the stuff he posted till now is pretty much BS, including the parts of the Solus code he posted.
Yes, I stated in a above post which you removed that "for solusvm security, here is obfuscated version" which is obfuscated functions/variables.Well, he claims to have the full, unencoded version of Solus... yet he posts a snippet of code that's encoded. :blink:
Last email I have from them is an Invoice.Now now. Let's try to keep this on topic.
Those of you with servers at CVPS, have they sent out client wide emails yet informing their clients to reset passwords? Any official word from them?
I don't see anything on their Twitter or Facebook, so curious if they're taking this instance more serious than the last one. Are all the VPSes back online now?
We most certainly did, please do not call us a liar. Just like the first hack in November Solus said nothing was wrong on their end, and then Ramnode happened and this happened.looks like CVPS didn't patch quick enough like they stated.
I have seen the source to and can confirm that there are some examples of really bad coding (which I have sent to SolusVM and hence those "blocks of code" refered to here http://blog.soluslabs.com/2013/06/18/statement-regarding-current-security-rumours/ which I'm sure others have notified them of too). Also, I do agree it's unwise to release source here, once it gets in the wrong hands.. Well I'm sure it already is in the wrong hands already but we don't want more.Netnub has posted source. He's sent a PM to myself with the source code as well.
I don't think it's wise to post these publicly, it's best SolusVM reviews and patches first. We don't want more hosts being impacted. I've seen some of the hits this forum has gotten from Google and judging my certain search phrases that are bringing them here I can guarantee if the source was posted on here it'd be used for anything but good.
Pretty much same as what you've done. Blamed it on SolusVM? How come i know websites still running SolusVM and they've not been hacked? Bit mysterious that.........Of course they will call it rumors so they dont look bad and the terrible product they released.
Nope, you've got the complete wrong end of the stick. ;-)notFound=JoePie?
netstat = JohnnyDbag?