Forgot your password?
typodupeerror
Security

July 6th - Website Defacement Day? 483

Posted by simoniker
from the season-of-mass-stupidity dept.
pabl0 writes "According to an article from SFGate.com (San Francisco Chronicle), a challenge has been posted, inviting web-site defacers to alter the content of as many web sites as possible on July 6th, with an apparent limit of 6,000 websites per contestant. Looks like this would be a good time to make sure all those web-server security patches are applied!"
This discussion has been archived. No new comments can be posted.

July 6th - Website Defacement Day?

Comments Filter:
  • frosty piss (Score:3, Insightful)

    by Anonymous Coward on Wednesday July 02, 2003 @06:43PM (#6354004)
    Yes, let's put this article on Slashdot, so a few million would be hackers can go ahead and deface a couple of hundred websites apiece.

    What the hell is wrong with you? This kind of coverage only causes trouble.

    Hacking into servers and defacing websites is illegal, whether you like it or not. Doing things like this costs PEOPLE money.

    And don't argue back with that "well Microsoft deserves to be defaced" bullshit argument, or anything of the sort. They don't deserve it anymore than you do.

    Now watch me get modded down by all the haxx0r n00bz0rz with mod points.
  • by crazyhorse44 (242315) on Wednesday July 02, 2003 @06:43PM (#6354007)
    wonder how many millions Homeland Security is going to spend "preparing" America for this one.
  • NOOOO!!!! (Score:0, Insightful)

    by TedTschopp (244839) on Wednesday July 02, 2003 @06:45PM (#6354021) Homepage
    Don't do this... Please... For the sake of all that is bad legislation...

    Just think of all the very bad things that could happen if this is:

    1. Sucessfull
    2. Very unsucessful

    If the former think of all the good laws that will be inacted. If the later, people will have a who cares attituce about network security.

    Both are bad.

    Stop posting articles like this... Don't feed the trolls.
  • by polished look 2 (662705) on Wednesday July 02, 2003 @06:45PM (#6354027) Journal

    Slashdot has little to do with the defacement. Slashdot is simply reporting this.

  • Re:I notice... (Score:5, Insightful)

    by donutz (195717) on Wednesday July 02, 2003 @06:46PM (#6354031) Homepage Journal
    Well, I think a large majority of the US schools aren't on a year-round system, so most kids would already be able to do it any day in July without missing school. Next theory, please.
  • Crossing the line? (Score:5, Insightful)

    by carl67lp (465321) on Wednesday July 02, 2003 @06:46PM (#6354039) Journal
    One is reminded of the perpetual debate in security: Whether to post an exploit to a group, in order for the vendor to have incentive to patch it, or wait and hope the vendor listens to you. There are excellent arguments on both sides.

    This seems to be little different than that example. The challenge is unethical, as far as I am concerned. July 6 is a Sunday, for one thing--in general businesses do not hold normal shifts on a weekend, so this is going to surely cause more grief than an attack on, say, a Tuesday. Moreover, if successful, this could seriously halt a lot of legitimate business, personal, and other transactions across the Internet.

    Is this a call to deface Web sites, or generally screw over sysadmins who oftentimes are paid beans to being with? Shameful.
  • Re:frosty piss (Score:5, Insightful)

    by wiggys (621350) on Wednesday July 02, 2003 @06:47PM (#6354048)
    On the other hand you could argue that by posting this on Slashdot it will receive huge worldwide attention, and as the article suggested now would be a great time to patch your web server.

    It's a bit like Mischief Night in the UK - I don't like it, but I don't bury my head in the sand and pretend people will forget about it. Instead I take precautions - move the car out of the way, make sure my windows and doors are locked and keep the cats in. It doesn't hurt to have a security test now and then.

  • by Nom du Keyboard (633989) on Wednesday July 02, 2003 @06:47PM (#6354057)
    This is a totally dumb idea, and I hope the FBI tracing bots are ready to track them all down and arrest them soon afterwards.

    Given that you're going to do it anyway, why not start with the RIAA, MPAA, and SCO sites. After that, any spammers anyone happens to know.

  • by donutz (195717) on Wednesday July 02, 2003 @06:49PM (#6354072) Homepage Journal
    Slashdot has little to do with the defacement. Slashdot is simply reporting this.

    Nah, the San Francisco Chronicle is reporting it [sfgate.com].

    Slashdot is just giving a bunch of tech-minded people a forum in which to talk about it.
  • Re:I notice... (Score:5, Insightful)

    by Andorion (526481) on Wednesday July 02, 2003 @06:51PM (#6354089)
    As carl67lp pointed out, businesses are less likely to have people who can deal with these attacks on the clock on Sunday than on other days.

    ~Berj
  • by meme_police (645420) on Wednesday July 02, 2003 @06:52PM (#6354104)
    Precisely. Do all you dotters think that the Slashdot effect is bigger than all the major new organizations put together? Slashdot isn't the only site reporting this.
  • =( Blah (Score:2, Insightful)

    by Emperor Tiberius (673354) on Wednesday July 02, 2003 @06:58PM (#6354160) Homepage
    Flame on, but, I don't think /. should be reporting this kind of story. Aside from all of us story loving, comment posting maniacs, /. does get viewed by our script kiddie "friends." There have been challenges before (as mentioned), this isn't anything new, most of which [however] have not had enough media attention to bother with. Remember the "April Fools Defacement Day" one that a few newspapers picked up on, last April? This is exactly the same thing. The more fuel we give the kiddies, the bigger mess they're going to make...
  • sad (Score:2, Insightful)

    by DNS-and-BIND (461968) on Wednesday July 02, 2003 @06:58PM (#6354161) Homepage
    It's a sad day when replacing index.html is regarded as "hacking". The entire idea that only web servers are worthy of hacking just shows journalistic ignorance worthy of the New York Times.
  • Re:troubling (Score:1, Insightful)

    by Anonymous Coward on Wednesday July 02, 2003 @07:00PM (#6354178)
    After all, we know Micro$oft servers are a lot easier to crack than Linux or BSD servers, so they'll probably take the brunt of this

    No, for the millionth time, no. Either system has hundreds of vulnerabilities, with sysadmins too lazy to patch fully. A properly up to date MS, Linux, Unix, BSD, OSX server will be fairly free from vulnerabilites to the same extent.

    If you think you're running any more secure than an MS system just because you use one of the alternatives, you're living in a "security by obscurity" dreamworld.

    MS systems get attacked more as they have the critical mass worldwide to a) have more people know their faults well, and b) ensure spread of trojans.

    Think
  • Re:frosty piss (Score:3, Insightful)

    by commodoresloat (172735) on Wednesday July 02, 2003 @07:01PM (#6354181)
    It also grabs the attention of a lot more people who are in a position to patch web servers than the BBC.
  • Not Necessarily (Score:3, Insightful)

    by gotr00t (563828) on Wednesday July 02, 2003 @07:01PM (#6354182) Journal
    Though I am a huge GNU/Linux OSS fan, and I use Linux for all my desktop and server tasks, there still is a common misconception about security.

    Whether we like it or not, Microsoft _has_ done a better job with security now, and Windows has gotten a lot more secure nowadays. Though in my opinion, sysadmins could do a LOT more to protect their Linux systems than their Windows systems (much more stuff is configurable), it is still fact that good security dosn't mean using Open Source Software like Linux or BSD and stopping there, it requires competent sysadmins and being updated about security, as well as using patches and new versions of software.

    Or, you could just use NetBSD :)

  • Is it just me... (Score:3, Insightful)

    by El (94934) on Wednesday July 02, 2003 @07:07PM (#6354230)
    or does anyone else think that the Feds are behind this challenge, as part of a massive sting operation?
  • by meme_police (645420) on Wednesday July 02, 2003 @07:07PM (#6354231)
    Is Slashdot telling us how to exploit IIS or Apache? No.
  • Re:frosty piss (Score:3, Insightful)

    by PaulK (85154) on Wednesday July 02, 2003 @07:09PM (#6354249)
    So what exactly are you advocating here?

    Censorship?

    Or, could it be, that you are assuming that /.'ers are no more than script kiddies?

    Personally, I appreciate this information. I can now ensure that my networks are fully prepared, and monitored during the event.

    I'd rather view this as a PSA.

    I'd bet that any cracker that intends to participate, already knows about this.

  • Re:frosty piss (Score:4, Insightful)

    by HexRei (515117) on Wednesday July 02, 2003 @07:12PM (#6354263)
    Bullshit. If anything, this will SAVE companies money in the long run. You think its BETTER for a web server to sit there with unpatched security exploits, waiting for a truly malicious hacker to do something nasty to the server like zombify it, than for some joker to deface it, and in doing so alert the administrators to the presence of the hole (hopefully closing it?
    Any company should be able to swiftly and easily restore their site from backups. If they don't have backups, they are STUPID and DESERVE what they get.
    It's technological darwinism, curtailing harmless hackers just helps loopholes survive for malicious hackers to exploit. Security flaws should be pointed out and if it takes a rude awakening like a website redesign, then so be it.
    Better than having your box end up participating in a worldwide DOS a year or two down the line.
  • by Chagatai (524580) on Wednesday July 02, 2003 @07:15PM (#6354286) Homepage
    The argument has been made time after time that when web face defacements occur it costs people extravagant amounts of money. There are several things wrong with this mentality.

    First, these activities do not cost people money, they cost corporations money. I know, I know, this is supposed to trickle down to the individual level to where it hurts consumers. I think that the statement should be that "hacked web sites costs people time". Face it, who wants to come in on a Sunday to fix a hacked web page? Most salaried people receive no overtime for this type of work, so it costs them time. If there is any expense here, it is corporations who foot the bill, which relates to the next point...

    Fixing web pages does not cost tens of thousands of dollars. A simple restore of an html page should not be perceived as an activity that puts a company into the red on a balance sheet. I still do not understand how corporations say that a cracker cost them $250,000 when someone replaces their corporate logo with Domokun. Perhaps it is because in reality this money is being spent to patch the holes they should have taken care of months ago? The headlines shouldn't say, "Hacker costs company $50,000 for hacked website!" The headline should say, "Company fails to follow basic security guidelines in patching their servers, costing their mismanaged budget $50,000."

    Would I be pissed if my company's website was hacked? Yes. Would I be pissed if I had to take care of massive security holes on my Sabbath day? Yes. But would I accept the idea that it monetarily hurt my employer? No. This way of thinking needs to go.

  • happy! (Score:4, Insightful)

    by loteck (533317) on Wednesday July 02, 2003 @07:16PM (#6354294) Homepage

    if i can replace your index.html..

    i can probably replace or delete many other things. Yeah, still hacking.

  • by commodoresloat (172735) on Wednesday July 02, 2003 @07:18PM (#6354317)
    One is reminded of the perpetual debate in security: Whether to post an exploit to a group, in order for the vendor to have incentive to patch it, or wait and hope the vendor listens to you. There are excellent arguments on both sides.

    No there aren't. There is no reasonable argument for not bringing the exploit to the vendor's attention first. There is meaningful debate over the question of what to do if the vendor chooses to ignore you or bully you, but I really don't see a good argument for alerting the world before alerting the vendor.

  • Re:Good idea? (Score:2, Insightful)

    by YOU LIKEWISE FAIL IT (651184) on Wednesday July 02, 2003 @07:19PM (#6354324) Homepage Journal
    What positives can come out of such an exercise?

    I don't think your average web-site defacer has ever been too concerned about the positive repercussions of his or her actions before, and I find it highly unlikely that a competition with their peers is going to jump start their sense of ethical responsibility.

    A lot of people in this thread will say that a benefit of roving defacement groups is that it helps to highlight poor security. Sure - In the same way that setting peoples houses alight helps to highlight the importance of changing your smoke detector batteries.

    I call shennanigans. This might be a happy side-effect, but if your happy haquer was really concerned with improving security, how hard would it be to find the hole, and then mail the site admin from inside the network boundary, or leave a message somewhere apart from the frontpage and then tip off the administrator?

    They could do this. But there's no bragging rights there - and that's what this is all about when you get right down to it:

    • Bragging rights and a sense of importance within their peer group ( look at the 'shout outs' that accompany many defacements ).
    • Mean spirited embarassment for the victim
    and in some rare cases
    • a possible political statement or message

    To answer your question, and echo a sentiment that will probably be seen in numerous other posts in this thread nothing positive will come from this that could not have been achieved by less disruptive, upsetting or destructive means.

    As to those who said "Great, MS will bear the brunt of it", grow up. Your mean spirited and childish attitude does you zero credit. Cracker attacks are a menace that have to be faced by all sectors of the computer community, and wishing them upon your rivals smacks of extreme poor taste ( not to mention the fact that most of the actual victims are likely to be non-technical clients of hosting companies who do not understand, wish to understand, or control their hosting solution ).

  • Re:frosty piss (Score:1, Insightful)

    by dasmegabyte (267018) <das@OHNOWHATSTHISdasmegabyte.org> on Wednesday July 02, 2003 @07:22PM (#6354352) Homepage Journal
    Who does it cost money? Only people who overreact. Most defacers tell you how they got in and save your data. Patch it, shame yourself, and resurrect your site. This isn't fucking rocket science.

    Of course, if you believe the pundits, every second a popular website is down they lose millions. Bullshit. My supermarket closes for an hour at midnight every night for computer inventory. If I want to eat, this doesn't make me any less hungry. I wait until 1:15, then bike over.
  • by Otter (3800) on Wednesday July 02, 2003 @07:24PM (#6354359) Journal
    Possibility 1: It's a joke that's gone over the head of the "computer experts" as well as the moderators here.

    Possibility 2: The script kiddies who pull defacements are not, in fact, capable of stealing a shell account.

    Probably both.

  • Re:frosty piss (Score:1, Insightful)

    by Anonymous Coward on Wednesday July 02, 2003 @07:27PM (#6354380)
    If there's a large amount of cr/hacking going on, I'd like to know ahead of time so I can make preparations.

    Preparations? You mean like installing all those patches and updates and locking down those open ports? In other words, stuff you should have done allready anyway?
    Makes me think of when the slammer hit and the patch for the exploit was months old already...
  • by mellon (7048) * on Wednesday July 02, 2003 @07:51PM (#6354545) Homepage
    Um, hello? I run a server that serves several web sites. I'm not paid for this. If someone hacks my server, it's going to cost me a tremendous amount of effort to recover. It won't cost me any money, probably, but that's cold comfort. I doubt that I'm alone in being in this situation.
  • by JWSmythe (446288) * <(moc.ehtymswj) (ta) (ehtymswj)> on Wednesday July 02, 2003 @07:53PM (#6354572) Homepage Journal
    Why do those sound like well prepared "last" words.. The next words out of his mouth will be "We were terribly unprepared for this act, and it shows us how simply unprepared the Internet infrastructure is for terrorists attacks"..

    That would, of course, be followed by hackers (real and wanna-be's alike) being arrested and thrown in prison on non-specific charges. As long as you throw in a "cyber-terrorism" somewhere in the charges, you can jail them indefinately.

    Good luck on the battle kids. Do something worth while, while you're in there. Copy the real WMD documents to the front of whitehouse.gov. Grab the Area51 documents and let the UFO knows know so they're nuts. (everyone knows aliens really drive Cadillac's)

    And, if you do nothing else, show your phone phreakin' roots. Make the whitehouse red phone ring the Kremlin, just like in the old days. :)

  • Re:Wrecklessness (Score:3, Insightful)

    by JWSmythe (446288) * <(moc.ehtymswj) (ta) (ehtymswj)> on Wednesday July 02, 2003 @07:56PM (#6354588) Homepage Journal
    We make fun of the script kiddies, but you're right, if there are perfectly good exploits out there and you aren't prepared, then you're just being stupid and egotistical. "They'll never get me." will suddenly become "damn, they got my site."

  • by phorm (591458) on Wednesday July 02, 2003 @07:57PM (#6354590) Journal
    About 2 weeks ago I was running RedHat. I would have been running around frantically trying to track down any patches I might have missed, version-checking my RPM's...etc etc.

    Once I read this I was like "crap crap crap, a whole lotta patching to do"
    Then I SSH'ed to my server...
    And remembered I was running debian...
    apt-get update && apt-get upgrade...

    I suddenly feel a lot better about the few hours it took me to make the switchover.

    If I were running an MS server I would probably have had a near heart-attack by now. I've never needed the
    "newest-most-spectacular-greatest-ever-superd uper-new-version" of any of my daemons, so there's no problem at all with Deb, despite the arguements of many.
  • by nettdata (88196) on Wednesday July 02, 2003 @08:09PM (#6354644) Homepage
    Exactly... the parent post's author seems to be saying that only corporations have web sites.

    If anything, it'll hit the "personal site" maintainer hardest, because they are the least likely to have backups, etc. If some prick hacks into a web site, deletes the original content, and puts up an "owned" site, that not only costs someone time, but also may cost them the content if they can't recover it. It's not like these script kiddies will differentiate between corporate and personal websites. Thinking that they would is just naieve.

    I also take particular issue with the implied concept that "my time doesn't cost anything".

  • by Hamhock (73572) on Wednesday July 02, 2003 @08:11PM (#6354655)
    "First, these activities do not cost people money...hacked web sites costs people time"
    I don't know about you, but I get paid money for my time. And if I have to fix my companies web site, then it's costing my employer (who happens to be a person, not a corporation) money.
  • Re:frosty piss (Score:5, Insightful)

    by Proudrooster (580120) on Wednesday July 02, 2003 @08:20PM (#6354700) Homepage
    This is the exact correct place to put it. Thousands of SysAdmins read Slashdot and now know that they had double check their security or risk embarassment on July 6th.

    Also, I have heard rumblings of yet another MS worm run scheduled to run rampant over the 4th of July holiday weekend. (Prepare for pager meltdown MS and network admins.)

    I totally appreciate the heads up. In fact I did an external port scan of my Class B today and found out that the firewall monkeys had opened incoming ftp from anywhere to key servers. If it wasn't for this new threat I probably wouldn't have bothered to rattle the door knobs before the holiday.

    I'd say that everyone has fair warning. Make sure your backups are up to date and that you don't have any easily hackable services exposed. Now the only question is, "Who will be embarrassed?"

    Remember folks, it's not just about defacing, it's about defacing creatively.
    ~ Ha]<0R D00D
  • Re:frosty piss (Score:2, Insightful)

    by Anonymous Coward on Wednesday July 02, 2003 @08:29PM (#6354754)
    Now watch me get modded down by all the haxx0r n00bz0rz with mod points

    I wish people would stop saying this, it only enocourages mods to mod up, but that's why people continue to do this. It's simple: a person rants and says, "ok mod me down now" or something similar, and they're modded way up. It's karma whoring pure and simple.

    And it usually works every time. Sad.
  • by brooks_talley (86840) <brooks@nOsPaM.frnk.com> on Wednesday July 02, 2003 @08:32PM (#6354765) Journal
    Wow. I'm trying to be as nice as possible here, but you don't have a lot of experience in the real world, do you?

    Let's say that just 6,000 websites are defaced. How many of those, do you think, will be Fortune 1000 corporations? And how many of them will be small businesses that may or may not be incorporated? Is it somehow evil to run a business as a corporation rather than a sole proprietership or general partnership?

    And you seem to want to have it both ways; on the one hand, large corporations somehow exaggerate what it costs to recover from a hack, and on the other hand anyone who *is* hacked is incompetent and deserves what they get.

    In fact, in the unlikely event that IBM's site is defaced, it would certainly cost them hundreds of thousands of dollars.

    There's a lot more to recovering from defacement than you seem to think. Hint: you are not done when you copying the original HTML page back in place.

    For a large company, it means doing a massive project to determine what other systems could have been accessed using the defaced server as a middleman. And then examining those systems for signs of intrusion.

    In the much more likely and frequent instances of a small business being defaced, it may or may not be financially ruinous, but it's certainly a lot more than the minor and greatly exaggerated inconvenience that you paint it as. These businesses don't have large IT staffs, and/or the technical know-how to slap themselves on the head and say "Damn! We should have installed that latest IIS hotfix."

    It's an ugly situation, but it is absolutely an expensive one and has far wider repercussions than you seem to think.

    Cheers
    -b
  • Re:frosty piss (Score:5, Insightful)

    by Zeddicus_Z (214454) on Wednesday July 02, 2003 @09:11PM (#6355003) Homepage
    With all due respect, your point of view is absolutely wrong.

    Website defacements cost companies real money. It may or may not be in the oft-quoted "millions" mark, but it is certainly a non-trivial figure.

    For the benefit of those not in the SysAdmin/ITAdmin/Computer Security industries, I'll give you a quick rundown as to WHY they cost money.

    • First and foremost, there's staff time used up in detecting, evaluating, responding to and cleaning up the actual defacement. This is not just a case of re-uploading the web content! Defacements are security breaches, and as such the machine is treated as compromised. There's meetings with management, co-workers, other interested parties (business partners etc) to establish such things as immediate effect, immediate course of action, whether to perform forensics, potential compromise to other systems etc. Reload and reinstall the system, go through the rest of your security logs (IDS, Firewall logs etc) with a fine tooth comb because the attacker JUST MIGHT have used his higher privileges on the web server to sniff out other avenues inside your network. This task of tracking down what access an attacker had, and what they did with it, can be a huge time sink (and thus a huge money sink)
    • Cost in terms of PR. This is intangible as it deals with the affects on a company's good name and reputation. This can often be estimated quite highly, and can run into the *thousands* of man hours for complicated network scenarios
    • Potential lost business through downtime of services. This is another area where estimates can be quite high. Sure, not every person who hit your website during the downtime would have bought something, but that's not at issue. What's at issue is that that could have bought something, had the service been available. It's called Opportunity Cost, and website defacements of commercial sites have a high opportunity cost.
    • Regardless of whether the website defacer contacts you with details on how the achieved the attack and what they modified (which, incidentally, they usually do not. Web defacements are usually the work of bored skiddiots), you must treat the incident as a full-blown compromise, at least until you've performed enough analysis to determine that no other systems are suspicious. When you work as an Admin for a living, you do not bet your company's money on the trustworthiness of a 16 year old skiddiot (whom, lets face it, wouldn't have sunk as low as an ISS/Apache sploit if they were at all trustworthy in the first place).


    Any form of system compromise is a major incident. Even compromises of Bastion hosts, which we expect to be compromised at some point, cost businesses money. Your opinion stems from ignorance of the issues involved and is exactly the sort of opinion most skiddiots have - although that doesn't make you one.
  • by Overly Critical Guy (663429) on Wednesday July 02, 2003 @09:22PM (#6355056)
    Are you for real? Which site do you think is the most-read news site by wannabe hackers and script kiddies?

    Look at the graphic at the top of the page.
  • aha! (Score:4, Insightful)

    by cscx (541332) on Wednesday July 02, 2003 @09:51PM (#6355193) Homepage
    After all, we know Micro$oft servers are a lot easier to crack than Linux or BSD servers, so they'll probably take the brunt of this.

    It's asinine thinking like this that causes people to get hacked!

    According to this article, [globetechnology.com] 76% of boxes hacked in May were Linux boxes! Only 15% were Windows machines. It's just the simple thought that "oh it's open source, so it's gotta be secure!" that gets people to not update their stuff and get hacked.

    Open source security vulnerabilities are just as frequent as Msft's, even moreso. Regardless of what you're running, you need to friggin update and stay on top of the game.

    Or, you could just run chroot'ed Apache on OpenBSD.* :D

    *The above statement shows the equal tradeoff between security and speed.
  • Re:frosty piss (Score:5, Insightful)

    by jafiwam (310805) on Wednesday July 02, 2003 @10:37PM (#6355400) Homepage Journal
    Yeah?

    Well guess what. They put the thing out there before I was hired and put a bunch of twitchy-clueless web hosting customers on it.

    I got a new set of servers, got to design how it all works, all patched and good and ready to go. Know what I am waiting for? Server brackets. The boss's dad is makin em in his garage. Until then, I can't put the new ones up in the rack.

    Then I get to migrate all of them-there sites to the shiney new servers and answer stupid phone calls to explain how DNS works, and explain how their ISP proxy server is fucking broken.

    You think any of this is my choice? (Aside from the shiney new stuff.) Think anybody is going to stop and think "Gee, this might be patched tomorrow and it won't be a threat to anybody as a zombie then!" Nope. They won't think at all.

    Your justification for web site defacement sucks. You might as well ass-rape your sister cuz she's not wearing a chastity belt. If I run across your mom, you'd better hope I don't use the same logic you do.

    It's not Darwinism, it's vandalism.

    I agree that there are a lot of lousy sysadmins out there, causing lots of problems by letting their machines get hacked. But you should think about how you think things should go a little bit. Maybe it would be better if you concentrated on educating those around you how to set up a web site properly, hmm?

    (As for me, I hope the Spanish-speaking nitwits organizing this end up in Colombian-Federal-pound-you-in-the-ass Prison. They deserve it.)
  • Re:I notice... (Score:4, Insightful)

    by swv3752 (187722) <swv3752@hotm[ ].com ['ail' in gap]> on Wednesday July 02, 2003 @10:42PM (#6355425) Homepage Journal
    I put it more that is the last day of a Long weekend with many people having the 4th off. So a lot of stuff is going to slid until monday morning.

Never trust an operating system.

Working...