On Tue, 2015-04-07 at 12:28 -0400, m.roth at 5-cent.us wrote: > “It is the assessment of Linux Australia that the individual utilized a > currently unknown vulnerability to trigger a remote buffer overflow and > gain root level access to the server,” Hesketh wrote. > > The attacker installed a remote access tool and then botnet command and > control software. > --- end excerpt --- > > <http://www.cio.com/article/2906814/linux-australia-breached-personal-details-leaked.html> Its stupid and unprofessional to store personal data on a public accessible server when there is no current public requirement for that data. How do these people ever become 'konputar xperts' ? I would like to know what operating system was used and the method used to gain access. -- Regards, Paul. England, EU. Je suis Charlie.