These forums are CLOSED. Please visit the new forums HERE
JEVN Exploit! |
|
Aaron Levy
Medicated Lately?
![]() Join date: 3 Jun 2004
Posts: 2,147
|
12-15-2005 01:03
What are the alternatives to JEVN? I've seen a few around SL, but never really checked them out. Whoever has them sure ain't advertising them well because I've searched like crazy for them.
_____________________
|
Eata Kitty
Registered User
Join date: 21 Jan 2005
Posts: 387
|
12-15-2005 03:04
Is there really a corn field?
![]() The user password is a good solution and why I stuck to just that in my test release. You'd never be able to find out what someone elses password is unless there's a security hole in SL so you'd have to try and brute force it... through email! Sloooowww. |
Yumi Murakami
DoIt!AttachTheEarOfACat!
Join date: 27 Sep 2005
Posts: 6,860
|
12-15-2005 05:14
If I may take a soapbox for a moment, I must encourage everyone affected by this thread to replace their JEVN vendor with another author's rather than waiting for a patch.
Although I know it'll cost extra money, we really do not want to encourage the "rush out shoddy software to capture the market and money, THEN do the actual work and issue a patch" model of software development in SL. JEVN already have their money, but at least they can be knocked off their dominant perch on in-world visibility. Who knows how many secure alternatives were never developed because scripters wandering the grid saw JEVN already had the market taped? |
Moopf Murray
Moopfmerising
![]() Join date: 7 Jan 2004
Posts: 2,448
|
12-15-2005 05:27
Who knows how many secure alternatives were never developed because scripters wandering the grid saw JEVN already had the market taped? I know I knocked thoughts of doing one on the head for pretty much this very reason. A purely in-world one, that is. _____________________
|
nimrod Yaffle
Cavemen are people too...
![]() Join date: 15 Nov 2004
Posts: 3,146
|
12-15-2005 06:26
Is there really a corn field? ![]() Yes, I'll attach some pics, I feel like the children of the corn are going to get me! |
Eata Kitty
Registered User
Join date: 21 Jan 2005
Posts: 387
|
12-15-2005 07:05
There's at least two other network vendors off the top of my head, I don't think the market is really 'cornered'. Of course it's hard to tell if they are any more secure.
|
nimrod Yaffle
Cavemen are people too...
![]() Join date: 15 Nov 2004
Posts: 3,146
|
12-15-2005 07:07
Ok Mulch, this one is for you. It has the UI and the name of the sim, and of course, there are many ways around the no flying restrictions. Also, if you do a search for certian letters of the alphabet, you can also see who is suspended(at least, I think. There are some names that do show up, but there are very few.)
|
Sparkle Skye
Second Life Resident
![]() Join date: 27 Oct 2004
Posts: 1,016
|
12-15-2005 15:07
In a word.... yes. I have already pulled my JEVN servers and begun the long process of setting up a new system and have asked Esmay for a refund. I don't feel I can trust Carlos to not do something like this again and as long as he is working with Esmay on her system I will not use it. It's nothing against Esmay but I learned long ago if someone will do something like create and sell an exploit once they will do it again at some point. I really do not understand the reasoning and logic behind rewarding someone who stole from you, sold and or gave it to others to steal more. It is baffeling to me that he was given trust in the first place and action against him was not immediately taken. His involvement in any product makes it highly suspect and untrustworthy. We only have his word that he gave only 1 copy out, given his track record how reliable is that? _____________________
Beauty is in the eye of the Beholder...Always hold Beauty
|
Cristiano Midnight
Evil Snapshot Baron
![]() Join date: 17 May 2003
Posts: 8,616
|
12-15-2005 15:15
I really do not understand the reasoning and logic behind rewarding someone who stole from you, sold and or gave it to others to steal more. It is baffeling to me that he was given trust in the first place and action against him was not immediately taken. His involvement in any product makes it highly suspect and untrustworthy. We only have his word that he gave only 1 copy out, given his track record how reliable is that? I ask this again. Why are people still using this vending machine? This entire thing has been handled beyond poorly. An immediate update should have been created - it should not have waited while a new version was developed. If I were a customer, I would definitely demand a refund - though I doubt you will get one at this point. The only thing you can do is speak with your wallet by using a different vendor. Mistakes happen and security flaws are found - but how they are handled is the important part, and the ball was dropped here across the board, and some bizarre decisions have been made. _____________________
Cristiano
ANOmations - huge selection of high quality, low priced animations all $100L or less. ~SLUniverse.com~ SL's oldest and largest community site, featuring Snapzilla image sharing, forums, and much more. ![]() |
ZsuZsanna Raven
~:+: Supah Kitteh :+:~
Join date: 19 Dec 2004
Posts: 2,361
|
12-15-2005 15:43
I used to play a rather small cheesy monster killing game called The Realm. There was a person who was quite the hacker and the company actually hired this guy on to look at their code and make sure it was secure because there were some kiddies hacking into house/acct passwords and stealing. After I left I found out that the hacker they hired in had added his own undetectable coding to the system and stole a lot of things from a lot of people, deleted peoples characters they had made, some were years and years old, and then took down the game for over 10 days. D'oh!!
If you let a snake in your bed, you will probably get bit... _____________________
~Mewz!~
![]() |
Krazzora Zaftig
Do you have my marbles?
Join date: 20 Aug 2005
Posts: 649
|
12-15-2005 16:41
um you realize a few things here I hope:
A) Network administrators are "hackers" they have the same knowledge and access to tools that they understand as hackers do. They just protect us. B) Antivirus and "protection" software companies make it a normal thing to hire those that create viruses after being caught in order to harness thier "unique" talents. C) The best way to stop a thief is with a thief. Anyone in any security field is TAUGHT HOW someone does something wrong. The only question is morals/perception that make them "good" or "bad" D) A computer company release a computer that under certain conditions would take over 30 minutes to boot up from time of power button press. This would occur even right out of box. They released it and "tested" for 6 months before releasing a patch. Many of you probably own a computer by this manufacturer...company's name looks like "hell". On a personal level I applaud the "hacker" for a variety of reasons. A) He made a script that does something (True it was immoral to many but he did) B) He reported the information to the manufacturer of said item. C) He did not mass produce or hand out this item. (Imagine of W-HAT got ahold of this folks.) _____________________
|
Selene Gregoire
Eyes of the Wolf
![]() Join date: 14 Sep 2005
Posts: 681
|
12-15-2005 17:46
By Carlos' own admission he did SELL the exploit to at least one person. And he also admitted to GIVING it to another person other than Esmay, the creator of the vending system. So that makes at least 2 people other than the creator and himself that got the emulator. The one person who it was sold to started this thread. The one person it was given to has not said a word that I know of about any of this. We have no way of knowing what permissions were granted to this silent person and how many that person may have distributed.
As for your item D)..... No way in hell will I ever pay for one of those. I'll keep the ones built by my tech right here in my very own computer shop, tyvm. lol ![]() |
nimrod Yaffle
Cavemen are people too...
![]() Join date: 15 Nov 2004
Posts: 3,146
|
12-15-2005 17:51
There used to be a post that got deleted, about someone else hacking the system. They posted logs, and the person stole at *least* 40k worth of items, and that's a low figure.
|
Krazzora Zaftig
Do you have my marbles?
Join date: 20 Aug 2005
Posts: 649
|
12-15-2005 17:59
One or two is not that big of a concern trust me. Usually when hacks or cracks are given out we are talking about hundreds have accessed and used it. Again think about giving this to W-hat. I personaly WOULD give a hack to my friend...to see if they could reproduce it or I was bugged. Anyone here that does any kind of troubleshooting or beta testing will tell you a problem is not a problem till more then one person says it is. Otherwise it is a glitch.
_____________________
|
Kyrah Abattoir
cruelty delight
![]() Join date: 4 Jun 2004
Posts: 2,786
|
12-15-2005 18:31
well i would say to all the persons that are bashing Esamy to stop a bit she did a very good work on her vendor and she brought you good sales, yeah but i guess all the good is erased from air heads by a little exploit...
_____________________
![]() tired of XStreetSL? try those! apez http://tinyurl.com/yfm9d5b metalife http://tinyurl.com/yzm3yvw metaverse exchange http://tinyurl.com/yzh7j4a slapt http://tinyurl.com/yfqah9u |
DogSpot Boxer
vortex thruster
![]() Join date: 23 Aug 2005
Posts: 671
|
12-15-2005 18:35
There used to be a post that got deleted, about someone else hacking the system. They posted logs, and the person stole at *least* 40k worth of items, and that's a low figure. Allegedly. _____________________
Dogspot Boxer
Charter Member Of The Socially Inept Club Our Motto: We may be inept, but at least we're social |
Cid Jacobs
Theoretical Meteorologist
![]() Join date: 18 Jul 2004
Posts: 4,304
|
12-15-2005 19:13
B) Antivirus and "protection" software companies make it a normal thing to hire those that create viruses after being caught in order to harness thier "unique" talents. Yea, didn't they stop doing that in like the early 90's? Too many Haxxo4s movies! ![]() _____________________
|
Krazzora Zaftig
Do you have my marbles?
Join date: 20 Aug 2005
Posts: 649
|
12-15-2005 19:14
Yea, didn't they stop doing that in like the early 90's? Too many Haxxo4s movies! ![]() that and/or it almost became an easy way for hackers to get a job, etc. I know two of my friends got offered jobs and one was in 1995. _____________________
|
Cid Jacobs
Theoretical Meteorologist
![]() Join date: 18 Jul 2004
Posts: 4,304
|
12-15-2005 19:18
that and/or it almost became an easy way for hackers to get a job, etc. I know two of my friends got offered jobs and one was in 1995. I think the main reason it was stopped, was becase it *almost* gave people an incentive to hack. _____________________
|
Krazzora Zaftig
Do you have my marbles?
Join date: 20 Aug 2005
Posts: 649
|
12-15-2005 19:32
I think the main reason it was stopped, was becase it *almost* gave people an incentive to hack. that's what I meant. Sorry brain a tad fried...thinkit scrammbled in a car accidnet I had yesturday. *stupid snow* _____________________
|
Kristyn Muir
Registered User
Join date: 8 Jun 2005
Posts: 7
|
12-15-2005 19:40
I think I missed something.
Okay, so Esmay knew it was possible to build an emulator, and she began reworking everything. Did she actually know that it was being used to steal stuff and that it had been given out? or did she think there was only one in existance and that it was in a safe place? |
Kyrah Abattoir
cruelty delight
![]() Join date: 4 Jun 2004
Posts: 2,786
|
12-15-2005 20:09
i guess you should ask her
_____________________
![]() tired of XStreetSL? try those! apez http://tinyurl.com/yfm9d5b metalife http://tinyurl.com/yzm3yvw metaverse exchange http://tinyurl.com/yzh7j4a slapt http://tinyurl.com/yfqah9u |
nimrod Yaffle
Cavemen are people too...
![]() Join date: 15 Nov 2004
Posts: 3,146
|
12-15-2005 20:32
i guess you should ask her Ask her what?? |
nimrod Yaffle
Cavemen are people too...
![]() Join date: 15 Nov 2004
Posts: 3,146
|
12-15-2005 20:34
Did she actually know that it was being used to steal stuff and that it had been given out? or did she think there was only one in existance and that it was in a safe place? Yes to both, she knew someone had one (or many) and that they took things, but she still did not warn people. She knew that the creator had it, but he told her that he would no give it to anyone (which was not held true). |
Aurael Neurocam
Will script for food
Join date: 25 Oct 2005
Posts: 267
|
12-15-2005 21:35
um you realize a few things here I hope: A) Network administrators are "hackers" they have the same knowledge and access to tools that they understand as hackers do. They just protect us. B) Antivirus and "protection" software companies make it a normal thing to hire those that create viruses after being caught in order to harness thier "unique" talents. C) The best way to stop a thief is with a thief. Anyone in any security field is TAUGHT HOW someone does something wrong. The only question is morals/perception that make them "good" or "bad" D) A computer company release a computer that under certain conditions would take over 30 minutes to boot up from time of power button press. This would occur even right out of box. They released it and "tested" for 6 months before releasing a patch. Many of you probably own a computer by this manufacturer...company's name looks like "hell". A: access to tools is one thing. Creating and cracking systems is someting else. I can name a dozen network admins off the top of my head, but NONE of them are capable of breaking even minimal Windows 2000 or Unix security. B: TOTAL FABRICATION. The truth is, so-called hackers (the correct term is "crackers" ![]() C: Wrong, wrong wrong. The way to stop a thief is to think like a thief. Anybody who actually hires a socially irresponsible individual such as a cracker or embezzler to protect sensitive data would have their insurance policies cancelled. D: What does slow boot time have to do with hacking? There are many reasons to delay releasing an OS or BIOS patch, the most important of which is that you must make sure that you don't introduce new bugs while fixing the old ones. On the other hand, companies like Microsoft make commitments to try to fix security holes as soon as possible after their discovery. Microsoft often has patches available mere hours after the discovery of the vulnerability. _____________________
|