Anyone here from Microsoft? Hacked?

If anyone from Microsoft is on the list. You might want to check to see if this is a hack or an old employee being funny.

I did enjoy the link that sent me to McDonalds to apply for a job.

Just curious, does anyone know what servers they run their content on? Is it still NT?

Hope this info helps the webmaster.

David

http://www.microsoft.com&item%3Dq209354@hardware.no/nyheter/feb01/Q209354%20-%20HOWTO.htm
David Diaz
dave@smoton.net

Smartphotons (smotons) trump dumb photons

I didn't find the link to work, but I'm pretty sure that everything before
the @ sign is a username for the site hardware.no and this has nothing to
do with Micrsoft whatsoever.

andy

If anyone from Microsoft is on the list. You might want to check to
see if this is a hack or an old employee being funny.

I did enjoy the link that sent me to McDonalds to apply for a job.

[...]

Guide - Tek.no

That's an old trick. Notice the "@" in there - the actual URL is

Microsoft has nothing to do with it.

David

^^^^^^^
it's not at www.microsoft.com/somewhere/some-url/

-Basil

David Diaz <techlist@smoton.net> writes:

If anyone from Microsoft is on the list. You might want to check to
see if this is a hack or an old employee being funny.

I did enjoy the link that sent me to McDonalds to apply for a job.

Just curious, does anyone know what servers they run their content on?
Is it still NT?

Hope this info helps the webmaster.

David

Guide - Tek.no

This address is actually on hardware.no. See the @ sign? It
instructs the browser to connect to 'hardware.no' and give the
username 'www.microsoft.com&item%3Dq209354'.

It's an increasingly common trick.

So no security breaches, no pissed off employees, no chances to bash
NT. Ah, well.

----ScottG.

umm, notice that domain name? See that @ sign? Anything before it is sent as a username, which is generally ignored unless requested.
We now return you to your regularly scheduled network operations discussion and flamewars.
-Paul

If anyone from Microsoft is on the list. You might want to check to
see if this is a hack or an old employee being funny.

I did enjoy the link that sent me to McDonalds to apply for a job.

Just curious, does anyone know what servers they run their content on?
Is it still NT?

Hope this info helps the webmaster.

David

http://www.microsoft.com&item%3Dq209354@hardware.no/nyheter/feb01/Q209354%

20-%20HOWTO.htm

If anyone from Microsoft is on the list. You might want to check to
see if this is a hack or an old employee being funny.

Neither.

http://www.microsoft.com&item%3Dq209354@hardware.no/nyheter/\[\.\.\.\]

                          ^ ^
You're accessing a page on hardware.no with a username of
'http://www.microsoft.com&item%3Dq209354'.

^^^^^^^^^^^

This isnt microsoft.com, it's hardware.no

-Dan

ICANN's new root zone works in exactly the same way:

http://www.icann.org&search=tld&type=all@3349551349/tech/rootzone/db.root

If anyone from Microsoft is on the list. You might want to check to see if this is a hack or an old employee being funny.

Hope this info helps the webmaster.

David

Guide - Tek.no

Best Regards,

Simon

Self-serving, trollbaiting git:

http://www.icann.org/yokohama/eoi5.htm

andy

Simon Higgs wrote:

ICANN's new root zone works in exactly the same way:

http://www.icann.org&search=tld&type=all@3349551349/tech/rootzone/db.root

I'm not sure if you're lacking clue() or are trying to be funny but there's
no reason to trick people into using the non-ICANN approved osrc zone file
on accident.

Personally I use their root zone but I woudln't ever coerce someone else
into doing it.

-davidu
Founder, EveryDNS.Net

Man, it's sad when *I*'m saying "Please don't feed the trolls".... :wink:

Paul Timmins wrote:

umm, notice that domain name? See that @ sign? Anything before it
is sent as a username, which is generally ignored unless requested.
We now return you to your regularly scheduled network operations
discussion and flamewars.

Reminds me of an old joke when I was in college. I used to have this in
my .signature:

  Free UNIX accounts. Telnet to 127.0.0.1. Use your existing
  user ID and password to login.

I got a lot of mail from concerned-but-clueless people warning me that
this may be a criminal trying to harvest passwords.

Of course, the joke is far less effective today, when most people on the
internet are not using UNIX systems.

-- David

There was a pretty impressive warez network running on that
  IP address for a while, too.

  The slogan was "everything we have is yours."

> Simon Higgs wrote:
>
> ICANN's new root zone works in exactly the same way:
>
> http://www.icann.org&search=tld&type=all@3349551349/tech/rootzone/db.root

I'm not sure if you're lacking clue() or are trying to be funny but there's
no reason to trick people into using the non-ICANN approved osrc zone file
on accident.

Yes, you're right. I'm sorry, I was just trying to be funny. I had a clue() once but the wheels fell off.

Personally I use their root zone but I woudln't ever coerce someone else
into doing it.

Coerce? Never! You must be thinking of the IAB (RFC 2826), ICANN (ICP-3) and the BIND authors (ever seen a BCP32-example root zone in the distribution)?

I sincerely apologize for confusing anyone into thinking that the above root zone is representative of ICANN. The sum of ICANN, its many millions of dollars in "fees", its support groups, therapists, committees, and membership can be found here (please compare this file with the above ORSC "open-source" version):

ftp://rs.internic.net/domain/root.zone.gz

Best Regards,

Simon