>United States of America. Except as permitted under the Copyright Act
>of 1976, no part of this publication may be reproduced or distributed in
>any form or by any means, or stored in a database or retrieval system,
>without the prior written permission of the publisher.
>1. Here is what the hackers are doing and how they are using your
>resources at your expense and your customers expense. Here is the
>starting point which got me to expose this million dollar loss to your
>company. News group servers were still listed in my browser after my DSL
>accounts were closed, showing closed accounts are accessible when they
>should be closed. Decided to click on my canceled ISPs news group
>server name, I just typed in my old account information and "viola",
>free news server access. How did I do this and why was I able to use my
>old account information when my accounts were closed months ago?
>Certain ISP representatives told me they cant remove the 10-20 free
>hours given with a DSL dial-up account. A major company should have the
>capability to shut this avenue down on closure of an account. I was
>able to dial into my canceled DSL ISP accounts using my canceled account
>information and use your service for free, for as long as I wanted,
>seemed like forever with no end. Revenue given away for free. So all
>these DSL closed accounts are being used freely by a number of hackers
>via dial-up access. Are you aware of this? Dont you care about the x
>amount of dollars given away daily? Lets say 50,000 hackers using
>these accounts daily for free. This is a loss of $24 a month xs 50,000
>= $1.2 million a month, xs this by 12 months = $14.4 million a year
>loss in revenue. Estimated by the amount of attacks from a compromised
>system received on a daily, weekly and monthly basis.
>2. Many ISPs provide 10+ hours of free dial up access for their DSL
>customers. The only time dial-up would be used is on business trips when
>traveling. Has your company done a study on business customer and time
>utilized? Company policies show that security is not used in cases of
>closed accounts. With a number of ISPs there doesn't seem to be a time
>limit on the usage of these already canceled DSL accounts. Because of
>this lacked security, hackers are having a field day with your customers
>by using obsolete accounts which identifies the previous owner doing
>wrong. Previous owner unaware that hackers are using their old account
>information and all vital information that only the customer should know
>and have. Its a free for all with the customer libel for any wrong
>3. All DSL customers-business and non-business with dial up access are
>vulnerable to a number of hackers using this free dial up avenue. Since
>the hackers already know the email addresses? and passwords, they log
>into the ISP with actual real accounts and continue to use this free
>avenue at your expense and your customers expense.
>4. This is pertaining to emailing your company any information an
>individual has about your network possibly being compromised, open
>relays or any evidence in nature. A few companies need to understand
>how the SMB Relay Man-in-the-Middle (MITM) works. On a compromised
>system, the SMB Relay MITM directs all email sent to the hackers servers
>instead of the intended address it is supposed to go to. So any
>pertinent information the victim were to email to your company would
>never reach you. My suggestion is to have a victim snail mail you a
>copy of the evidence in any form, since this would be the only way you
>would ever receive any information.
>The reason this is being revealed to the "WORLD" is because of the
>malicious activities of the below ***s.
Self admitted misuse of others systems, or so you purport?
You are truly a moron!