Doubleclick - Round 5 : Learn how to become a tech guy at Doubleclick
|Funny how a paper
on a subject as Doubleclick can bring up some nice information through e-mail...
We received a laconic mail.
With Juste an IP address . A public address in the Doubleclick.net network which contains all the documents necessary for the young guys who are hired in the tech department.
How to make the backups, how to reboot the mail servers (with their internal addresses...) and tons of othe amusing things. Looking at this site, one could have thought being at Bull or Cegetel back in the great times when they would offer sooooo many internal information on public web servers ...
People should keep in mind that the sites which are set up for training the recently hired guys which offer online " tutorials " should be on an internal class of address. And Doubleclick has tons.
Please read his lips again: "We continuously assess the equipment that we have. We certainly take the opportunity to make sure the appropriate measures are in place. This is unusual. Even a partial breach of a noncritical server is unusual". Says the person in charge of security at Doubleclick to the press.
Yesterday, Prime Suspectz proved that the "appropriate measures" were not taken, even on critical servers, even after a week of alarming papers on their security and internal audit.
One day it will be fun to draw up the list of the servers that could have been rooted at Doubleclick and which we saw in our browser during these a few days... This number is scarry.
Nous envoyer des commentaires
By la page de le Feed-Back
Sommaire général du site
On s'en fout!
|Les dossiers :
Le monde fou des Admins
Le hack le plus bizarre
Guerre de l'info
Convention contre la cyber-criminalité
sur le site
...et sur le Net
D'autres choses du Ouèb