On Tue, 2015-04-07 at 12:28 -0400, m.roth@xxxxxxxxx wrote: > “It is the assessment of Linux Australia that the individual utilized a > currently unknown vulnerability to trigger a remote buffer overflow and > gain root level access to the server,” Hesketh wrote. > > The attacker installed a remote access tool and then botnet command and > control software. > --- end excerpt --- > > <http://www.cio.com/article/2906814/linux-australia-breached-personal-details-leaked.html> Its stupid and unprofessional to store personal data on a public accessible server when there is no current public requirement for that data. How do these people ever become 'konputar xperts' ? I would like to know what operating system was used and the method used to gain access. -- Regards, Paul. England, EU. Je suis Charlie. _______________________________________________ CentOS mailing list CentOS@xxxxxxxxxx http://lists.centos.org/mailman/listinfo/centos