Berkeley CSUA MOTD:Entry 51654
Berkeley CSUA MOTD
 
WIKI | FAQ | Tech FAQ
http://csua.com/feed/
2025/05/23 [General] UID:1000 Activity:popular
5/23    

2008/10/23-28 [Computer/SW/Security, Computer/SW/Unix] UID:51654 Activity:nil
10/23   Woman charged with crime for "killing" (deletion really) of online
        character:
        http://tinyurl.com/6lspuv
        \_ she is weak. SHe should have created her own character
           and then do a backstab on his ass. - turin
ERROR, url_link recursive (eces.Colorado.EDU/secure/mindterm2) 2025/05/23 [General] UID:1000 Activity:popular
5/23    

You may also be interested in these entries...
2012/8/26-11/7 [Computer/SW/Security] UID:54465 Activity:nil
8/26    Poll: how many of you pub/priv key users: 1) use private keys that
        are not password protected 2) password protect your private keys
        but don't use ssh-agent 3) use ssh-agent:
        1) .
        2) ..
        3) ...
	...
2012/8/29-11/7 [Computer/SW/Security] UID:54467 Activity:nil
8/29    There was once a CSUA web page which runs an SSH client for logging
        on to soda.  Does that page still exist?  Can someone remind me of the
        URL please?  Thx.
        \_ what do you mean? instruction on how to ssh into soda?
           \_ No I think he means the ssh applet, which, iirc, was an applet
              that implemented an ssh v1 client.  I think this page went away
	...
2012/9/24-11/7 [Computer/SW/Languages, Computer/SW/Unix] UID:54484 Activity:nil
9/24    How come changing my shell using ldapmodify (chsh doesn't work) doesn't
        work either? ldapsearch and getent show the new shell but I still get
        the old shell on login.
        \_ Scratch that, it magically took my new shell now. WTF?
           \_ probably nscd(8)
	...
2011/4/27-7/30 [Computer/SW/Security, Computer/SW/Unix] UID:54096 Activity:nil
4/28    Will wall be fixed?   - jsl
        \_ What's wall?
           \_ An anachronism from a bygone era, when computers were hard to
              comeby, the dorms didn't have net, there was no airbears, and
              when phones didn't come standard with twitter or sms.
           \_ A non useful implementation of twitter.
	...
2011/5/19-7/30 [Computer/SW/Security] UID:54110 Activity:nil
5/19    Uh, is anyone still using this? Please mark here if you post and
        haven't added this yet. I'll start:
        \_ person k
        \_ ausman, I check in about once a week.
        \_ erikred, twice a week or so.
        \_ mehlhaff, I login when I actually own my home directory instead of
	...
2009/10/1-21 [Computer/SW/WWW/Browsers] UID:53417 Activity:moderate
10/1    I am thinking of installing firefox on soda under my home directory.
        Will this make me a hozer?
        \_ Possibly. I wonder if we should have another VM for that...btw,
           I remember someone saying they're glad we're not on FreeBSD
           anymore, but last I checked, a bunch of our stuff is on FreeBSD,
           but our login server is not.
	...
2009/7/8-16 [Computer/SW/OS/Linux, Computer/SW/Unix] UID:53124 Activity:nil
7/7     what happened to our web presence? http://www.csua.berkeley.edu
        not working
    \_ That would be because we've yet to set them up afaik. Steven *does* have
    a job after all. The idea is that we want a separate computer mounting the
    web directories, so that if an exploit compromises the webserver, the shell
    server (soda) itself will be insulated from the attack.
	...
2009/6/29-7/3 [Computer/SW/Security] UID:53083 Activity:low 53%like:53089
6/28    Hello everyone,
Logins to soda are back open.  The new ssh key is
2048 4b:96:67:18:27:da:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX
Please allow public key authentication since it is more secure
than plain password. Also if you see this posting, it means
anybody could have posted the annoucement.  Because  the
	...
2009/6/29-7/3 [Computer/SW/Security] UID:53089 Activity:nil 53%like:53083
6/29    Please allow public key authentication since it is more
        secure than plain password.  If you see this posting, it
        means anybody could have posted the annoucement.  Because
        the official csua web site is still down., this makes it a
        little suspicious to the truly paranoid.
        p.s.  this web entry format is counter intuitive.  And how come
	...
2009/3/8-17 [Computer/SW/Unix] UID:52685 Activity:kinda low
3/8     I'm reading about an old exploit where someone used a buffer overflow
        in a printer daemon to get "daemon privileges," which allowed them
        to use another exploit on the mail delivery program to get root.  I'm
        not sure what daemon privileges are.  Is there some set of priveleges
        that most daemons run on that is higher than user but lower than root?
        What are they?  I've never heard this before.
	...
Cache (2812 bytes)
tinyurl.com/6lspuv -> news.yahoo.com/s/ap/20081023/ap_on_re_as/as_japan_avatar_murder_6
Print By MARI YAMAGUCHI, Associated Press Writer Mari Yamaguchi, Associated Press Writer - Thu Oct 23, 1:11 pm ET TOKYO - A 43-year-old player in a virtual game world became so angry about her sudden divorce from her online husband that she logged on with his password and killed his digital persona, police said Thursday. The woman, who has been jailed on suspicion of illegally accessing a computer and manipulating electronic data, used his ID and password to log onto the popular interactive game "Maple Story" to carry out the virtual murder in May, a police official in the northern city of Sapporo said. He spoke on condition of anonymity because of department policy. That made me so angry," the official quoted her as telling investigators and admitting the allegations. The woman, a piano teacher, had not plotted any revenge in the real world, the official said. If convicted, she could face up to five years in prison or a fine up to $5,000. Players in "Maple Story" create and manipulate digital images called "avatars" that represent themselves, while engaging in relationships, social activities and fighting monsters and other obstacles. In virtual worlds, players often abandon their inhibitions, engaging in activity online that they would never do in the real world. The woman used login information she got from the 33-year-old office worker when their characters were happily married to kill the character. The man complained to police when he discovered that his online avatar was dead. The woman was arrested Wednesday and taken 620 miles from her home in southern Miyazaki to be detained in Sapporo, where the man lives, the official said. The police official said he did not know if she was married in the real world. Bad online behavior is usually handled within the rules set up by online worlds, which can ban miscreants or take away their virtual possessions. In recent years, virtual lives have had consequences in the real world. When bad deeds lead to criminal charges, prosecutors have found a real-world activity to cite -- as in this case, in which the woman was charged with inappropriate computer access. In August, a woman was charged in Delaware with plotting the real-life abduction of a boyfriend she met through the virtual reality Web site "Second Life." In Tokyo, a 16-year-old boy was charged with stealing the ID and password from a fellow player of an online game in order to swindle virtual currency worth $360,000. Virtual games are popular in Japan, and "Second Life" has drawn a fair number of Japanese participants. They rank third by nationality among users, after Americans and Brazilians. The information contained in the AP News report may not be published, broadcast, rewritten or redistributed without the prior written authority of The Associated Press.