Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Security Education

Disclosure of Major Software Exploits by Students? 503

school-hacker asks: "I am a U.S. university student who has recently come across 2 remote exploits for a homework program used by colleges nationwide. Both vulnerabilities allow students to give themselves arbitrary scores, and possibly execute arbitrary code. To further emphasize the scope of this vulnerability, I have written and -selftested proof-of-concept exploit code. Naturally, I want to share this information with their software engineers, and would even be nice enough and suggest a means to fixing it. However, with the state of current intellectual property and reverse-engineering laws, I hesitate to do so out of fear of litigation or academic disciplinary action. As an ethical geek, what do -you- do?" While the responses from an earlier story might prove useful, here, there is always the possibility of the university making things harder for the person reporting the problem. How can students avoid both legal and academic trouble, when trying to notify their university of security problems?
This discussion has been archived. No new comments can be posted.

Disclosure of Major Software Exploits by Students?

Comments Filter:
  • by ramzak2k ( 596734 ) * on Thursday August 07, 2003 @09:41PM (#6641359)
    be an Anonymous Coward for a day!

    still better, post the expolits here , we will make sure they come to know.
    • Re:the Slashdot way (Score:5, Informative)

      by The Old Burke ( 679901 ) on Thursday August 07, 2003 @09:58PM (#6641494)
      Or use husmail.com
      Send the mail with exploit to abuse/contact/CEO@companywithexploit.com
      Tell them that you will release the exploit within 30/60/90 days on Bugtraq, Freenet and Slashdot unless they fix it.

      Make sure you also send the mail to:
      -Local/regional newspapers.
      -The school/school council/principal/teachers/newspaper.
      -Local government official(s).

      If they don't fix the shit after this, release the exploit *anonymously*.

      • by reynaert ( 264437 ) on Thursday August 07, 2003 @10:14PM (#6641594)
        Make sure you also send the mail to:

        -Local/regional newspapers.
        -The school/school council/principal/teachers/newspaper.
        -Local government official(s).
        Err, don't do that, unless as a last resort, if they don't fix the bug months after you've posted the exploit to bugtraq. You want them to fix the bug, not to sue you. Also remember you'll have to give up your anonimity before any of those three groups will listen to you.
        • Sending notice to third parties is INSURANCE. What local paper wouldn't love a feature story about the local school screwing over a smart, observant student who was only trying to help them? Sure beats covering the local dog show... again. This goes double for the STUDENT paper.
    • Release it to the public, anonymously.
      The problem will solve itself. :)

  • by Anonymous Coward on Thursday August 07, 2003 @09:42PM (#6641365)
    and help college students across America 'correct' their grades.

    Allah thanks you.
    • Remember the Kobayashi Maru? The no-win scenario?

      Kirk cheated.

      That's what I suggest be done here. If we can re-program the simulation to come out on top, I see no reason why we shouldn't get a commendation for original thinking.

      Kirk didn't like to lose. Neither should we.
  • Anon (Score:4, Interesting)

    by Rosonowski ( 250492 ) <rosonowski&gmail,com> on Thursday August 07, 2003 @09:42PM (#6641371)
    Your best bet is to do something similar to what you have done here. Submit the information to them via an anyonymous channel, perhaps mailing a CD (which you handled using gloves, no less) with an explanation and machine-readable exploit code. You don't have to make it known that it was you, just that someone figured it out.
    • Re:Anon (Score:5, Funny)

      by gfody ( 514448 ) * on Thursday August 07, 2003 @09:55PM (#6641464)
      don't forget to include a hefty ransom, and instructions for where to leave the money in exchange for the "master" copy of the code. remember, no cops.
    • What is the goal? (Score:5, Insightful)

      by lpret ( 570480 ) <lpret42@NOspAm.hotmail.com> on Thursday August 07, 2003 @10:56PM (#6641819) Homepage Journal
      I would argue that there are several answers depending on the poster's goal. Is he interested in working for Blackboa...I mean, the software he is discussing (and/or any other company) and wanting to show his prowess? Or is it truly out of the kindness of his heart? Regardless, I would completely bypass the school. Contact the software company directly as they understand the issue better. It would be your luck that a random administrator at your school would hear about this and label you a h4x0r and a menace to society -- remember that people hate what they cannot understand.
      • by Czyl ( 696277 ) on Friday August 08, 2003 @01:25AM (#6642545)
        I concur wholeheartedly with the parent and caution you to be extremely cautious in going about this correctly. I work as a student lawyer of sorts at a major US university and defend students involved in disciplinary/judicial incidents with the university. Last year I represented a student who was ultimately expelled for exploring (not exploiting) severe security vulnerabilities on a campus library network with an eye to pointing out to someone higher-up that the school had massive holes in its architecture. Bureaucratic admins and faculty are hard-pressed to understand that the way to check system security is to carry out the same probes a h4xj0r would. My recommendations: 1) Cover your back. Document what you are doing and notify someone you trust (a faculty member in the CS department would be great) about your plans and benign intentions. 2) Contact the -company-, not the school, and notify them that you'll be issuing the exploit to BugTraq within a set time frame if the bug isn't corrected. Don't let your school even find out about this if you can help it. No need to be anonymous when contacting the company. They oughta thank you, really. 3) Publish the exploit on Slashdot unless the company specifically tells you why they cannot correct the problem during the set time frame. You don't even need to be anonymous. Legal action against security whistleblowers ought to be illegal, but at least here /.ers will die by the hundreds to defend you.
  • Give Yourself an A (Score:5, Interesting)

    by FreeUser ( 11483 ) on Thursday August 07, 2003 @09:43PM (#6641375)
    ... You've earned it. :-)

    Seriously, I'd take this slow. Perhaps writing something up in printed form and submitting it via snail mail would be smarter than having executable code lying around on a computer you own or have access to.
    • by Johnny Mnemonic ( 176043 ) <mdinsmore&gmail,com> on Thursday August 07, 2003 @09:53PM (#6641456) Homepage Journal

      Since you've done work for someone else--that they should be willing to pay for--I would argue that you should be compensated. However, I would also recommend legal counsel as to how you can present this offer without it sounding like extortion. And, even if you're willing to give it away, I would still seek said counsel--consider charging the application manufacturer only enough to cover your counsel.

      I would watch it, because you could certainly get into legal trouble--I believe that the Russian hackers mentioned a while back only wanted to work in IT, but made clumsy attempts to break into the field. It's easy to take a genuine offer as an extortion, although I think by rights you are due compensation.
      • As far as legal counsel goes, I think it would be both cheap (and kinda funny) if you use the free legal advice offered by the campuses themselves to determine a course of action.

        Nearly ever campus has free legal advice for students consultation.
      • by bigsteve@dstc ( 140392 ) on Thursday August 07, 2003 @11:50PM (#6642112)
        Don't attempt to obtain compensation!
        • As the previous poster said, an attempt to solicit compensation from the software vendor for "work done" could constitute attempted extortion, and as such could be illegal.
        • Even if you do this in a legal way, you stand a good chance of being portrayed in the media as an evil money grubbing bastard.
        • If you get branded as evil, other people who are looking for a exploits as a genuine public service will also tend to be "tarred with the same brush". That is likely to put them off doing this important work, which would be a BAD THING!!
        If you are nervous about the whole position, your best bet is to inform your school. (Do it in such a way that you don't give them any evidence they could use against you until you know that they will treat you fairly.)

        Your school has a vested interest in not having students hack the marking software they use. They won't want their grading schemes to be publicly called into question. They should also have the resources to deal with the question. If they decide to ignore the issue, they may get into legal trouble later on when they are sued by ex-students whose degrees have been "devalued".

    • by reynaert ( 264437 ) on Thursday August 07, 2003 @10:09PM (#6641560)
      Don't ever change your score, even if you give yourself a lower score, even if it's just for a demonstration. Any university will go berserk if a student does that, even if he acts in good faith.
    • How much would ppl pay to change a D to a B? Can you find everyone who got a D?
    • by shmert ( 258705 ) on Thursday August 07, 2003 @10:55PM (#6641818) Homepage
      No, give your arch nemesis an A+++ 150% average, then sit back and watch. Everything will sort itself out nicely.
    • by the_ed_dawg ( 596318 ) on Friday August 08, 2003 @12:50AM (#6642404) Journal
      Congratulations! You've just committed a major academic honesty offense! Do not pass go. Do not collect $200... and for damn sure, do not collect your diploma.

      Keep in mind that although you may not get caught, you might get even worse than caught. Any reputable college will likely set up an expulsion hearing for academic fraud. Even worse, in my home state (Arkansas), it is a class D felony to modify academic records at a higher institution. Actually, they busted a couple of people working in the transcript office for altering grades last fall at my college. w00t! H4x0r5 uN1T3!

    • by rf0 ( 159958 )
      I agree here. We know your heart is in the right place but other people might not see it like that. ASs long as yo udon't care about the fame and the glory just make them aware of it then move onto something else

      Rus
  • like the big boys (Score:2, Insightful)

    by Anonymous Coward
    duh : anonymous email with a threat to go public.

    Like the big boys do it.
    • by Archfeld ( 6757 ) *
      Have you NOT figured it out yet...THERE IS NO ANONYMOUS on the net...sorry guys, I assure you SOMEONE has logs, your ISP the border routers along the way, If someone, say the government or a deep pockets corp wants that, they will pull an RIAA and get it...If you want to REALLY be anonymous go to the library, use a type writer, send a snail mail from another zip code and DON'T go into the post office to do it...otherwise just get a business license and approach them as a LICENSED contractor with a proposal
      • by MillionthMonkey ( 240664 ) on Thursday August 07, 2003 @10:29PM (#6641678)
        Living in a police state doesn't have to be oppressive- it can be fun-pressive!

        The Internet offers no anonymity. So just print out the code on a locally connected printer (not a network printer). Wait until nightfall, then go to a conspicuous area on campus that is free of security cameras. Buy a can of spray paint (NOT online- that would be stupid!) and spray the working exploit code onto a wall of a building.

        Be sure to provide comments and please make sure the code compiles before you spray it.

        Then go home and throw your computer into a vat of nitric acid. And that's that!

      • Sure there is, do it like the spammers do -- find an open SMTP relay somewhere in China or Korea, and send it through there.

  • What to do (Score:4, Insightful)

    by tugfoigel ( 80286 ) on Thursday August 07, 2003 @09:43PM (#6641378)
    You could always try approaching your advisor or some other trusted faculty member.
    • Re:What to do (Score:3, Insightful)

      by Phattypants ( 469233 )
      Indeed, if you trust a faculty member implicitly you should approach them about it. Not just any faculty member now, go to one in the CS department or your equivalent. Another option would be to speak to someone who actually deals with campus network security, as they too will have a good deal of clout with the administration.

      Take it from someone who has been a computer lab assistant, technician, and web developer successively (that'd be me). IT faculty are pretty receptive to this kind of thing.

      Now if
  • by James A. A. Joyce ( 681634 ) on Thursday August 07, 2003 @09:43PM (#6641380) Journal
    ...anonymity is the key. My crystal ball (i.e. an application of Murphy's Law) states that if you try to formally inform the universities of the flaw, you'll get hushed up, blamed and generally blusted. Just write anonymous letters to the companies who develop the software and the universities about the problems. If they don't take action, then feel guiltfree about giving yourself arbitrary scores. Remember: if you don't get caught, it's not illegal.
    • by BJZQ8 ( 644168 ) on Thursday August 07, 2003 @10:01PM (#6641514) Homepage Journal
      I used to work for a school district that had major security problems with its grading system. They would tape passwords to the bottom of their keyboards...and put files with lists of teacher passwords in a publically-accessible folder on the network. I attempted to tell my boss (who was getting paid $80,000 per year) about all of this, and was basically told it was not a big deal. I watched a student change his grade from D to B...and nobody ever knew. I told a few more people and was basically told to shut up...and I could feel their eyes turning to me as the problem. So I shut up...and it continues to this day. Just remember that with ultra-conservative computer administrative nazis, the nail that sticks up gets beat down.
  • The best approach to a security "evaluation" is to ask the admins responsible for permission first. This lets them know that "something" might be going on soon so if they detect your attempts they won't panic and send the cops to your house/dorm room.

    This also makes it obvious that you were really trying to help find/enhance security rather than just hacking into the system for your own benefit.
  • by kisielk ( 467327 ) on Thursday August 07, 2003 @09:44PM (#6641391)
    You send me the code.. and I will "examine" it to see if it would be legal. I'll get back to you about it after next semester? :D
  • Blackboard (Score:5, Informative)

    by zerocool^ ( 112121 ) on Thursday August 07, 2003 @09:44PM (#6641393) Homepage Journal
    This is probably having to do with "blackboard" software, i.e. learn.vt.edu [vt.edu].

    This software tries to be everything to everyone, and all most teachers use it for is posting grades.

    It doesn't surprise me that there are bugs in it, though. There have been several show up on astalavista.box.sk, and those were fixed, but the design of the program doesn't strike me as being particularlly sound.

    ~Will
    • if blackboard (Score:3, Insightful)

      by ramzak2k ( 596734 ) *
      if it is about this blackboard [blackboard.com] software portal then it is a significant finding. The code is java based and i havnt come a lot of exploits for java based architectures.
    • by Mobster75 ( 234793 ) on Thursday August 07, 2003 @10:26PM (#6641661) Homepage
      Sure, it's probably Blackboard which most colleges use, but if it's not Bb, it could also be Banner by SCT which plenty of schools also use.

      Compromising Banner is far more dangerous than Blackboard (Bb).... Most schools that use Banner use it as their student management system, which records official transcript, program requirements met, class registration, etc. etc.

      In my last undergrad semester, my team developed a website that interfaced directly w/ the Banner system and even found some loopholes in it which we exploited to allow our website to do a better job at calculating program requirements met and suggested offerings to complete it. (This was for an Advanced Software Project Mgmt class)

      Needless to say, the Registrars office people were very intrigued by our exploration into the limits of the current system. I imagine a less cooperative school administration would be more punitive.. (But I went to a business school, so they know we just get motivated by $$ ;) )

      • by calethix ( 537786 ) on Thursday August 07, 2003 @11:42PM (#6642078) Homepage
        I've found what I would consider security issues in Banner's web products before. Stuff that if you pass the correct variables to it, will display information from the database without doing any kind of user validation.
        To understand the issue, you have to know that it uses Oracle Application Server which basically lets you execute packages in the database. All of the main web packages do user validation but some of them call other packages to display the content of the page (which don't always do validation).
        So, if you know what variables to pass to said packages, you can bypass their security. SCT told me that since those were only supporting packages, they were functioning properly and they wouldn't do anything to change them.
        Granted, you have to have a pretty in depth knowledge of how their web products work but that's a good number of employees at any school using Banner. We have access to all of the package/program source so we can customize it for our university's needs.
        Oh well, I've ranted about SCT enough. :)
        What was funnier though was when I discovered that our database had execute any procedure granted to public, i.e. the web user. That essentialy opened up any database procedure to be executed by an anonymous user via the web. I think that one was our fault instead of SCT's and it was fourtunately taken care of fairly quickly.
    • One of my best friends is one of the lead programmers for blackboard. So I would like to extremely biased, and tell you that it can't be Blackboard that has issues!

      Can't we blame this on Microsoft somehow instead?


  • by GoofyBoy ( 44399 ) on Thursday August 07, 2003 @09:45PM (#6641399) Journal

    Find someone who will or is better able to the local student newspaper.

    Grab a reporter, show him it, let him follow up.
    • by reynaert ( 264437 ) on Thursday August 07, 2003 @10:04PM (#6641536)

      And you'll wind up with a very freaked out administration. What you want to do is to bring the problem to the attention of one of the techies that run the system, they might react sanely.

      What's even better is to send the developers an anonymous bug report (not from a university IP etc.), and, if they don't react, to BugTraq or another security list.

      You might also want to wait until you're graduated :)

    • That's exactly how Stefan Puffer got indicted in Houston Texas last year. He provided a demonstration of an insecure county wireless system in front of a newpaper reporter and a county IT employee. He was later no-billed by the county but I'm sure his attorney's bill was a few $$$. -rick
  • What's in it for me? (Score:3, Interesting)

    by clovis ( 4684 ) on Thursday August 07, 2003 @09:46PM (#6641403)
    Goto a prof with your suspicions (but you don't know yet, how could you?) and get assigned to find out for one of your papers. You've already done the work, so it should be an easy grade.
    • Goto a prof with your suspicions (but you don't know yet, how could you?) and get assigned to find out for one of your papers. You've already done the work, so it should be an easy grade.

      Yeah, what he said. Do you have a prof that you respect & have a good relationship with? Hey, maybe thats a dumb question, but I went to a small school. Anyway, you can potentially turn it into a proof of knowledge in subject matter & get credit. Also, having a faculty member on your side should mitigate th

    • by Stuart Gibson ( 544632 ) on Friday August 08, 2003 @04:02AM (#6643074) Homepage
      get assigned to find out for one of your papers. You've already done the work, so it should be an easy grade
      And if it isn't, well, you know what to do.

      Goblin
  • I'd anonymously email the company that develops the software. Get a free hotmail account or some such and send them a full disclosure of the exploit with proof of concept code all in the body of a plain-text no attachment email.

    Hopefully it gets someone's attention, it gets patched, and admins at schools apply the patch. Will you get credit for your findings? No. Will you stand a chance at getting the hole fixed without any real fear of retribution? Yes.

    -----
  • Unfortunately (Score:3, Insightful)

    by interiot ( 50685 ) on Thursday August 07, 2003 @09:50PM (#6641431) Homepage
    Unfortunately the law is set up so that you're nearly as likely to get in trouble for reporting a problem as you are using it for personal gain, so from a cost-benefit perspective, one might argue that it's better to keep the secret for your own uses.
  • simple? (Score:5, Interesting)

    by jpellino ( 202698 ) on Thursday August 07, 2003 @09:51PM (#6641437)
    print it out 4x, put each in an envelope, no retutn address, send it to the provost, the IT head and the CEO and chief engineer of the company that makes this thing. demand nothing and tell them it's simply fyi. hard for four peop[le to keep a secret - you'll get action somewhere. keep a copy in case nothing happens. no harm, no foul. it's just doing the right thing for no gain.
    • Re:simple? (Score:4, Funny)

      by robi2106 ( 464558 ) on Friday August 08, 2003 @12:30PM (#6646446) Journal
      While mailing the letters, do not ever handle the paper with your skin exposed so there is no chance of your fingerprints or dna being deposited on the enveoples.

      Don't use your handwriting. Use a widly available laser printer, and a toner cartrige bought in a different state than the University involved. Purchase the envelope, paper, and toner cartrige with cash only. Do not keep any receipts.

      Mail the letters from a public drop box where no ATMs, drive up windows, or gas stations are near by so you don't accidentally get on a security camera. Mail the letters on a high volume day, preferable 4 days before a major holiday (Christmas, Easter, Mothers/Fathers Day, Valentines Day, Thanksgiving Day).

      In case a camera may catch you walking buy (never drive to the mail box), buy large baggy clothes you don't normally wear (with cash of course) and a wig / facial hair for your trip to the mail box.

      Destroy the clothes either by burning them far out of town in a campfire (don't drive near the cam fire, bury the ashes), or by throwing them away in separate dumpsters on seperate days of the week, in seperate towns (preferably towns that do not send their trash to the same land fill.

      If you take these precautions then you should be ok.

      That or just don't mail the notifications.

      robi
  • by meshko ( 413657 ) on Thursday August 07, 2003 @09:51PM (#6641438) Homepage
    you go to slashdot and brag about it.
  • Suggestion #1 (Score:5, Insightful)

    by sabNetwork ( 416076 ) on Thursday August 07, 2003 @09:52PM (#6641447)
    You choose a different nickname from "school-hacker" :-)
  • $.02 (Score:4, Funny)

    by Alien Being ( 18488 ) on Thursday August 07, 2003 @09:53PM (#6641455)
    Tell them that you know how to do it and refuse to give them the details unless they can provide you with federal, state and local documents guaranteeing that you, your friends, and your family will not be prosecuted now or in the future for any illegal activity relating to this exploit, exploits of other academic software, or exploits of any software relating to anyone who ever atended college or anyone who knows someone who attended college. Be sure to specify that Arab Americans cannot be excluded from these guarantees.

    Also demand that the school indemnify you against any civil actions. While you're at it, you might as well require a statement that no military action will be taken.

    Finally, offer them your consulting services at $500/hr, minimum 10 hours.

    Disclaimer: IANAL, BIPOOSD (but I play one os /.)

  • ...use it to your advantage, muhahahaha!
  • ...change your grade to give yourself an "A" in gym
    • I thought the idea here was keeping a low profile? God knows that anyone finding security holes in university software doesn't stand a snowball's chance in hell of scoring an A in gym. Think before you say these things, Mitch. Twenty points higher than me and he thinks a guy like that can ace gym?
  • As much as I would love to say go tell someone and show that there is a fault. Just the fact that you know about it might implicate you and make any of your marks in suspect. University bureaucracies are known for making stupid decisions.

    If you can send something anonymously then I think you have done what you can.
    Don't jepordize your future over a good deed.

    Also: what do you have to gain, aside from some kudos? You have far more to loose if someone takes what you do the wrong way.

    Remember: Good deeds
  • The standard way. (Score:3, Informative)

    by Popsikle ( 661384 ) on Thursday August 07, 2003 @09:54PM (#6641461) Homepage
    Being a member of the secuirty scene (not a very skilled memeber but im tryin! ;) ) The standard way would be to email the vendor. If you want to do it anonomously pm me and I can set you up a POP3 account ;) Briefly state the issues, and the holes, how the exploit works, and inform them that if no repsonse is made you will foward the exploit and the security brief to the proper mailling lists. It is law in California now that any security breach must be made public so just remind them of that. Normally they will repsond asking for futher details, foward them your proof-of-concept and again warn them if corrective measures are not made you will announce it publicly. It should result in a patch, in which case make your findings public with information on how to patch or where to obtain the patch for the software. If all communications fails there is the [FULL-DISCLOSER] and the [INCIDENTS] mailing lists. Again if you are worried about your school and/or IP laws the best thing would be to spoof an email to the lists (if it comes down to that) or use a Email account that your name IS NOT attached to. Most companies will thank you for informing them before going public, and It is the right thing to do =) Also try digging thru your AUP and TOS for the network at school, in there it may state some legalities about breaking into to systems, hacking, sniffing, ect. If all else fails, forward your finding to a trusted source, and have them take the actions required. Remember you are not required by any law to make your findings public, so if you really feel uneasy just forget about the whole thing.
  • You could always pull a frame up an have it look like a group of students pulled of the exploit. Or find someone that you really don't like, who doesn't like you, drop down your grades and accuse them of tampering with them.

    In all seriousness we live in such a paranoid culture that there isn't really a right answer that anyone can give you. It's nice to see that someone out in America has a conscience but my paranoid mind is telling me that if a student came over and told me that there were exploits in the
  • I'm not a student anymore, and I could give a crap.. My company could use the press. go to my web site (in my sig), my address is listed. (424 S. Division Chenoa, IL 61726) send me a CD via snail mail, I'll copy it, destroy the original and contact the company in question.
  • Consult your AUP (Score:5, Interesting)

    by rainmanjag ( 455094 ) <joshg@@@myrealbox...com> on Thursday August 07, 2003 @09:57PM (#6641485) Homepage
    Most universities have well published an Acceptable Use Policy. Before making any disclosures, become intimately familiar with this document. As long as you've done nothing to compromise this document, you should be on safe ground.

    What would be their concern in punishing you? To dissuade every wanna-be cracker on campus from poking around the innards of the computer network. Though we all know security through obscurity does not work, your school does not want everybody trying to eliminate that obscurity.

    When you compose your statement of disclosure, include a statement which argues for your concern and your compliance with the AUP. Cite it, quote it, and argue for your concern for staying within the published regulations of the University. So long as you have not used this exploit to your advantage and so long as you show concern for the things they are concerned about, you should be fine.

    -jag
  • Three things (Score:5, Interesting)

    by Shoten ( 260439 ) on Thursday August 07, 2003 @09:59PM (#6641498)
    One, don't notify the university directly. If you do, you create a political situation where they still have the ability to shut you up by putting pressure on you. Keep in mind, the university wouldn't make life hard for you because they're run by Darth Vader, they'd make life hard for you to keep you from disclosing.

    Two, do notify the vendor, BUT use the disclosure guidelines provided by Rain Forest Puppy (called RFPolicy). This is the best template for fair and equitable disclosure I've ever seen, and I feel it's even a hair better than the policy put forth by @Stake (although theirs is pretty good too). Set up a hushmail account that cannot be traced back to you for this purpose, and proceed from there.

    Three, do NOT disclose the proof-of-concept exploit code. Disclosing a vulnerability is enough, there is no reason to automate attacks that take advantage of it.

    By the time the university knows anything, they will no longer be able to accomplish anything by making your life hard. Furthermore, you will be in a position of strength, having taken the high road in disclosure and given all parties every opportunity to protect themselves properly.

  • by burtonator ( 70115 ) on Thursday August 07, 2003 @09:59PM (#6641500)
    I had this problem a while back with java.sun.com.

    They were running a comment system that did server side includes. The URL pattern was

    http://java.sun.com/foo.jsp?url=relative/path.in c

    The obvious hack would be to enter a file: URL and see if it worked and sure enough I could browse through the whole file system as long as I knew the path.

    Stupid Java engineers.

    Anyway... I contacted a few VPs at SUN and just told them that I had discovered a severe security hole in their webserver and that because of the DMCA I couldn't report it.

    They were quick to respond telling me that they WOULDN'T prosecute if i were to give them the security disclosure so they could fix the issue.

    Most people won't care as long as you are white hat. If they freak out then don't reveal the information

    Kevin
    • by Anonymous Coward
      They were running a comment system that did server side includes. The URL pattern was

      http://java.sun.com/foo.jsp?url=relative/path.inc


      I'm not sure if this was the case here, but this can be far more dangerous in some cases, since you can do off-server includes (in PHP at least).

      This means you couuld do something like:

      http://java.sun.com/foo.jsp?url=http://www.hax0r- s ite.com/mycode.inc

      And it would execute "mycode.inc" on their server, meaning you could run *arbitrary* code on their server.
    • Been the coder (Score:3, Interesting)

      by phorm ( 591458 )
      I accidentally left a hole like this on a server I was working with once. I'd actually had checks to ensure such a thing didn't happen, but disabled then when I was debugging and forgot to uncomment the code (dumb dumb dumb). Luckily, that particular server didn't have anything overly special, though the ability to view users in the passwd file (which contained fullnames) was annoying.

      I must say that I greatly appreciated when somebody informed me of the hole, though I felt like an idiot afterwards. Not e
  • so be careful. Maybe you better just send them 699.99 right now to cover yourself. Then you'll be free to do what you want with it, without the fear of litigation.
  • by linuxislandsucks ( 461335 ) on Thursday August 07, 2003 @10:00PM (#6641506) Homepage Journal
    Here is some advice..

    Remember you wil be dealign with two or three groups that have different motives for their existence; ie IT group of your college, college Management, and the software vendor...

    You do not have enough power or pull to report this on your own and should not do so as it woudl put your college studies in danger, head this warning!

    Waht you need to do is find a tenured CS faculty member that will be a guinea pig fro a blind computer experiment..blind in that he or she does not know ahead of time the directions you will be giving..

    The directions must be in the form of question of:

    Waht happens if I do this what will occur..in other worsd you are leading the faculty member on the trail of discovery..

    Once they get to the end its is then their responsibility fo reporting the security hack and thus your college studies are protected..

  • by russotto ( 537200 ) on Thursday August 07, 2003 @10:01PM (#6641511) Journal
    If history is any guide: They aren't going to take you seriously unless you release a working exploit. If you tell 'em about it they'll just try to silence you with threats -- and then you can't choose anonymous release, because they'll go after you.

    If you release the exploit anonymously, you'll get things fixed. If you release it with your name attached, you'll get things fixed and bring a shitstorm down on your head -- your choice if you want the notoriety and its consequences.
  • And packetstorm, of course.

    -Adam
  • by Ryan Amos ( 16972 ) on Thursday August 07, 2003 @10:01PM (#6641517)
    You should forget about the whole thing. There is no good that can come of this. I understand wanting to be a good samaritan and all, but some people just don't take kindly to that. Considering the risks here (if the company gets pissed off at you, you end up with a computer crimes charge on your record and are basically blacklisted from the industry) I'd say you should delete any copies of any proof-of-concept code you have and forget about the whole thing. Either that or sell it to a fraternity or the football/basketball program at your school.. I'm sure they'd LOVE to get their hands on something like that.
  • by Dragon218 ( 139996 ) on Thursday August 07, 2003 @10:01PM (#6641518) Homepage
    I need to pass this semester. Don't ruin this for me.
  • by BelugaParty ( 684507 ) on Thursday August 07, 2003 @10:03PM (#6641533)
    Maybe I'm completely nieve, but what the hell is going on?! Has everyone on slashdot hacked or cracked some 31337 prog/dbase/bank ... Why is anonymity supposedly the best policy?! As long as you haven't changed your grades or exploited code (your teachers/the school will be able to tell) then you'll be fine. Are you afraid of getting busted for something else? I mean, it seems completely rational to e-mail the company, print a copy, mail it to yourself (if you are as paranoid as everyone else) and then, if problems arise, mail the university.

    Remember: The university cares about a student paying 20k+ a year to be there, the software company is costing the U money, who would they rather attack?

    Anonymity is for spammers. You'll probably get some recognition in the CS department if you say something about it... unless your teachers are all secretly black hat, and hate your guts for exposing yourself .. :P rediculous
  • by PseudononymousCoward ( 592417 ) on Thursday August 07, 2003 @10:05PM (#6641538)
    Is there a professor that you know well enough to approach about this? I would tell them the facts and ask them what to do.

    It is highly likely that they will be willing to approach the PTB about the issue--leaving you entirely out of it. At most universities, such a software vendor won't try to get your identity from a prof, they know where their bread is buttered.

    If all else fails, drop me an email at roberts period six-two-eight period osu period edu. I'm a prof at Ohio State and I'll be happy to lend a hand.

  • by MalleusEBHC ( 597600 ) on Thursday August 07, 2003 @10:06PM (#6641545)
    A lot of people here have advocated alerting people about this anonymously. Whether or not you feel this is the correct thing to do, consider including a PGP public key with whaterver submissions you turn over to relevant parties. This way, if it becomes advantageous at a later time to take credit for your actions, you can prove that you were the anonymous whistle-blower.
  • Leverage this to make Microsoft release a Linux client for the Xbox!
  • by JRHelgeson ( 576325 ) on Thursday August 07, 2003 @10:11PM (#6641573) Homepage Journal
    This is a debate that has been taking place in the security industry for some time now. Does Full Disclosure hurt or help the industry. I am of the position that full disclosure helps.

    If bugs are kept secret, the secrets get held in the hands of the few. The unethical hacker [cracker] will eventually exploit the code and use it to their advantage.

    If it weren't for FD, we'd have more 0day exploits because companies would not feel the pressure to release timely updates. It chews up development cycles to go back and put an emergency fix in place for insecure code, test it, and release it. Do you think companies would do this voluntarily? I think not. Too expensive. They'll include it with their next major update and charge for the upgrade or some crap like that.

    I say the medicine is bad, but the disease is worse. Full Disclosure is the Medicine, bad coding the disease.

    We are going to continue down this road of FD debate until software vendors (M$ et al.) start writing secure code. I have said it many times; Requiring patches to achieve security is fundamentally flawed. Coders need to write secure code. The onus is on them. Don't blame the hackers/crackers for airing their dirty laundry. If M$ or whoever loses market share because they consistantly release insecure code that is repeatedly being compromised then that is their fault.

    It was only after being repeatedly beat over the head with the proverbial lead pipe by the hacker community that good ole Bill Gates sent out a memo stating that Security is becoming Microsofts #1 priority. Do you really think he would have done that if we didn't have the Full Disclosure in place? We should not rely on 'security by obscurity' by keeping the exploits secret, or keeping the information reserved for the security elite.

    Send a confidential email to the network administrators and to the company that created the software. State that you will give them adequate time to respond and to release a patch. State that the exploit will undergo full disclosure in two months, or if they request extra time, ask them what measures are being taken to insure the integrity of the information being stored on these computers. If you can hack into the system to raise your grades, others could hack in to lower the hard earned grades of others. Hell, at that point, they should start selling diplomas at the bookstore.

    • Your assessment of Microsoft's interest in security is not accurate. Full disclosure did not cause microsoft to give a damn about security. Security became important at MS when customers started saying "we care about security, your shit sucks, we're not buying it anymore". MS doesn't give a damn about a bunch of egotistical self-serving "researchers" that are looking to sell their name as a brand and shop around for consulting dollars. Security is a priority now at MS because customers have finally said
  • by donscarletti ( 569232 ) on Thursday August 07, 2003 @10:15PM (#6641596)
    Well personally I would have cracked into the program, using the exploit and dumped the exploit, and a file explaining it in a conspicuous location. That's sure to get their attention!
  • by WasteOfAmmo ( 526018 ) on Thursday August 07, 2003 @10:17PM (#6641610) Journal

    I can understand wanting to cover your backside with this. Especially since you have 'tested' the exploit. Going to the university may mean the end of your academic career. Going to the company may result in the same in a round about way. The company may feel obligated to report you to the said university.

    If you are serious about getting the expoit fixed then there are a lot of good points already made in the replies:

    • Send it to the company anonymously.
    • Send it to the university IT dept. anonymously.
    Do both and that should get it where you want it to go.

    Now for my take on this (if you were one of my students)...

    You are supplying the source of the proof of concepts, right? I accept no binaries from unkown source, escpecially with your story. You have to convince me that you are not only legit. but being honest. If you approach me you had better be able to prove that you have not altered your grades. This is not due to my morals but due to my obligations to the university.

    I have dealt with students bringing up exploits to me that they have found work in our system. First I have to verify their claim, second I have to consider the damage they may have done (purposefully or not). If this means a call to security then I am obligated to do that. After that I have to consider fixing my system and damage control.

    Note about security: I need not bring security into it but I must document everything incase the incident becomes a concern in the future... Example, next year you suddenly become a honor student.

    A comment by 'has' bothers me... if this is you then you could be in deeper then you want to be... I would suggest cleaning up your act, taking an ethics course and getting on with your degree. This type of un-ethical, and probably illegal (fraud?) activity will eventually catch up with you if continued. Enough preaching.

    Take the suggestions regarding anonymous submissions if your serious about helping.

    Merlin.

  • A little late... (Score:4, Interesting)

    by JWhitlock ( 201845 ) <John-Whitlock&ieee,org> on Thursday August 07, 2003 @10:19PM (#6641621)
    I am a U.S. university student who has recently come across 2 remote exploits for a homework program used by colleges nationwide.

    Come across? Like you woke up one morning and found them in your mailbox, between credit card offers?

    Both vulnerabilities allow students to give themselves arbitrary scores, and possibly execute arbitrary code. To further emphasize the scope of this vulnerability, I have written and -selftested proof-of-concept exploit code.

    Now I'm thinking - did you have a legal copy of the software you were "testing"? If not, do you know the person/entity who has the legal copy? Did you get their permission to poke around?

    I would expect the litigation or academic discipline, if you pursued your experiment without a legal copy, or at least the permission of the person who owned the licensed copy. Or at least asked a professor to act as advisor for your experiments.

    As an ethical geek, what do -you- do?

    Ask permission from the target company before pursuing exploits.

    I may be reading too much into the poster's brief notes (or maybe the poster's name), but I have a feeling that there are several illegal (and possibly unethical) things that have been done so far. The best way to avoid a situation like this is to plan to be ethical, legal, and open from the beginning. Get the company's permission, the schools permission, etc., and no one will be suprised when you get some results. Otherwise, they may say "Thank you, now please come to court in two weeks", and you have little recourse except to hire a lawyer.

    Which the poster should probably do, anyway. It's a shame - with the proper authorization, this could have been an interesting senior project.

  • by Goonie ( 8651 ) * <robert.merkel@b[ ... g ['ena' in gap]> on Thursday August 07, 2003 @10:30PM (#6641682) Homepage
    I am a postgraduate student (hopefully) not that far away from finishing. I have been a casual tutor for years at two different universities; I am also on the board of a university-affiliated institution (an "academic college"). I've been involved in some very nasty catfights, so I've been around the block.

    If you decide to pursue the route of getting something done about it, I'd suggest:

    • don't even discuss the idea of a quid pro quo, be it monetary or academic. It makes you sound like you're trying to blackmail your university or the companies involved. Unless that's what you want to do, of course...in which case I hope you enjoy a short and unsuccessful career as a criminal.
    • Get somebody with muscle and who understands the situation on your side. A tenured academic who understands the technology and the geek ethic is ideal. If you don't know them directly, maybe a TA or another more advanced student that you do know directly will.
    • They may want it solved on the quiet. Will you be prepared to accept that, or do you want glory?
    • If it doesn't get solved, then you might consider taking it to the student paper. All journalists love a juicy story, and most student papers (if they've got enough editorial independance) love sticking it to the uni admins, so they are a good option. If that's not an option, there is the local media, but if it goes that far you really want help - you can never be sure which way a journo is going to spin a story, particularly one like this, and a professor sounds a whole lot more credible on TV than a scruffy college student. I know that's not fair, but that's the way it works.
  • by dallask ( 320655 ) <codeninja AT gmail DOT com> on Thursday August 07, 2003 @10:33PM (#6641700) Homepage
    Today I ran across 2-3 holes (cross site scripting with remote execution, sql injection with code exposure, and account hijacking) in the blackboard system which I am currently working to exploit... for a proof of concept. if this is the same system your talking about, I want to talk with you. maybe with enough amunition they will listen to the both of us more than they would listen to one.

    email me.
  • by Tracy Reed ( 3563 ) <treed AT ultraviolet DOT org> on Thursday August 07, 2003 @10:37PM (#6641719) Homepage
    Freenet Project [freenetproject.org]

    And then give yourself an A. :)
  • by Fantastic Lad ( 198284 ) on Thursday August 07, 2003 @10:42PM (#6641744)
    There has been a history of people being punished for doing the right thing.

    Yes, this is insane, but it's also how it is.

    --True, if you take the right approach, have the right kind of charisma, (ie, express honesty and even explain your concerns up front about how other people before you being punished for having done the right thing in the past,) you might be able to pull it off. I wouldn't count on it though. The sheep behind the glass are getting colder every day, and even a smooth talker like me has been really having to sweat in order to earn my best intentions. It's getting tough out there.

    So in this instance, and others like it, I wouldn't bother.

    And just to be clear, I wouldn't use the exploit either. --Chances are, if you do, you'll really end up in hot water. Indeed, I strongly suspect that some cases of these kinds of exploits are designed to discover those who are not sheep-like enough so that they can be flagged for later. . , uh, disposal. (Same goes for things like performing acts of geurilla advertising, and ad-defacement of particularly nasty posters and billboards around your town. That sort of thing is monitored.)

    --Which, of course, means that if you try in earnest to bring the hole in the code to the attention of the 'masters of the universe', then somebody, somewhere will be all pissed off with you for ruining their entrapment scheme.

    My advice? Sit tight. --The furthest you might want to go is to discuss it openly to anybody who cares to listen, saying you heard about it on the net from some anonymous coward. Wide open honesty is usually the best way to screw evil plans without bringing down reprisal and brimstone on your head. Works for me.


    -FL

  • DO NOTHING (Score:5, Insightful)

    by YetAnotherName ( 168064 ) on Thursday August 07, 2003 @11:01PM (#6641843) Homepage
    With the current political climate, your best bet is to do absolutely nothing. People are arrested for expressing opinions, others are denied due process for free speech, and still others are deemed terrorists for even the slightest questioning of a government's actions. Corporations mandate what can and cannot be done and are happily funded by a more sheepish and numbed people, armed with a more sheepish and willing set of so-called representatives.

    Do nothing. Sure, you can pat yourself on the back for your ingenuity, but file your discoveries away in your mind. The world cannot tolerate them now.

    Sad. But true.
  • Serious Suggestion (Score:3, Interesting)

    by Zork the Almighty ( 599344 ) on Thursday August 07, 2003 @11:23PM (#6641951) Journal
    This is a serious suggestion. Don't report it, just pick classes at random each semester and fail all the students in them. 10 or so should be enough. The administration will freak out, and they will get the company's attention for you. Use an anonymous remailer to tell the company where the problem is, but never release any exploit code.

    The fact is, with this sort of thing, the squeaky wheel gets whacked with a sack of doorknobs.
  • by The Revolutionary ( 694752 ) on Thursday August 07, 2003 @11:54PM (#6642131) Homepage Journal
    If you have done what I think you have, then you are quite probably screwed no matter what course of action you choose.

    If you do report the problem, the IT administrators will be obliged to perform a damage assessment. They will scan their logs for behavior possibly taking advantage of this exploit. That you say you have proof of concept code, and presumably have tested it, if IT discovers that you have so much as tried to take advantage of this or a related exploit, it will almost certainly result in your dismissal for that Semester, criminal charges, and possibly the end of your academic career.

    It won't help to go through a professor. If IT comes back and says that they have evidence that you tried to take advantage of the exploit (by 'testing'), you will not be spared, and the professor will either be unwilling or unable to protect you.

    If you do not report the problem, you risk IT discovering the exploit on their own or through a security update from the vendor, and similarly performing damage assessment to discover whether or not their systems or data have been compromised, or attempted to have been compromised.

    Don't scoff at this. If it is a significant exploit, and given that there is now a story on Slashdot about it, there is a significant possibility that IT will perform a damage assessment.

    Further, depending upon how you found or 'tested' this exploit, IT may find you out whether or not they realize or are alerted to the nature of the exploit.

    It is really up to you. Only you know the nature of your investigative activities and testing. If discovering these exploits required behavior which went beyond the normal use of the system, then you have a very serious problem.

    How do you explain why you were doing this in the first place? You can't, and quite honestly, there is almost certainly no excuse for it. If you were concerned about the security of the system, you should have gone through official channels to get clearance to look for vulnerabilities, and report the sort of investigative techniques you would be using, and do only this.

    If you have not done this, then you have one course of action:
    - Find out how long of a period IT keeps logs for. If you are a technically inclined, student, then surely you have aquaintences -- students -- who work in IT.
    - If the logs of your activity are gone, then you are in the clear. Report the vulnerability anonymously the next time you are off campus. Unfortunately, from the few academic IT departments I am familiar with, they keeps logs for a very long time, because of issues just like these.
    - If, on the other hand, the logs of your activity are not gone, then weigh the possibility of your activity being found out before the logs will be cycled or destroyed.

    If the logs will be around for months still, then you are quite possibly in serious trouble. If the logs will be around for a year or more, then you are almost certainly in very serious trouble.

    If you report your activities, then you are are almmost certainly in very serious trouble.

    Personally, I would go with the first option, and hope that your IT department will not perform damage assessment, or that they will not find out above the exploit until next semester, and will not be interested in logs from the previous semester, or perhaps from the previous academic year.
  • by gte910h ( 239582 ) on Friday August 08, 2003 @12:18AM (#6642251) Homepage
    You don't report this. Simply you don't. You are too vulnerable.

    After you graduate, if you want to report it, send hard copy source listings to admins of the system at the college, the company that runs the software, and several professors in the technical areas of your college. You then forget this and don't ever think of it again.

    Destroy the computer the harddrive the printout you had was created on. This is so you cannot be determined to have cheated at your degree if you ever DID get "located".

    I suggest wiping it with the software that PGP comes with then taking a road trip to celebrate graduation to a couple states away. If you're in California, visit Iowa. If you're in New York, I would have to say GA is nice in May. Leave it in a dumpster somewhere mixed in with nothing else of yours.

    I think in 10 years there will be a system of computer ethics, or a government board that you can report this stuff to with a condition of amnestey. Its all too new to too many people for that to work right now, so you just have to practice silence.
  • by augustz ( 18082 ) on Friday August 08, 2003 @12:21AM (#6642270)
    Stay anonymous. Do the COST-BENEFIT analysis (seriously).

    In this climate, you have everything to loose and very VERY LITTLE to gain no matter how cool you think it is.

    The school must follow no laws but it's own and can expell you, and I PROMISE you that somewhere somehow you violated their AUP or TOS.

    The vendor can sue you, and even if you beat them you are stuck with a HUGE legal bill.

    You can get some overzealous local DA trying to move up the ladder to take you on. If you don't have a lot of money you are a tempting target for obvious reasons.

    You need to understand the DMCA (and companies who file suit under it) claiming that attempts at circumvention are illegal.

    And what would you gain? I think you'd be surprised at how very little unless you want to work for a security company, and even then that is tough. Folks with hacking pasts are often radioactive in the IT world, and with big companies especially so. You'll have a very hard time getting a background clearance.

    I'd notify the vendor and some lists 100% anonymously (and not just spoofing an email). If they don't act in the reasonable time frame full disclosure and it will be sure to get fixed. You've done your part, with none of the baggage.

    You need to think through how limited the upside is. College kids love the challenge, and want to feel proud for doing the right thing. Commercial companies hate to be embarrassed, and will sic their lawyers on you if given half a chance.

    Blackboard already went down this route I think with some kid they sued to convince him that he hadn't found a vulnerability. Much of the business world does not particularly care about right and wrong, what they do care about is $$ and lawyers.

    College is wonderful, don't let it fool you.

    And frankly, given that the industry has forced through so many rediculous laws (UCITA anyone?), give them a fair 30 days but then go full-disclosure. What goes around comes around.
    • Stay anonymous. Do the COST-BENEFIT analysis (seriously).
      In this climate, you have everything to loose and very VERY LITTLE to gain no matter how cool you think it is.

      I agree with Augustz's post 100%. Use a public library (not the school's library, but the public library) to send an email from a free email service, and make sure the service is not in the US.

      Read about how Blackboard treated two students here [com.com] and see if you think reporting the problem is safe or not. In view of BlackBoard's past action

  • Contact Me (Score:5, Informative)

    by jsnider ( 194261 ) * on Friday August 08, 2003 @01:38AM (#6642603)
    I'm making the assumption that the software you found a problem in is Blackboard. I apologize if that is not the
    case, however, I would still be happy to take your discovery to the vendors of whatever software it is on your
    behalf.

    I work for a major university as the Blackboard programmer/administrator. I've been working on the
    Blackboard code for years, making substantial modifications to the Bb system to suit our university. I've found
    my share of bugs, problems, and more than one gaping hole. Blackboard is riddled with XSS, input validation, SQL
    insertion, replay, predictable sequences, and I'm sure countless other vulnerabilities. Quite frankly I'm amazed
    at how few breaches I hear about.

    I think you're right to be careful, but try to not get carried away. At least in our department, we're eager to
    hear about problems and fix them. We're not interested in ruining someone's college education. However, you
    should be careful about who you contact. At our university, the usual IT people are paranoid. You need to
    get as close to the people who deal with Bb as you possibly can. Contacting a suit in upper IT would likely get
    you the slapdown. Start lower. You're looking for the geeky programmer who deals with Bb all day long and would
    drop everything they are doing to fix a hole in their system.

    If you are not comfortable contacting representatives at your university, feel free to contact me about your
    discovery. This sort of stuff is what I do, and besides, I'm already on Blackboard's shit list. I have another
    issue to report to Bb, (the afore mentioned gaping hole) and I'd be happy to send your information along with it,
    with or without your name. jeff (somewhere near) jsnider.net
  • It happened to me (Score:3, Interesting)

    by mcrbids ( 148650 ) on Friday August 08, 2003 @03:40AM (#6642993) Journal
    Well, mostly.

    I was working on a site for a client, and discovered a vulnerability that was easily exploitable in a Credit Card interface for a large, well-known company.

    I sent details of the exploit, complete with working code samples to the company in a carefully written, detailed, email.

    About 2 weeks later, I got a phone call from a *very* agitated man who kept saying over and over: "it's not really a problem". I simply listened; I had nothing to say since it'd already been said. I didn't say anything, and he eventually hung up on one of the weirdest phone calls I've ever had.

    The vulnerability allows me to buy anything I want from any client site of said large, well-known company.

    So, speak your piece. Send the details to the company/vendor, along with full details, exploit code, everything you know. Make it clear that you are not going to publish it, or at least make clear the conditions that would make you feel it necessary to publish, and put the onus on them.

    I did, and I have a clear conscience.
  • Law School. (Score:3, Insightful)

    by Irvu ( 248207 ) on Friday August 08, 2003 @10:13AM (#6644527)
    If your College/University has a law school then you might be able to look there for advice. If the university has such a school then it is possible that they may have one or two professors who can advise you in this matter. Unlike the School's Legal staff they are not bound to protect the school in the same way.

    I would still be wary when approaching them, you don't want one of them to cause trouble any more than any other. But it might be a good direction to turn.
  • by wbav ( 223901 ) <Guardian.Bob+Slashdot@gmail.com> on Friday August 08, 2003 @10:41AM (#6644766) Homepage Journal
    Okay, so two stories, one from Jr. High, one from Highschool.


    In Jr. High, someone was giving out the admin password pass FoolProof (a mac protection software that was incredably simple to bypass at the time.) Anyways, I tried to inform the IT guy, and he blew me off, saying that I didn't really know the password. So I put on a little app that made the computer belch.

    Someone snitched, and I ended up in the principal's office. I tried to plead my case, it wasn't like I hadn't tried to do the right thing, and when they wouldn't listen I gave them something they couldn't ignore. Detention 4 weeks.


    I should have learned from my first experince but I didn't. In Highschool, the network was completely unsecure. You could print to any class room across the whole school district, and everything was named quite nicely. Once again, I was blown off when I tried to say this was a bad thing.

    Not only were all the printers there, but a number of computers were open with read access to everything. So I opened a network connection to every shared disk along the network and started a find for everything. The IT guy in the lab looked over my shoulder and asked what I was doing. Detention again, this time for "Slowing the hard drives down."

    If only more people got into trouble for changing the laws of phyics.

What is research but a blind date with knowledge? -- Will Harvey

Working...