Good Bye Nectarine
category: general [glöplog]
... so passwords were stored in plaintext?!
no idea, I guess only Yes could answer that.
the revenge of EP?
a french conspiracy?
well, i don't believe that yes hacked it himself, it's ridicoulous.
it's sad that oj is down :-(
a french conspiracy?
well, i don't believe that yes hacked it himself, it's ridicoulous.
it's sad that oj is down :-(
and nectarine dead :-(
and the domain recycled already
A really sad news :(
I find it a little suspicious that this new Bouquet a Croquer site has popped up so fast.
Were these guys waiting for the domain to free up and jumped on it automatically when Yes closed his account? Did they buy it?
Were these guys waiting for the domain to free up and jumped on it automatically when Yes closed his account? Did they buy it?
Quote:
Warning: mysql_connect() [function.mysql-connect]: Access denied for user 'bac'@'localhost' (using password: YES) in /var/www/souad/BOUQUET_a_croquer_cgv.php on line 5
Mysql connecting error : Access denied for user 'bac'@'localhost' (using password: YES)
i don't know anything (but i have to say something ;), i guess that bouquet site was already hosted on the same server than nectarine, as yes hosted nectarine at his work (webhost and webdesigner i think).
ok so it was hosted at work and it was all trashed
now the nectarine site is gone as well as the disclaimer but another site hosted by the company (as in "professional") pops up with the wrong domain name ?
this is becoming technically really embarrassing... :)
now the nectarine site is gone as well as the disclaimer but another site hosted by the company (as in "professional") pops up with the wrong domain name ?
this is becoming technically really embarrassing... :)
moreover the bouquet site was left unscathed during the hax?
If you visit http://91.121.44.178/ (nectarine.fr IP) it takes you to the bouquet site, suggesting that this is the default site on this server. It could simply be that the nectarine vhost was deleted and the server is now just serving up the default.
It's unusual for the default to be a customer site though, normally the hosting company claims it.
It's unusual for the default to be a customer site though, normally the hosting company claims it.
(this is assuming they even use name-based virtual hosting on this server)
The default site on the server of a certain female scener's site was actually a porn site. Hosted at the company of her bf. You can imagine the hilarity that ensued when her vhost had problems :)
i also have to say that nectarine has greatly filled some of my late evenings, so thanks a gazillion to all who contributed to this great scene site!
kb: that sounds embarrassing. It's strange since this Bouquet a Croquer also has www.bouquetacroquer.fr on 213.186.37.76. If you go to http://213.186.37.76 it bounces you to www.nectarine.fr.
Now I'm confused.
Now I'm confused.
I'm also confused about what shows nectarine.fr right now ..
fake?
big fake?
big fake?
and why should he fake something, gentlemen?
I'm thinking to organize a found rising during MAIN 2008 for Nectarine and take an amount of the tickets entries for it
Cybernostra : money is a false problem here. Nectarine is not supposed to cost anything, it could be hosted on any demoscene related website.
selling the domain?
i cant belive that he has no choice for get back the data...
so there are so many ways to do it
and the page is a fruity page.
so if the server already rund, the hacker does not have Root access to the machine, i think.
and where is the IP Address of the attacker?
actually, is it not so easy to kill a portal like this.
ad the last backup was from august - is one month
and thats should be enauth
i cant belive that he has no choice for get back the data...
so there are so many ways to do it
and the page is a fruity page.
so if the server already rund, the hacker does not have Root access to the machine, i think.
and where is the IP Address of the attacker?
actually, is it not so easy to kill a portal like this.
ad the last backup was from august - is one month
and thats should be enauth
Quote:
... so passwords were stored in plaintext?!
...