You know, it's very poor etiquette to not at least post a one sentence comment on threads you start. If I simply wanted to read the articles and not discuss with others I would just go to joystiq exclusively.
I don't get these groups. Just because you can do something doesn't mean you should... now I'm wondering if it is ok to even log into League of Legends today.
It's not like they can use the game as a conduit to hack into your computer. You will want to make sure a. you're using a really strong password (password managers: use them, people) and b. that you don't use that same username/password/email combination on other sites or games, especially banking sites, Amazon, eBay, PSN, etc.
All hackers need a bullet in the forehead, because they all are a bunch of worthless douche-bags, especially LulzSec.
While having different passwords for all your important stuff is definitely very important, having a "strong" password is like pissing in the wind if you don't have security systems. Get them, now. Update them regularly and use them. As an individual, you will be far to insignificant for a group like Lulzec or Anon. to go after, but make no mistake there are many many people who thrive on stealing personal and login information to various sites - games, banks, credit card #s, government sites, etc.
These guys aren't overly sophisticated. They're brazen bullies who pick their targets well. Interesting that this is happening right as school lets out. Very curious to see how this ultimately plays out. If they keep going like this, they're going to be caught.
LulzSec released 62,000 email addresses and passwords. Gizmodo has a search box so you can check if your email address is on the list.
I would add that getting tazed in the nuts twice a day for a month before taking the bullet to the head is a prerequisite. If these morons would put their intellect to good use, maybe they could accomplish something
What's really crappy about this is that they're putting all this in the hands of as many people as possible, encouraging people to do harm and helping them think outside the box.
These guys are actually doing something good. They're showing that major companies are not taking security seriously and putting your personal information at risk. The majority of these attacks are exploiting well known bugs in the servers where patches do exist. I am pissed that LulzSec is publishing the data publicly, but sometimes it's the only way to get these major companies to see that it's serious. Now the DDoS attacks are not cool, but my guess is they are exploiting bugs with request overflows and DDoS attacks are needed for that. These companies need to step up and spend the time/money to make sure their user's data remains secure. I've coded for a lot of different companies and you'd be shocked at how open their systems/data really are.
A ChrisKo sighting, hellooooo. Have to imagine they'll hit WoW if they're just out for recognition and to piss people off, unless they're unable to or they're just big Blizzard fans.
yeah. thats a hell of an attitude. im thinking the best thing to do is for these companies and government agencies to offer these guys good jobs under immunity agreements
This is not an altruistic group. They are not trying to provide for the common good. This, however, is very true.
http://lulzsecexposed.blogspot.com They've been online two days and are exposing the members, even addresses in some older psots. Apparently forwarding the stuff to the FBI.
So, the smartest guys out there got outsmarted? Love it. Have fun with the government now up your ***, no cure for that ailment. I wonder if these guys are having as much fun as they did before. I love watching jackasses getting their due. Love it.
Wow, so let me get this straight. One of the LulzSec and Anonymous members is… a member of the media who writes for far-left sites like The Guardian and DailyKos? Who's even reported on Anonymous?
Damn skippy I did. Won't be from me. Notice how my posting is waaaaay down in there lately. Nothing worth talking about. Meanwhile, I'm singlehandedly driving the gaming forum.
Well I know I should be playing The Witcher 2 but really don't seem to have the motivation to play. I was thinking about going back and finally finishing New Vegas or maybe re-playing Mass Effect 2. I have a list of others I need to play but again don't really feel the desire to play them right now. EDIT: Also need to get to FF13
The best time to play New Vegas will be next month when the last DLC is out. The third DLC, Old World Blues, is supposed to be out before the end of this month. FF13 will take a while. Mass Effect 2 might be worthwhile if you want to get a save game ready for ME3.
Did you try to run it in Administrative Mode? Seems silly but for some reason I couldn't do anything with the Witcher 2 until I ran it as admin.
Yea, the EA guy was pretty dense. He seemed to not want to help me since I didn't have a disc. edit: Looks like my Media1.cab file is continually corrupt. I may try downloading to a different computer, and then moving the install files to this one that I'm having trouble with.
Apparently the operator of their IRC chat room has been arrested. 19-year old Brit Ryan Cleary. http://www.pcmag.com/article2/0,2817,2387380,00.asp
They don't need him to. If they have his computer, and he wasn't smart enough to encrypt the hell out of everything, they can just use computer forensics to find out what's on there. Those IRC logs are probably especially juicy.
If they have the logs and corroboration of the identities of people in the logs, they don't need him. He would offer nothing. Just because he owned and operated the server doesn't mean he's omniscient about the group; it just means he maintained hardware the group used.
Not irrelevant at all. Your stipulation is that you hope they get the guy to roll on the other members of the group. Baked into that hope is an assumption that he's somehow necessary for the investigation's progress to continue or to get a conviction in court, because that's the only reason they woudl bother to flip him. His cooperation isn't necessary, though. Everything he could possibly provide is on his computers. There's nothing he could tell the investigators that they wouldn't be able to find out by combing through his hard drives. The most likely COA is that the guy will be charged, not given a deal in exchange for testimony. What could he provide that can't be forensically discovered on his server? Very little to nothing.