Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Security Education

Oxford Students Hack University Network 662

An anonymous reader writes "Both The Guardian and BBC News are carrying the story that two students at the University of Oxford, Patrick Foster and Roger Waite, were able to easily hack into the university's internal network in minutes using only easily-available software. Once inside, they could find out anyone's email password, observe instant messenger conversations and control parts of the university's CCTV system. The students were investigating the university's network security for the student newspaper, The Oxford Student, which published a front page article and editorial on the matter. In the article, a university spokesperson is quoted as saying 'In some cases the wish to provide the widest possible computer access as cheaply as possible may mean deciding to go for a cheaper set-up, with potentially lower security.' The students now face disciplinary precedings from the university and could receive rustication (suspension) and a 500 pound fine. The matter has also been passed onto the police."
This discussion has been archived. No new comments can be posted.

Oxford Students Hack University Network

Comments Filter:
  • Re:Oxford Loses Out (Score:5, Interesting)

    by sirsnork ( 530512 ) on Friday July 16, 2004 @12:42AM (#9713820)
    The multiple-PHD Admin certainly knows it, and has likely been voicing his concerns for some time. Unfortuantly the way the word works is that if it ain't broke, don't fix it. I imagine said admin(s) will now get the money they require to resolve the problem properly, otherwise Oxford risk more students doing this in 12 months time and looking even more silly
  • by samot84aol.com ( 554299 ) on Friday July 16, 2004 @12:42AM (#9713823)
    Why did they use names in the paper--they could have used an anonomyous source.
  • by randyest ( 589159 ) on Friday July 16, 2004 @12:46AM (#9713835) Homepage
    An IT Officer at College A said: "Short of keeping the network as segmented as possible, there is very little we can do." In a warning to students, he added: "I am able to monitor my network, and student regulations mean that any member abusing it would find themselves before the Dean."

    Er, require strong passwords? Hm, yeah, that'd work, and I guess it is "little" to do :)

    The OxStu has agreed not to pass on the methods used to carry out such actions, which fall foul of both the law and OUCS guidelines. One computer expert told The OxStu that the actions were virtually untraceable.


    How clever of them -- security by obscurity. I'm sure those "methods" would be far too complex for us to understand anyway, right? ;)

    It can take less than a minute to obtain an individual student's email password. A student at College B whose password was compromised told The OxStu: "It's absolutely ridiculous that security could be so light. I'll certainly be changing my password regularly in the future."


    Oh! So that's it. Weak passwords (or maybe a little social engineering, or both.) Gosh -- better keep a lid on that secret.
  • by MrRTFM ( 740877 ) * on Friday July 16, 2004 @12:49AM (#9713851) Journal
    Absolutely. The Uni's should try and foster an open environment, and not be so bloody harsh on students - who, do occasionally 'bend the rules'.

    This is probably the only time in peoples lives that they can experiment like this, and they shouldn't be heavily fined/expelled/sued. Maybe a formal 'slap on the wrist', but that's it.

    Its Uni - not a top secret government agency.
  • academic freedom (Score:5, Interesting)

    by havaloc ( 50551 ) * on Friday July 16, 2004 @12:49AM (#9713853) Homepage
    While this is an extreme hack and what not, you'd be surprised about how much resistance there is to security on a university setting. When my university installed email/virus scanning software, it was a HUGE deal and nearly wasn't installed because of concerns of academic freedom.
    When I suggested turning on the Windows Firewall on Faculty PCs, I was told that it was a no no because it could interfere with Academic freedom. Freedom above everything else is the university motto.
  • ..Well (Score:5, Interesting)

    by SinaSa ( 709393 ) on Friday July 16, 2004 @12:53AM (#9713868) Homepage
    Speaking as someone who sysadmin'd at one of the top five universities in my country, I can say that most universities are like this.

    Security is lax, well, because the information that someone would want to steal is usually already available on the various faculty websites.

    The only things I can think of that are actually worth securing ARE secured. Who cares if these guys can change someones email password. Most uni students don't even use their supplied email addresses, and they are usually only used as a redundant means of sending out marks. I wouldn't be worried about the CCTV monitoring either. It's not like the CCTV was viewing some "restricted" area of the university. Want to see what's going on? Walk down there and take a look. *gasp*.

    I'm probably being a troll (I can't even tell anymore) but honestly, most university security is so lax because there simply isn't that much data that requires securing.
  • Bullshit. (Score:5, Interesting)

    by Crasoum ( 618885 ) on Friday July 16, 2004 @12:54AM (#9713871) Journal
    White-hat my ass, they didn't ask for permission to crack the system first; they did it, THEN told them they did it, how easy it was and oh yea, it was for altruistic purposes.

    In this day and age of computers being ubiquitous with education, and many college kids, regardless of what school you end up going to, not knowing damn near the first thing about computer security, rooting a system is hardly an accomplishment. What it is though, is invasion of privacy, more then likely an infringement on the User Agreement which all colleges I've been to have to get on their network, and a really REALLY dumb way of propping yourself up to look cool.

    As for What they did, looking into MSN conversations isn't hard, it's plaintext across a network, set up a box to dump all the shit it gets and voila, hours of juicy reading material.

    E-mail passwords are also easy to get plaintext, unless the users of the network use some type of security layer, (SSL and the like) otherwise if you go to a normal webmail account, (http://webmail.schooname.com) you send your shit plaintext most of the time, Purdue, BSU, and a few other Indiana schools do that.

    The only thing I think that is dumb on the administration's part is having the Closed Circuit Televisions controlled via the internal network, that shit should be on a totally different network, that is the only real folly I see that is just nasty. Otherwise most of the shit is just because people are not security conscious.
  • root/root (Score:5, Interesting)

    by codeonezero ( 540302 ) on Friday July 16, 2004 @12:57AM (#9713884)
    Reminds me of my first year in college where I tried logging into the school server from my dorm computer on the school network with login root and password root....

    I was just curious at the time :-)

    A day later I get a rather straighforward e-mail from the system op, telling me to stop, or they will report me to the appropriate authorities, and about possible disciplinary options.

    Well at least I found out that they were smart enough to change the password, and keep on eye on what people were trying to do :-)
  • Re:Get permission! (Score:3, Interesting)

    by Artega VH ( 739847 ) on Friday July 16, 2004 @01:05AM (#9713915) Journal
    what university did you goto? my uni newspaper is hated by the administration.... so much so that there are now two.. the student one and the one put out by the administration :p
  • Re:Oxford Loses Out (Score:5, Interesting)

    by Smitty825 ( 114634 ) on Friday July 16, 2004 @01:23AM (#9713984) Homepage Journal
    Maybe my memory is foggy, plus, I realize that the incident occurred at Oxford University, which is in the UK, not the US, but.... (Is that enough of a disclaimer?)

    I recall that in the US, the Supreme Court has afforded protection to journalists who intentionally broke security laws to protect the public interest. For example, I seem to remember that in the pre-9/11 days, it was ok for a journalist to try and sneak a gun past the security checkpoints, as long as they didn't ever board a plane.

    If caught, the journalist would go to jail, but charges would be thrown out...I don't remember how everything worked, and I'm too lazy to type it into google :-)
  • Re:root/root (Score:4, Interesting)

    by TrevorB ( 57780 ) on Friday July 16, 2004 @01:34AM (#9714024) Homepage
    Are you sure that they didn't change the "root" user account to something else, and left the login id "root" as a honeypot to watch for hackers?

    The fact that they responded the next day indicates they were watching rather closely. Log watching is not something you expect from sysadmins who don't change their passwords.
  • The only difference (Score:3, Interesting)

    by DarkMantle ( 784415 ) on Friday July 16, 2004 @01:35AM (#9714027) Homepage
    I made a deal with the school... Don't expel me... I'll help you fix it. Also admitting through an anonymouse hotmail account helped... especially since every time i logged in it was from the school IP address.
  • by perlchild ( 582235 ) on Friday July 16, 2004 @01:38AM (#9714041)
    It's only maladministration if the administration is warned of a potential exploit, and does nothing. However, the recent legal climate makes it MANDATORY that this warning be done in an anonymous manner. Quite simply, because it's a crime to find an exploit on someone else's network, but choosing NOT to fix a bug is not a punishable crime(that's defensible, in a way: some bugfixes have been known to the worse than what they cured before). The only problem is that if a) the network handles YOUR sensitive private confidential or financial information, and you know it's being mishandled, you have one choice, to leave the institution, since:

    1) You can't force them to use secure transmission of all data
    2) You can't force them to use secure transmission of YOUR data
    3) You can't force them to follow best practices in the handling of all data
    4) If you try to point out in a public fora, that their handling of your data is faulty in any way, you can be sued

    But you can't sue them UNTIL your information is in the hand of someone who uses it illegally.

    Anyone notice how badly this deck is stacked yet?
  • Re:Yeah... and? (Score:5, Interesting)

    by gilrain ( 638808 ) <gilrain@@@lunarpolicy...net> on Friday July 16, 2004 @01:43AM (#9714057) Homepage
    The thing is, university campuses tend to almost have their own legal systems. At least, on the campuses I've been on, certain things are more legal than in the real world, and others are less legal. In general, unless it gets out of hand, problems on campus are handled by the university administration. For instance, plagiarism is given a grade of 0, or might even result in expusion -- but how often do you see it reported to any kind of legal authority?

    That's why this surprised me. In the real world, sure they would be rightfully prosecuted. But with the entire event being isolated to a university campus...
  • by Anonymous Coward on Friday July 16, 2004 @01:47AM (#9714073)
    You know nothing.

    The press isn't above the law.

    These folks didn't just "alert the population," they broke the law first.

    Be careful what you wish for. If you let the press be above the law, they will break into your house and look for incriminating documents. They will stop you in the street and strip-search you: "action of the press!" :-P

    Always, always think before shooting your mouth off: "if I allow them to do this on others, what will stop them from doing it on me?"

    -hadohk
  • by nickol ( 208154 ) on Friday July 16, 2004 @01:47AM (#9714074)
    What's going on ? When I was a student, our teachers offered highest marks in system programming to everyone who could hack the department network. A student had a choice : to study everything or just to prove himself capable. After each sucessful break in, the hole was patched and the network became more protected.

    This is the proper way. But making the unprotected network and call police... it's a degradation.

  • Re:500 pound fine? (Score:2, Interesting)

    by PedanticSpellingTrol ( 746300 ) on Friday July 16, 2004 @02:05AM (#9714148)
    Honest to god, I've seen a physics textbook in the Clemson University library that wanted the answer to an acceleration problem given in Angstroms per (Carbon-13 Halflife)^2. I can't recall the author, but it was in the "Physics is Fun!" series.

    Nice work alluding to comments from an earlier story, BTW. I wonder who else noticed?

  • Re:little we can do? (Score:1, Interesting)

    by Anonymous Coward on Friday July 16, 2004 @02:25AM (#9714208)
    If that was the entire quote from a technical admin then this should have been modded insightful, not interesting.

    If on the other hand, the tech then added "with the available budget", or similiar. Or if this was the non technical IT manager, then it is probably unfair.
  • by alstor ( 587931 ) on Friday July 16, 2004 @02:28AM (#9714217) Homepage
    If they were really interested in the best interests of the school they should have avoided embarrassing the school's administration.

    Best interest of the school, or of the students?

    Have you ever happened to try reporting security issues to a school? I have--the grades database server at my old high school was insecure (no sa password on the sql server). After I reported the issue to the superintendent, the entire IT department, several teachers, and an assistant principal, it took the IT guys 4 months, just to set a password. A local malicious attacker was unlikely, but a worm or outside attack was surely possible. Sure, my high school isn't Oxford, but an increased time delay for such a simple fix at my school, in comparison to a more complicated for a larger institution like Oxford, could be understandable. If I had perhaps reported it to the school newspaper, the issue would probably have been resolved more timely because students grades were in jeopardy, and a larger community knew it. Groups create more action than a single person creates, just look at how well lobbying works.

    Sure, the two students are probably in more trouble now than they would have been, but the issues are now probably being resolved more quickly.
  • by Triumph The Insult C ( 586706 ) on Friday July 16, 2004 @03:04AM (#9714287) Homepage Journal
    vlans are for performance. cisco has incorrectly convinced people they are for security
  • Nope, sorry (Score:3, Interesting)

    by Sycraft-fu ( 314770 ) on Friday July 16, 2004 @03:38AM (#9714361)
    You don't have a right to try and break in to places you do bussiness at. Try it if you like, try and break in to your bank, but don't bitch when the cops haul you off to jail.

    If they suspect a problem, they need to talk to the school about it and get permission. Just running off and doing it isn't acceptable.

    You are free to test the security of things YOU OWN. You can break in to your house, you can hack your own computer. You can break the window of your own car. However you can't do any of those things to someone's property you just happen to use. Just because you have an account on a system I own doesn't give you permission to hack it. Just because I'm storing your bicicle for you doesn't give you permission to break in to my garage.

    Look, I'll even entertain an argument that the law should be changed to make it legal, though I disagree, but you can't claim this isn't what the law is. Hence, they didn't have a right since they were breaking the law.
  • by Dorktrix ( 148287 ) on Friday July 16, 2004 @03:39AM (#9714363) Homepage
    I accidentally hacked into the web site that my univeristy created for alumni (I went to a very respectable west coast university)... It turns out that the temporary password they used when you "reset" your password was a keyword followed by the current date (i.e., "keyword20040716"). So to break into someone's account, you would just "reset" their password and then log into their account with the password "keyword200407016". No joke.

    This was the first email I got when I decided to go the route of notifying them directly rather than publishing my findings:
    Hi Bret,

    Thank you for your suggestion. This is the way the system was designed by our developers. If a temporary password is generated, an email is sent to the original user notifying him/her of the change. It is certainly a trade-off of convenience and security. Thanks for writing,

    Adam
    And this was my subsequent response:
    The problem is that my own personal email and personal information is at risk for your convenience. The level of security of the site is unacceptable, and I am sure that all of the other users of the site would agree with me. I don't want to make this blatant security hole known to the public, but I will if that is what it will take for you to fix it. Any system that allows access to personal email should not be designed so hastily. If you give me a time frame in which your organization will fix the security hole, I will not publish any information on how to exploit the hole until it is fixed.

    While it is true that the person receives an email when a temporary password is generated, the attacker can easily change the password before the "real" user has the opportunity to use the temporary password, effectively eliminating access to the account until a [snip] Alumni administrator comes in to fix the problem, which could take days.

    I am disappointed that, when notified of a major security breach, the [snip] Alumni organization responds with an apology rather than an intention to fix the problem. It greatly reduces my confidence in the [snip] Alumni web services.

    I look forward to a response,
    Bret Taylor
    btaylor@[snip]
    Which finally resulted in this (I guess it was escalated):
    Hello Bret,

    Thank you for sharing your concern regarding the issuing of the passwords. I have passed on this information to our developers who will address the issue.

    Please let me know if I can be of further assistance to you.

    Pauline
    I never heard back, but about three months later it was finally fixed. THREE MONTHS. Sometimes a little fire like an article is necessary to get bureaucracies moving.

  • Re:Yeah... and? (Score:5, Interesting)

    by ScouseMouse ( 690083 ) on Friday July 16, 2004 @03:49AM (#9714383) Homepage
    Yeah, Uni Sysadmins hate to look stupid, because in an environment with a couple of hundred graduatiing CS students they are very easy to replace at the drop of a hat.

    When i was at collage, i remember a friend of mine came over, but needed to do some work. Now the work was a document on a server in Preston Polytechnic, so we tried to FTP it over to the local VAX. Eventually we just gave up because it wasnt working

    Now we dont know exactly what happened, but next day i got an email from a very annoyed SYSadmin for this system because we had caused some form of system failiure by our actions. I think he called it a "Network breakthrough event" or something. Apparently somehow we had cacked their system in some way (I dont think it was permement, or particularly serious). They were Threataning to sue me and the guy involved.

    I send them an email saying we only wanted to get some work off the server and promising never to go near their crappy system again.

    From what i found out later, the reason he was threatening me was because the Poly had recently promised someone doing some research that their system was safe and secure, and apparently something died (Probably the FTP daemon) when the guy was in the room. Very embarrasing. So of course it all got blamed on them nasty hackers. :-)

    I later found out exacly now flaky a default PrimeOs installation was in person, it always surprised me after that how anyone would ever dream of using it in a production system, but then again, being braught up on VMS and UNIX, i seem to have got the strange impression that more than 10 hours uptime in one stretch is my god-given right :-).

  • Re:Yeah... and? (Score:2, Interesting)

    by sotonboy ( 753502 ) on Friday July 16, 2004 @04:25AM (#9714454)
    "For instance, plagiarism is given a grade of 0, or might even result in expusion -- but how often do you see it reported to any kind of legal authority?
    "

    -- Well since you asked, we have some cretin in the UK who is suing his university after they kicked him out for plagiarising his entire coursework. He says the university wasnt clear enough that plagiarism wasnt allowed. It just goes to show what happens when your education system lets idiots go to university. And when your legal system allows idiots to sue.
  • Re:Yeah... and? (Score:3, Interesting)

    by shadowmatter ( 734276 ) on Friday July 16, 2004 @04:39AM (#9714486)
    Oh yeah, in University in 1995 we sent fake email between professors...

    Heh, speaking of forging e-mails from professors and university justice... That reminds me of a funny story:

    A friend of mine was teased relentlessly by a student in one of her classes about the professor liking her. The professor wasn't exactly young or attractive, and he was obviously doing this just to spite her, although it wasn't always in good fun. Anyway, in a move-gone-too-far, he decided to set up his Outlook e-mail client so that his name and reply-to address were those of the professor. He then proceeded to type her an e-mail, saying how he had the hots for her and whatnot.

    The problem was, he didn't type in her e-mail address correctly. And so her SMTP server bounced the e-mail back... To the real professor.

    Anyway, the prof contacted the University IT department, and I don't think that relentlessly teasing student goes here anymore.

    - sm
  • Re:Yeah... and? (Score:5, Interesting)

    by fucksl4shd0t ( 630000 ) on Friday July 16, 2004 @04:59AM (#9714531) Homepage Journal

    My first school hack was a real hack. I was playing some BASIC game on the Commodore 64 in the library and I hit a bug that prevented me from winning the game. A real, live bug. So I listed the line, identified the bug, and started fixing it when the librarian walked up and asked what I was doing. She wound up calling my parents saying I was trying to rewrite the game so I could win, you know, cheating.

    My parents were cool about it. When I got home my dad asked me what had happened, and since I had previously saved the game to my own disk (we weren't allowed to do that...) and brought it home I fired it up and reproduced the bug for him. Then he watched me fix it, called the librarian and bitched at her, because it was a real bug.

    I got kicked off the computer in the library after that. No big loss, we had two of those machines at home and tons more stuff. ;) But I've had a severe prejudice against librarians every since then...

  • Re:Yeah... and? (Score:5, Interesting)

    by andy landy ( 306369 ) <aplandells&hotmail,com> on Friday July 16, 2004 @05:22AM (#9714591) Homepage
    I'm a sysadmin for a UK university and it's certainly true that we have our own rules. For example, our AUP forbids the use of peer-to-peer software as it's easier that way. Anyone using it is in breach of the AUP, clean and simple. That way we avoid having to deal with legalities of copyright infringement etc.

    As for prosecuting students who hack the systems and networks, we take a different approach. Before I was a sysadmin, I was a student at the same University and certainly had a go at the systems (I found a way to get a setuid copy of bash), on telling the sysadmins, they fixed the security hole, but I got kudos and respect for finding the hole.

    The general policy is that our Computer Science students should be smart enough to root the systems, and if they manage it, so long as they don't abuse it and they report it quickly, then we are happy!
  • by Mr Smidge ( 668120 ) on Friday July 16, 2004 @05:51AM (#9714649) Homepage
    Disclaimer: I am an Oxford student.

    When I read this article for myself, my thoughts were "Ah, good. They are making it more apparent that every system can have flaws and weaknesses if not set up and maintained properly", but the article generally came over as making it rather sensationalist that such a thing would be possible on the Oxford network.

    I was composing a letter to write in to the editor about similar weaknesses I had found but not ever dared to tell people about (almost entirely cases of not changing the default password), in which I pointed out that it's most likely that tons of networks are insecure in the same way, but people just don't find out that often.

    However, I then saw a small article in Oxford's rival student newspaper (The Cherwell), saying that these two students who wrote the article were being investigated by the proctors. I quickly decided not to submit my letter, though on reflection, maybe an anonymous submission might have been worthwhile sending.

    I agree with Pat Foster, who said: "I regret the fact that the university's priority seems to be pursuing Roger and myself, rather than addressing the issues we raised."
  • Actually... (Score:3, Interesting)

    by PsiPsiStar ( 95676 ) on Friday July 16, 2004 @05:56AM (#9714663)
    Actually, if everyone does a particular thing, sometimes it becomes legal.

    If you don't have 'no trespassing' signs on your yard and kids walk through it every day for, say about 7 years (this is the usual) you can actually lose the right to stop them. The area becomes public domain for a particular purpose.

    It would be interesting to see this applied to a network.

    (IANAL, btw)
  • by Alnitak73 ( 739151 ) on Friday July 16, 2004 @06:00AM (#9714680) Homepage

    Firstly, please let me clarify a few points about the article and the way stuff is run at Oxford:

    1. the University provides the inter-building network infrastructure, but each College and Department is responsible for running its own internal network
    2. there is no indication in the article that any University-maintained network infrastructure was penetrated.

    My understanding of what has probably happened is that one or more colleges have skimped on network hardware and not installed the recommended switched network equipment with MAC address protection.

    Alternatively the students may have found a way to defeat the security on the switch they're connected to that allowed them to mirror other ports' traffic down their port.

    Although they did sniff passwords for a University provided e-mail service, it seems that everything they did was within a college network.

    To say that the University network was hacked, as both the /. article and the student rag suggests is not accurate and vastly inflates the scale of what these students "achieved".

    Alnitak - Oxford graduate and ex-staffer.

  • by LondonLawyer ( 609870 ) on Friday July 16, 2004 @06:02AM (#9714686) Journal
    university campuses tend to almost have their own legal systems

    But with the entire event being isolated to a university campus...

    There is no single campus at Oxford, only a collection of Colleges, Libraries and Faculties.

    The policing of Oxford students is dealt with mainly by the Colleges and the Proctors. The Proctors can be quite fierce if they fail to see the funny side. They are also quite old fashioned - most students hope only to encounter them at ceremonial occasions when they'll be wearing gowns and funny hats. There are also the 'Bulldogs' who are basically the heavies for the Proctors and go round in bowler hats and used to chase the students out of pubs in the old days.

    In this instance, the fact that the story was splashed on the front page of a newspaper with circulation throughout Oxford (rather than just within a campus) probably caused a lot of embarassment. Added to which, I wouldn't be surprised if the Proctors have very little understanding of exactly what has been done or how. They will assume the worst. They probably just want to be seen to be taking the matter seriously and don't know exactly how serious it really is or what reaction is appropriate. In any case, rustication isn't so bad - you can come back to study once you've served your time away). They could have been 'sent down', in which case it'd be game over.
  • Re:Yeah... and? (Score:5, Interesting)

    by olderchurch ( 242469 ) on Friday July 16, 2004 @06:20AM (#9714728) Homepage Journal
    This is the exact same reason why I love my provider. From their general conditions [xs4all.nl]:
    4.4 Without prejudice to article 4.3, customers are permitted to hack the
    XS4ALL system.

    The first customer who succeeds in attaining a position equivalent to that
    of the XS4ALL system administrator will be offered six months' free use of
    the system, provided that the said customer explains how he or she succeeded
    in hacking the system, has not damaged the system or other customers and has
    respected the privacy of other customers. Each customer hereby gives consent
    for other customers to attempt to hack the system under the aforementioned
    conditions.
  • by FooAtWFU ( 699187 ) on Friday July 16, 2004 @07:17AM (#9714850) Homepage
    On the other hand, there are some very simple measures that certain sysadmins could take. For example, it would be nice if I could get to my campus email through a secure POP link. But the server doesn't have one enabled. Well then, say hello to PINE, via ssh! (mmm, PINE)...

    And on another level, they can force people to use some amount of SSL. Make the mail server SSL-only, for instance. This is especially the case at my university: each student is issued a standard university ThinkPad [wfu.edu], and they can control the load on those things. Set up a secure POP connection, have the new laptops set up to use it, and within one replacement cycle (two years) you can have everyone checking their mail securely. Would this be excessively burdensome? It won't protect your web mail or Slashdot account from packet sniffing, but it keeps your email (which usually shares your Important University Password) nice and secure!

    (Incidentally, they've been loading Mozilla on them for mail and browsing. I can only see good coming of that, at least.)

  • Re:Oxford Loses Out (Score:4, Interesting)

    by EvilTwinSkippy ( 112490 ) <yoda AT etoyoc DOT com> on Friday July 16, 2004 @07:33AM (#9714873) Homepage Journal
    Actually, no. There is not such exemption. There never was such an exemption. A journalist reporting the event might try to claim the 5th admendment (right to not testify against oneself). If he got the gun past security, and was the sole witness to his crime, he would get off on a technicality. There was no crime since he would be the only person to testify for the prosecution (and anyone who read the account in the news would be insumbisable as heresay.)

    If the airport screeners actually found the gun, he would be breaking rocks in a federal pen.

  • Re:Yeah... and? (Score:4, Interesting)

    by div_2n ( 525075 ) on Friday July 16, 2004 @08:12AM (#9715000)
    I did almost the same thing for my college except I didn't admit to actually perform the hacking. I published HOW to hack the entire network, where to go and what software to get. For example, every Lexmark printer on campus was not password protected. By downloading the readily available Markvision management software, you could oh say change the LED display screen language to Mandarin.

    Among the big security problems were:

    -All students getting unfirewalled public IPs (I shit you not)

    -All servers having unfirewalled public IPs

    -E-mail hosted on old (probably unpatched) HP-Unix with the most basic of unshadowed DES passwords

    -NT servers (see above) without the latest patches

    When I contacted the IT department with comment on all of this prior to publishing, they said something like, "the average student doesn't know how to take advantage of all of those issues." That comment frosted me and prompted me to publish.

    The result? A firewall was installed in a matter of days and public IPs went private. Yes, I could have run any kind of server I wanted unhindered (and did) but I was concerned for the welfare of the students who would have their computers molested by crackers.

    Of course I later applied for a network admin job at the school upon graduating and didn't get the job so maybe that wasn't so smart. But I did get a better job instead. In fact, the job formerly held by the guy my alma matter chose instead of me. How's that for irony?
  • Re:Yeah... and? (Score:2, Interesting)

    by olderchurch ( 242469 ) on Friday July 16, 2004 @08:19AM (#9715029) Homepage Journal
    But wait, there is more:
    XS4ALL figths spam [slashdot.org]
    and stands by their customer [slashdot.org]
  • Re:Yeah... and? (Score:4, Interesting)

    by Lumpy ( 12016 ) on Friday July 16, 2004 @09:30AM (#9715373) Homepage
    Good example, when I did freelance work I ALWAYS required 50% payment up front. and my expenses were split as product and labor. the up front pay's for labor only and the final payment at delivery was for the product (software, hardware, whatever) it was clearly written that way on the invoices.

    Once I went to deliver a software app, they did not have my money so I uninstalled it grabbed my stuff and started to leave. He threatened to call the cops, at which point i said, "please do, I would like to file a fraud report against you for trying to steal my software without paying for it." after some arguing, I picked up my cellphone and said, "fine I'll call the cops." at which point the customer magically was able to produce a check for me (Check's over $1000.00 are fine to take, it's a nasty felony that will get you thrown in jail for writing a bad check over $1000.00)

    I sat down and reinstalled, and gave them another invoice for 3 hours more labor to cover the BS they tried to pull.

    I later forced the jerk to pay me in small claims court for the final labor invoice.

    Never put in time-bombs. ALWAYS have them pay up front for labor and demand payment fo rthe product at delivery. If the company will not do that, then dont work for them, there are plenty of companies out there that are not scumbags.

    BTW, after a few years of freelance, I learned that most companies in the area knew about the company that tried to screw me, they had a reputation of trying to steal from contractors.
  • by cayenne8 ( 626475 ) on Friday July 16, 2004 @09:37AM (#9715414) Homepage Journal
    One thing that stood out to me in this article...the high security they have on campus. CCTV cameras everywhere? Having to swipe access cards to get in any building, etc...

    Why all these intrusive and secure measures just for a college campus? Its not a military base or anything....

  • Re:Yeah... and? (Score:3, Interesting)

    by bfields ( 66644 ) on Friday July 16, 2004 @10:39AM (#9716037) Homepage
    -All students getting unfirewalled public IPs (I shit you not)

    A firewall makes a lame attempt to divide the network into an inside and an outside, under the assumption that attacks will come from the outside. But all it takes is for one machine on the inside to be compromised and that assumption is no longer true. Unfortunately, these days virtually all networks of any size have compromised machines: email and web browsing are sources of compromises, and firewalls don't block those; and lots of people use laptops on other networks as well, where they may have picked up something nasty.

    The advantages of firewalls are insufficient to outweigh the disadvantages of not having a real public IP.

    --Bruce Fields

  • Re:Yeah... and? (Score:3, Interesting)

    by andy landy ( 306369 ) <aplandells&hotmail,com> on Friday July 16, 2004 @10:43AM (#9716076) Homepage
    So your computers do not "talk" to each other to any other computer...

    Fine, be pedantic... To clarify things, our AUP has a blanket ban on "Peer to peer file transfer software, such as KaZaa, WinMX, eMule, BitTorrent etc...". Yes, perhaps you could claim that everything that runs on Ethernet is "Peer to peer", but that's just being difficult.

    If you look at the Janet AUP (UK academic network), you'll see that "Non-academic use is not permitted", so technically our students aren't even allowed to email their folks! Of course, we don't enforce things to this level, but you started the pedantry :D
  • Re:Yeah... and? (Score:2, Interesting)

    by NeonSpirit ( 530024 ) <mjhodge&gmail,com> on Friday July 16, 2004 @10:59AM (#9716226) Homepage
    When I was at University, some time ago now we had two computing facilities, and therefore two policies.

    Computing services was used by the entire campus, maths, engineering, chemestry etc. The security policy here was quite tight, you could do what you wanted, but if you found a hole report it. If you do any dammage you will be expelled. We have a very good relationship with the sysadmin, to the extent that he let us use and explore new systems before they were given to the general population. In this way we could find holes and expoits before any reliance was placed on the new facilities.

    Comuter science had a much more slak security policy, only compter science based students had access. Here you could again do what you like, but if you caused any damage the syadmin would make it public and let your peers deal with you. This was incentive enough, believe me.

So you think that money is the root of all evil. Have you ever asked what is the root of money? -- Ayn Rand

Working...