{"id":14517,"date":"2019-02-07T04:30:14","date_gmt":"2019-02-07T12:30:14","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/02\/07\/news-8267\/"},"modified":"2019-02-07T04:30:14","modified_gmt":"2019-02-07T12:30:14","slug":"news-8267","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/02\/07\/news-8267\/","title":{"rendered":"Throwback Thursday: Pick a card, any card &#8230;"},"content":{"rendered":"<p><strong>Credit to Author: Sharky| Date: Thu, 07 Feb 2019 03:00:00 -0800<\/strong><\/p>\n<p>This conglomerate is structured as several smaller companies, with a big central IT organization plus individual IT groups in some of the companies, reports an IT pilot fish there.<\/p>\n<p>\u201cAn IT staffer from one of the companies loaded a password cracker and proceeded to crack the Windows NT servers,\u201d fish says. \u201cHe sent out emails bragging about how insecure NT was and giving the NT team a hard time.\u201d<\/p>\n<p>Fish isn\u2019t on the NT team, but he and his security co-workers decide to strike back on behalf of their colleagues \u2014 and they do it through the central IT audit group, to make sure it\u2019s all above board.<\/p>\n<p>First, they supply the audit people with a list of more than 100 Unix servers, and get them to pick a server at random. Amazingly, the audit group picks the only server on the list that belongs to the company where the NT attack originated.<\/p>\n<p>Fish and his cohorts proceed to crack the server wide open in front of the auditor.<\/p>\n<p>\u201cWe then looked surprised when we realized whose server it was,\u201d says fish. \u201cThey were warned for unauthorized hacking and they had to tighten their own security as well.<\/p>\n<p>\u201cWe also did a quick review on our servers and tightened things, but by doing this, it took the pressure off us.<\/p>\n<p>\u201cTo this day, the audit people know we set them up with the \u2018random\u2019 choice of servers, but they haven\u2019t worked out how we did it. And we\u2019re not telling \u2014 just in case we need them to select something randomly again.\u201d<\/p>\n<p><strong>Pick a true tale of IT life<\/strong> <em>from your own experience and send it to me <\/em><em>at <a href=\"mailto:sharky@computerworld.com\" rel=\"noopener nofollow\" target=\"_blank\">sharky@computerworld.com<\/a>. You can also subscribe to the <a href=\"http:\/\/www.computerworld.com\/newsletters\/signup.html\" rel=\"noopener\" target=\"_blank\">Daily Shark Newsletter<\/a> and read some great old tales in the <a href=\"https:\/\/www.computerworld.com\/search?query=+sharky&amp;s=d&amp;start=0\" rel=\"noopener\" target=\"_blank\">Sharkives<\/a>.<\/em><\/p>\n<p><a href=\"https:\/\/www.computerworld.com\/article\/3336021\/security\/throwback-thursday-pick-a-card-any-card.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Sharky| Date: Thu, 07 Feb 2019 03:00:00 -0800<\/strong><\/p>\n<article>\n<section class=\"page\">\n<p>This conglomerate is structured as several smaller companies, with a big central IT organization plus individual IT groups in some of the companies, reports an IT pilot fish there.<\/p>\n<p>\u201cAn IT staffer from one of the companies loaded a password cracker and proceeded to crack the Windows NT servers,\u201d fish says. \u201cHe sent out emails bragging about how insecure NT was and giving the NT team a hard time.\u201d<\/p>\n<p>Fish isn\u2019t on the NT team, but he and his security co-workers decide to strike back on behalf of their colleagues \u2014 and they do it through the central IT audit group, to make sure it\u2019s all above board.<\/p>\n<p>First, they supply the audit people with a list of more than 100 Unix servers, and get them to pick a server at random. Amazingly, the audit group picks the only server on the list that belongs to the company where the NT attack originated.<\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3336021\/security\/throwback-thursday-pick-a-card-any-card.html#jump\">To read this article in full, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[3919,714,10525],"class_list":["post-14517","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-hacking","tag-security","tag-windows"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/14517","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=14517"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/14517\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=14517"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=14517"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=14517"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}