Berkeley CSUA MOTD:Entry 12299
Berkeley CSUA MOTD
2019/03/24 [General] UID:1000 Activity:popular

2004/2/18 [Computer/Networking, Computer/SW/Security] UID:12299 Activity:nil
2/18    Wireless Bank "Hack":
        \_  Does Haifa have the largest nerd density in Israel?
2019/03/24 [General] UID:1000 Activity:popular

You may also be interested in these entries...
2009/4/26-29 [Computer/Networking] UID:52910 Activity:nil
4/25    I have an Airport Express.  is there some way to let computer
        1 ping computer 2?  both computers are connected to wireless network
        successfully.  I can get to internet on both of them.  I just can't
        ping each other.  weird.  maybe they think that's a feature?
        \_ Sounds like your router is enforcing client isolation. If you can't
           change the setting on the router you're probably SOL.
2009/2/27-3/5 [Computer/Networking] UID:52658 Activity:nil
2/27    I need to buy a wireless router, can u guys help me out?   I need the
        following features:  wireless, G or better, PPTP dial up, PPoE dialup,
        VoIP/SIP register, DDNS, uPnP.
        I am having a such hard time to find a review site which allow me to
        select these features.   Any ideas?  There are a couple model from
        this small company Draytek has these features, I am having the hardest
2008/12/15-29 [Computer/Networking] UID:52254 Activity:kinda low
12/15   ausman, maybe this can help form your views on net neutrality:
        if you're bored, skip down to the iFilm example.
        \_ jim: consider the case of a private electrical utility:
           do you believe in "current neurality"? i agree if say GOOG
           were to put in a giant server complex creating a sudden local
2008/11/11-26 [Computer/Networking] UID:51916 Activity:nil
11/11   Dumb question. My apartment has a bunch of inter-computer file
        exchange going on. Should I get a switch instead of a router to
        minimize traffic? Does it really make a difference? Let's say
        two computers exchanging info with each other are on the switch
        and the switch is connected to the router. The router will never
        know about the transfer between the two computers right?
2008/10/21-22 [Computer/HW/Soundcard] UID:51610 Activity:nil
10/21   I installed the latest Ubuntu.  It recognized my wireless, dual
        monitor setup, sound card, then made me breakfast.
2008/9/29-10/1 [Computer/Networking] UID:51325 Activity:nil
9/29    I'm looking for a new wireless router / firewall, preferably
        something that supports 802.11n. Any recommendations?
        \_ Which 802.11n?
           \_ Draft 2.0 or whatever version is supported by the the
              MacBook and iMac.
2008/6/6-10 [Computer/Networking] UID:50171 Activity:nil
6/6     Now that 3g wireless speeds are getting useable and phones are
        coming out that have built in wifi are there any phones that
        can be used as wireless wifi access point?  -aspo
        \_ Yes. My coworker does this with his Blackberry.
2008/5/31 [Computer/SW/Unix, Computer/SW/Apps/Media] UID:50105 Activity:nil
5/31    I have a slow wireless router and slow fileserver on my network.
        Is there a video or media player (windows or unix) that is smart
        about caching content while playing it?  I would like to be able
        to hit play on a file from a file share, wait for it to catch
        up for a while because my connection is so slow, walk away for
        a while and come back and view my movie with no annoying skips. thanks.
2012/5/8-6/4 [Computer/SW/Unix] UID:54383 Activity:nil
5/8     Hello everyone!  This is Josh Hawn, CSUA Tech VP for Spring 2012.
        About 2 weeks ago, someone brought to my attention that our script
        to periodically merge /etc/motd.public into /etc/motd wasn't
        running.  When I looked into it, the cron daemon was running, but
        there hadn't been any root activity in the log since April 7th.  I
        looked into it for a while, but got lost in other things I was
2011/11/16-12/28 [Computer/HW, Academia/Berkeley/CSUA] UID:54230 Activity:nil
11/16   We'll be taking all CSUA machines offline in the near future for a Soda
        Hall server room reorganization (we're being moved to a neighboring
        server cabinet).  Downtime will hopefully be minimal.  --jordan
        \_ Thanks for all your work keeping the machines running!  It's
           been awesome having soda actually working again.
        \_ Update:  this is tentatively scheduled for Saturday afternoon.
2011/8/9-27 [Computer/SW/Editors/Emacs, Academia/Berkeley/CSUA] UID:54162 Activity:nil
8/9     So I just found out that an old college friend of mine lost her
        four month old daughter to SIDS. What is the correct response here?
        \_ "Did she sleep with her belly?" and "Did you breastfeed?"
        \_ try this joke:
           How do you make a dead baby float?
           ˙ʎqɐq pɐǝp ɟo sdooɔs oʍʇ puɐ ɹǝǝqʇooɹ ɟo ƃnɯ ɐ
2010/11/21-2011/1/13 [Computer/SW/Languages/Web] UID:53988 Activity:moderate
11/21   Lifehacker's recommending Dreamhost as a personal web hosting service.
        Apart from csua, who do you guys use? --erikred
        \_ What do you want to use it for? Do you need CGI or PHP?  My
           brother worked for Dreamhost and said they are unethical. In
           fact, he sued them. This refers to their treatment of customers
           and employees both. I don't know who  or what "Lifehacker" is,
2010/11/1-2011/1/13 [Computer/Networking] UID:54002 Activity:nil
11/1    I'm moving from a home in Fremont to another home within the same ZIP
        code in Fremont, and AT&T customer service says I cannot transfer my
        DSL service because DSL is not available at my new home.  Is that BS?
        Are they just trying to push me to subscribe to their more expensive
        U-verse service?  I'm not asking for any lightening-speed connection.
            \_ could be
2010/8/10-9/7 [Computer/Companies/Google] UID:53919 Activity:nil
        Google Wave No More. The people who worked on it were pretty smart.
        They wrote up a super awesome OKR with extremely low bar as a measure
        of success, exceeded everyone's expectations by going above those
        bars, and got big fat bonuses and promotions as a result of their
        planning. Brilliant.
Cache (2764 bytes)
Last week a story came to life in Israeli news about a computer heist in an Haifa branch of the Israeli Postal Service, successfully stealing 56 thousand Shekels a sum equal to about 13 thousand US Dollars using a wireless networking device planted in a computer rack and hooked into the local computer network. About a month ago, a break-in was reported in a branch of the Israeli Postal Service which is also a small bank in Israel in the City of Haifa. Israeli Police detectives hurried to the scene, yet could find nothing missing or out of place. It is reported that last week roughly 3 weeks after the incident the Israeli Postal Service noticed large withdrawals of money from newly opened accounts, all originating from the Haifa branch. According to Postal Service this was detected by auditing abnormal transfers of money, a known technique used for fighting Financial Frauds. Upon further investigation the unauthorized device was discovered. The perpetrators then attempted to withdraw the funds from the new accounts, which led to the arrest of four suspects. The suspects have yet to cooperate with the authorities, which are trying to locate the brains as well as the hacker behind the operation. An Israeli Police official was quoted saying This computer crime takes us to year 3000. The hack itself could be performed in many different ways, accessing different computers, sniffing and re-constructing traffic, etc. Personally, I believe some inside information was used rather than pure network research. If we are to believe how this scam was busted and that financial auditing raised the alarm, we can presume that the legit-looking wireless networking device connected to the switch in the Postal Service branch would have gone undetected for a long time still. Had the perpetrators not gone ahead and withdrawn large sums of money, using statistical techniques to guide their actions instead, the heist would probably have been long over by the time the wireless networking device was found. On the conspiratorial side, it is quite possible the scam was detected by other means. With four suspects in custody, and rumors of quite a few people involved, one can speculate that someone within the crime ring might have talked. It is also possible that somebody actually noticed the legit-looking network hardware or that the police was already investigating this group when they came across this latest crime. If this wireless networking device, that simply appeared, had no reason to look suspicious in a computer rack that is virtually never opened, one would have to speculate the crime did not warrant a less alarming or better hidden device. This is a case of the right tool for the right job, with the correct amount of resources cost vs.