Was checking my spamtraps and found the following email (return address no doubt false):


Return-Path: <nobody@falcon.dnsvs.net>
X-Original-To: dvandom@eyrie.org
Delivered-To: dvandom@eyrie.org
To: dvandom@eyrie.org
Subject: spaming. white-wolf.com hack. database.
Date: Fri, 16 Dec 2005 22:50:56 -0500
X-AntiAbuse: This header was added to track abuse, please include it with any ab
use report
X-AntiAbuse: Primary Hostname - falcon.dnsvs.net
X-AntiAbuse: Original Domain - eyrie.org
X-AntiAbuse: Originator/Caller UID/GID - [99 32756] / [47 12]
X-AntiAbuse: Sender Address Domain - falcon.dnsvs.net
X-Source: 
X-Source-Args: /usr/local/apache/bin/httpd -DSSL 
X-Source-Dir: /home2/gandalf4/public_html


After the server white-wolf.com has been hacked admins have refused \"to thank\" us.
We suggest you to buy database white-wolf.com all for 10 $.
In base of 65000 accounts with mails, icq, msn, personal data of users.
Mail for details whtwlfx@yahoo.com



Such a class act, eh? At least they don't claim to have cracked the passwords.

From: [identity profile] loki-liesmith.livejournal.com


There is that. I'm obsessive enough that even if I use the same root word as a password, I put a different random number/letter combo at the end of it just to be safe. Hopefully it won't end up being a major issue.
.

Profile

dvandom: (Default)
dvandom

Most Popular Tags

Powered by Dreamwidth Studios

Style Credit

Expand Cut Tags

No cut tags