<article>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#article10_03_02_199205</id>
	<title>New "Spear Phishing" Attacks Target IT Admins</title>
	<author>kdawson</author>
	<datestamp>1267521480000</datestamp>
	<htmltext><a href="http://www.infoworld.com/" rel="nofollow">snydeq</a> writes <i>"A new breed of <a href="http://infoworld.com/print/115086">'spear phishing' aimed at IT admins</a> is making the rounds. The emails, containing no obvious malicious links, are fooling even the savviest of users into opening up holes in their company's network defenses. The authentic-looking emails, which often include the admin's complete name or refer to a real project they are working on, are the product of tactical research or database hacks and appear as if having been sent by the company's hosting provider. 'In each case, the victim remembered getting a similar sort of email message when they first signed on with a service and, thus, thought the bogus message was legitimate &mdash; especially because their cloud/hosting providers keep bragging about all the new data centers they're continuing to bring online.' The phishing messages often include instructions for opening up mail servers to enable spam relaying, to disable their host-based firewalls, and to open up unprotected network shares. Certainly fodder for some <a href="//entertainment.slashdot.org/story/08/06/16/198246/Bone-Headed-IT-Mistakes">bone-headed mistakes on the part of admins</a>, the new attack 'makes the old days of hoax messages that caused users to delete legitimate operating system files seem relatively harmless.'"</i></htmltext>
<tokenext>snydeq writes " A new breed of 'spear phishing ' aimed at IT admins is making the rounds .
The emails , containing no obvious malicious links , are fooling even the savviest of users into opening up holes in their company 's network defenses .
The authentic-looking emails , which often include the admin 's complete name or refer to a real project they are working on , are the product of tactical research or database hacks and appear as if having been sent by the company 's hosting provider .
'In each case , the victim remembered getting a similar sort of email message when they first signed on with a service and , thus , thought the bogus message was legitimate    especially because their cloud/hosting providers keep bragging about all the new data centers they 're continuing to bring online .
' The phishing messages often include instructions for opening up mail servers to enable spam relaying , to disable their host-based firewalls , and to open up unprotected network shares .
Certainly fodder for some bone-headed mistakes on the part of admins , the new attack 'makes the old days of hoax messages that caused users to delete legitimate operating system files seem relatively harmless .
' "</tokentext>
<sentencetext>snydeq writes "A new breed of 'spear phishing' aimed at IT admins is making the rounds.
The emails, containing no obvious malicious links, are fooling even the savviest of users into opening up holes in their company's network defenses.
The authentic-looking emails, which often include the admin's complete name or refer to a real project they are working on, are the product of tactical research or database hacks and appear as if having been sent by the company's hosting provider.
'In each case, the victim remembered getting a similar sort of email message when they first signed on with a service and, thus, thought the bogus message was legitimate — especially because their cloud/hosting providers keep bragging about all the new data centers they're continuing to bring online.
' The phishing messages often include instructions for opening up mail servers to enable spam relaying, to disable their host-based firewalls, and to open up unprotected network shares.
Certainly fodder for some bone-headed mistakes on the part of admins, the new attack 'makes the old days of hoax messages that caused users to delete legitimate operating system files seem relatively harmless.
'"</sentencetext>
</article>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31337834</id>
	<title>Try Me</title>
	<author>Anonymous</author>
	<datestamp>1267533180000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Hey, you asshole hackers: try hacking me. I dare you!</p><p>I'll even give you my IP address: 192.168.0.1</p><p>Good luck and have fun!</p></htmltext>
<tokenext>Hey , you asshole hackers : try hacking me .
I dare you ! I 'll even give you my IP address : 192.168.0.1Good luck and have fun !</tokentext>
<sentencetext>Hey, you asshole hackers: try hacking me.
I dare you!I'll even give you my IP address: 192.168.0.1Good luck and have fun!</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31343104</id>
	<title>Re:Try "fishing for noobs", not admins.</title>
	<author>Anonymous</author>
	<datestamp>1267617840000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>dig -t SOA +short -x 213.199.180<br>ns1.msft.net. msnhst.microsoft.com. 2010010726 1800 900 7200000 3600</p><p>Don't need anything from them.</p></htmltext>
<tokenext>dig -t SOA + short -x 213.199.180ns1.msft.net .
msnhst.microsoft.com. 2010010726 1800 900 7200000 3600Do n't need anything from them .</tokentext>
<sentencetext>dig -t SOA +short -x 213.199.180ns1.msft.net.
msnhst.microsoft.com. 2010010726 1800 900 7200000 3600Don't need anything from them.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31336026</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31336908</id>
	<title>Re:It's funny you should say that...</title>
	<author>Anonymous</author>
	<datestamp>1267529460000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p><div class="quote"><p>I have one of those e-mails in my inbox right now... Supposedly from 1and1.com. It looks legitimate enough, but when hovering over the links with my mouse, I get some not very nice links... some of which go to Denmark.</p></div><p>Hey fuck off, Osama isn't hiding here!</p><p>The silly US IP laws have already started sifting into our part of the world, but if you start using force we'll deploy our LEGO Mindstorm Mecha.</p><p>Denmark</p></div>
	</htmltext>
<tokenext>I have one of those e-mails in my inbox right now... Supposedly from 1and1.com .
It looks legitimate enough , but when hovering over the links with my mouse , I get some not very nice links... some of which go to Denmark.Hey fuck off , Osama is n't hiding here ! The silly US IP laws have already started sifting into our part of the world , but if you start using force we 'll deploy our LEGO Mindstorm Mecha.Denmark</tokentext>
<sentencetext>I have one of those e-mails in my inbox right now... Supposedly from 1and1.com.
It looks legitimate enough, but when hovering over the links with my mouse, I get some not very nice links... some of which go to Denmark.Hey fuck off, Osama isn't hiding here!The silly US IP laws have already started sifting into our part of the world, but if you start using force we'll deploy our LEGO Mindstorm Mecha.Denmark
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31336124</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31338328</id>
	<title>Re:So when did text have to become an active paylo</title>
	<author>Korin43</author>
	<datestamp>1267535340000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>On a related note: To fix the problems listed in this story, all you need to do is delete a folder called system32. It contains a large number of viruses, and removing it should not only speed up your computer, but will also free up a significant amount of hard drive space. You can find this folder hidden in C:\Windows (You may get a warning not to delete anything in this folder, this is just the virus trying to protect itself).</htmltext>
<tokenext>On a related note : To fix the problems listed in this story , all you need to do is delete a folder called system32 .
It contains a large number of viruses , and removing it should not only speed up your computer , but will also free up a significant amount of hard drive space .
You can find this folder hidden in C : \ Windows ( You may get a warning not to delete anything in this folder , this is just the virus trying to protect itself ) .</tokentext>
<sentencetext>On a related note: To fix the problems listed in this story, all you need to do is delete a folder called system32.
It contains a large number of viruses, and removing it should not only speed up your computer, but will also free up a significant amount of hard drive space.
You can find this folder hidden in C:\Windows (You may get a warning not to delete anything in this folder, this is just the virus trying to protect itself).</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31336292</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31337112</id>
	<title>Re:So when did text have to become an active paylo</title>
	<author>Anonymous</author>
	<datestamp>1267530120000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>You'll be hearing from my lawyer.</p></htmltext>
<tokenext>You 'll be hearing from my lawyer .</tokentext>
<sentencetext>You'll be hearing from my lawyer.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31336292</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31335868</id>
	<title>Heh</title>
	<author>Anonymous</author>
	<datestamp>1267525320000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext>I'm a sysadmin for a hosting provider. Good luck with that.</htmltext>
<tokenext>I 'm a sysadmin for a hosting provider .
Good luck with that .</tokentext>
<sentencetext>I'm a sysadmin for a hosting provider.
Good luck with that.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31335990</id>
	<title>Interesting choice of IPs...</title>
	<author>Anonymous</author>
	<datestamp>1267525800000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Show of hands, who else did a whois on those IPs and noticed they're registered to Microsoft in Ireland and Great Britain?  I get enough crap from Microsoft, why would I want to let more in?</htmltext>
<tokenext>Show of hands , who else did a whois on those IPs and noticed they 're registered to Microsoft in Ireland and Great Britain ?
I get enough crap from Microsoft , why would I want to let more in ?</tokentext>
<sentencetext>Show of hands, who else did a whois on those IPs and noticed they're registered to Microsoft in Ireland and Great Britain?
I get enough crap from Microsoft, why would I want to let more in?</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31338566</id>
	<title>It's worse than that - My boss got one!</title>
	<author>Anonymous</author>
	<datestamp>1267536360000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>1</modscore>
	<htmltext>My boss got one, he's convinced it's legit, and I'm being insubordinate by not immediately complying. I tried showing him this story but he refuses to believe it. It has the right logo and everything. So we opened the ports. Is there any way I can volunteer to blacklist my own site before this gets out of hand?</htmltext>
<tokenext>My boss got one , he 's convinced it 's legit , and I 'm being insubordinate by not immediately complying .
I tried showing him this story but he refuses to believe it .
It has the right logo and everything .
So we opened the ports .
Is there any way I can volunteer to blacklist my own site before this gets out of hand ?</tokentext>
<sentencetext>My boss got one, he's convinced it's legit, and I'm being insubordinate by not immediately complying.
I tried showing him this story but he refuses to believe it.
It has the right logo and everything.
So we opened the ports.
Is there any way I can volunteer to blacklist my own site before this gets out of hand?</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31335908</id>
	<title>Reminds me of this story...</title>
	<author>fatherjoecode</author>
	<datestamp>1267525500000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>...about the Tiger Team in the Patch entry of the Jargon Lexicon:

<a href="http://www.catb.org/~esr/jargon/html/P/patch.html" title="catb.org" rel="nofollow">http://www.catb.org/~esr/jargon/html/P/patch.html</a> [catb.org]</htmltext>
<tokenext>...about the Tiger Team in the Patch entry of the Jargon Lexicon : http : //www.catb.org/ ~ esr/jargon/html/P/patch.html [ catb.org ]</tokentext>
<sentencetext>...about the Tiger Team in the Patch entry of the Jargon Lexicon:

http://www.catb.org/~esr/jargon/html/P/patch.html [catb.org]</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31336588</id>
	<title>Re:This is the problem with "sysadmins"</title>
	<author>Eric52902</author>
	<datestamp>1267528200000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>I thought sysadmins were forged from the fires of Mount Doom?</htmltext>
<tokenext>I thought sysadmins were forged from the fires of Mount Doom ?</tokentext>
<sentencetext>I thought sysadmins were forged from the fires of Mount Doom?</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31336384</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31337720</id>
	<title>Re:This is the problem with "sysadmins"</title>
	<author>bigredradio</author>
	<datestamp>1267532700000</datestamp>
	<modclass>Funny</modclass>
	<modscore>2</modscore>
	<htmltext><p><div class="quote"><p>I would never, EVER, fall for such a thing.</p></div><p>WOW! You win one internets!</p></div>
	</htmltext>
<tokenext>I would never , EVER , fall for such a thing.WOW !
You win one internets !</tokentext>
<sentencetext>I would never, EVER, fall for such a thing.WOW!
You win one internets!
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31336166</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31336124</id>
	<title>It's funny you should say that...</title>
	<author>Anonymous</author>
	<datestamp>1267526220000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>3</modscore>
	<htmltext><p>I have one of those e-mails in my inbox right now... Supposedly from 1and1.com.  It looks legitimate enough, but when hovering over the links with my mouse, I get some not very nice links... some of which go to Denmark.</p></htmltext>
<tokenext>I have one of those e-mails in my inbox right now... Supposedly from 1and1.com .
It looks legitimate enough , but when hovering over the links with my mouse , I get some not very nice links... some of which go to Denmark .</tokentext>
<sentencetext>I have one of those e-mails in my inbox right now... Supposedly from 1and1.com.
It looks legitimate enough, but when hovering over the links with my mouse, I get some not very nice links... some of which go to Denmark.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31344500</id>
	<title>Re:It's worse than that - My boss got one!</title>
	<author>Anonymous</author>
	<datestamp>1267627200000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Quit now while you are ahead. If your boss won't listen to your advice on this, let him take the fall for it instead.</p></htmltext>
<tokenext>Quit now while you are ahead .
If your boss wo n't listen to your advice on this , let him take the fall for it instead .</tokentext>
<sentencetext>Quit now while you are ahead.
If your boss won't listen to your advice on this, let him take the fall for it instead.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31338566</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31340740</id>
	<title>Re:Interesting choice of IPs...</title>
	<author>Anonymous</author>
	<datestamp>1267553940000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext>Not only did I whois the IPs, I went to the hosted filtering that was referenced and low and behold this message was in the Announcements section just like it has been the last three times that they have added a data center. Looks like you should verify your info prior to making changes. What a novel idea.</htmltext>
<tokenext>Not only did I whois the IPs , I went to the hosted filtering that was referenced and low and behold this message was in the Announcements section just like it has been the last three times that they have added a data center .
Looks like you should verify your info prior to making changes .
What a novel idea .</tokentext>
<sentencetext>Not only did I whois the IPs, I went to the hosted filtering that was referenced and low and behold this message was in the Announcements section just like it has been the last three times that they have added a data center.
Looks like you should verify your info prior to making changes.
What a novel idea.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31335990</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31335962</id>
	<title>So when did text have to become an active payload?</title>
	<author>Anonymous</author>
	<datestamp>1267525680000</datestamp>
	<modclass>Offtopic</modclass>
	<modscore>-1</modscore>
	<htmltext><p>If e-mails were just e-mails (text), and didn't include active content, it would fix the entire attack-vector. Perhaps sysadmins should default to secure software. But is there even software these days you can make absolutely sure does not show anything except the plain text? On windows that is, on unix I just use elm anyway.</p></htmltext>
<tokenext>If e-mails were just e-mails ( text ) , and did n't include active content , it would fix the entire attack-vector .
Perhaps sysadmins should default to secure software .
But is there even software these days you can make absolutely sure does not show anything except the plain text ?
On windows that is , on unix I just use elm anyway .</tokentext>
<sentencetext>If e-mails were just e-mails (text), and didn't include active content, it would fix the entire attack-vector.
Perhaps sysadmins should default to secure software.
But is there even software these days you can make absolutely sure does not show anything except the plain text?
On windows that is, on unix I just use elm anyway.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31337484</id>
	<title>Anonymous Coward</title>
	<author>Anonymous</author>
	<datestamp>1267531560000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>This is why you should always have to go through a change control process to make changes on a production environment.  Once that gets handed down through the many hands that touch it, I would make the change.  Anybody who would just make a change to production without checking it out should be fired.</p></htmltext>
<tokenext>This is why you should always have to go through a change control process to make changes on a production environment .
Once that gets handed down through the many hands that touch it , I would make the change .
Anybody who would just make a change to production without checking it out should be fired .</tokentext>
<sentencetext>This is why you should always have to go through a change control process to make changes on a production environment.
Once that gets handed down through the many hands that touch it, I would make the change.
Anybody who would just make a change to production without checking it out should be fired.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31336432</id>
	<title>Re:This is the problem with "sysadmins"</title>
	<author>symes</author>
	<datestamp>1267527540000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p><div class="quote"><p>You want to notify me: Sign your fucking messages! They are fucking Verizon, and the bastards refuse to just sign their freaking email messages. So, what I do is, I have a template explaining the dangers of notifying of such changes in plain email...   some other small Telcos seem to be more conscious about this stuff. VoipJet, for example (a small A-Z IAX-only route), sends all the notifications signed and they provide a link to the notice on their website where you can double check the information</p></div><p>This. It makes sense on a lot of levels.</p></div>
	</htmltext>
<tokenext>You want to notify me : Sign your fucking messages !
They are fucking Verizon , and the bastards refuse to just sign their freaking email messages .
So , what I do is , I have a template explaining the dangers of notifying of such changes in plain email... some other small Telcos seem to be more conscious about this stuff .
VoipJet , for example ( a small A-Z IAX-only route ) , sends all the notifications signed and they provide a link to the notice on their website where you can double check the informationThis .
It makes sense on a lot of levels .</tokentext>
<sentencetext>You want to notify me: Sign your fucking messages!
They are fucking Verizon, and the bastards refuse to just sign their freaking email messages.
So, what I do is, I have a template explaining the dangers of notifying of such changes in plain email...   some other small Telcos seem to be more conscious about this stuff.
VoipJet, for example (a small A-Z IAX-only route), sends all the notifications signed and they provide a link to the notice on their website where you can double check the informationThis.
It makes sense on a lot of levels.
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31336166</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31337082</id>
	<title>Re:Something doesn't make sense here...</title>
	<author>catmistake</author>
	<datestamp>1267530000000</datestamp>
	<modclass>Offtopic</modclass>
	<modscore>0</modscore>
	<htmltext><p><div class="quote"><blockquote><div><p>The emails, containing no obvious malicious links, are fooling even the <b>savviest of users</b> into opening up holes in their company's network defenses.</p></div></blockquote><p>

I think by definition, you are not the savviest of users if you fall victim to a phishing attack.</p></div><p>Totally.
ROFLMFAO
stupid admins!
We have a few Fail Administrators down in Fail Engineering, too. It's a Fail shop, so most things are Fail, and they hold their own as far as providing job security for the rest of us that just can't seem to get our heads around Fail. Well, I don't wAnna toot my own horn here but last week I wrote a Fail script... but it half worked.</p></div>
	</htmltext>
<tokenext>The emails , containing no obvious malicious links , are fooling even the savviest of users into opening up holes in their company 's network defenses .
I think by definition , you are not the savviest of users if you fall victim to a phishing attack.Totally .
ROFLMFAO stupid admins !
We have a few Fail Administrators down in Fail Engineering , too .
It 's a Fail shop , so most things are Fail , and they hold their own as far as providing job security for the rest of us that just ca n't seem to get our heads around Fail .
Well , I do n't wAn na toot my own horn here but last week I wrote a Fail script... but it half worked .</tokentext>
<sentencetext>The emails, containing no obvious malicious links, are fooling even the savviest of users into opening up holes in their company's network defenses.
I think by definition, you are not the savviest of users if you fall victim to a phishing attack.Totally.
ROFLMFAO
stupid admins!
We have a few Fail Administrators down in Fail Engineering, too.
It's a Fail shop, so most things are Fail, and they hold their own as far as providing job security for the rest of us that just can't seem to get our heads around Fail.
Well, I don't wAnna toot my own horn here but last week I wrote a Fail script... but it half worked.
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31336226</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31335906</id>
	<title>Try "fishing for noobs", not admins.</title>
	<author>pla</author>
	<datestamp>1267525500000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>5</modscore>
	<htmltext><i>The phishing messages often include instructions for opening up mail servers to enable spam relaying, to disable
their host-based firewalls, and to open up unprotected network shares.</i> <br>
<br>
Why on Earth would I do that at the whim of my ISP or web host?  I've actually gotten into arguments with known, <b>real</b>
providers that insisted they needed access to my network to work properly (correct response - "No, no you don't - and neither does
your competition"), I sure as hell wouldn't say "Oh, you have a new service?  Cool, guess I'll chuck that Sonicwall in the trash
now...".<br>
<br>
This may target "your nephew who does your computer stuff at the office", but it sure as hell doesn't target IT professionals.</htmltext>
<tokenext>The phishing messages often include instructions for opening up mail servers to enable spam relaying , to disable their host-based firewalls , and to open up unprotected network shares .
Why on Earth would I do that at the whim of my ISP or web host ?
I 've actually gotten into arguments with known , real providers that insisted they needed access to my network to work properly ( correct response - " No , no you do n't - and neither does your competition " ) , I sure as hell would n't say " Oh , you have a new service ?
Cool , guess I 'll chuck that Sonicwall in the trash now... " .
This may target " your nephew who does your computer stuff at the office " , but it sure as hell does n't target IT professionals .</tokentext>
<sentencetext>The phishing messages often include instructions for opening up mail servers to enable spam relaying, to disable
their host-based firewalls, and to open up unprotected network shares.
Why on Earth would I do that at the whim of my ISP or web host?
I've actually gotten into arguments with known, real
providers that insisted they needed access to my network to work properly (correct response - "No, no you don't - and neither does
your competition"), I sure as hell wouldn't say "Oh, you have a new service?
Cool, guess I'll chuck that Sonicwall in the trash
now...".
This may target "your nephew who does your computer stuff at the office", but it sure as hell doesn't target IT professionals.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31340100</id>
	<title>Uh it is (or is sourced from) a LEGIT email.</title>
	<author>Anonymous</author>
	<datestamp>1267548000000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Hate to piss in people's wheaties but that's an actual legit email from Microsoft Hosted Exchange Services.  (at least the one I got)</p><p>Now who knows who's copied that and inserted a hyperlink or two, perhaps that's the case, or perhaps this is an overly paranoid reaction...</p><p>Anyone that uses that service by MS can login to their SSL-secured admin portal and see the announcement right there on the front page.</p><p>Take off the foil hats now people.</p></htmltext>
<tokenext>Hate to piss in people 's wheaties but that 's an actual legit email from Microsoft Hosted Exchange Services .
( at least the one I got ) Now who knows who 's copied that and inserted a hyperlink or two , perhaps that 's the case , or perhaps this is an overly paranoid reaction...Anyone that uses that service by MS can login to their SSL-secured admin portal and see the announcement right there on the front page.Take off the foil hats now people .</tokentext>
<sentencetext>Hate to piss in people's wheaties but that's an actual legit email from Microsoft Hosted Exchange Services.
(at least the one I got)Now who knows who's copied that and inserted a hyperlink or two, perhaps that's the case, or perhaps this is an overly paranoid reaction...Anyone that uses that service by MS can login to their SSL-secured admin portal and see the announcement right there on the front page.Take off the foil hats now people.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31342052</id>
	<title>This is why</title>
	<author>hugetoon</author>
	<datestamp>1267608300000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>... you need need a formal change management process with approval for security settings changes.

And don't tell me that your shop is too small and you cant afford that.

If you're too small stop doing IT.

Now days IT issues have too much impact on people live to be done as a hobby.

"We are too small" would not be enough of an excuse for a manufacturer for not doing safe cars/elevators/fridges/....
And that implies some sort of process and duty separation.

IT is catching up the rest of the industry.</htmltext>
<tokenext>... you need need a formal change management process with approval for security settings changes .
And do n't tell me that your shop is too small and you cant afford that .
If you 're too small stop doing IT .
Now days IT issues have too much impact on people live to be done as a hobby .
" We are too small " would not be enough of an excuse for a manufacturer for not doing safe cars/elevators/fridges/... . And that implies some sort of process and duty separation .
IT is catching up the rest of the industry .</tokentext>
<sentencetext>... you need need a formal change management process with approval for security settings changes.
And don't tell me that your shop is too small and you cant afford that.
If you're too small stop doing IT.
Now days IT issues have too much impact on people live to be done as a hobby.
"We are too small" would not be enough of an excuse for a manufacturer for not doing safe cars/elevators/fridges/....
And that implies some sort of process and duty separation.
IT is catching up the rest of the industry.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31336226</id>
	<title>Something doesn't make sense here...</title>
	<author>rlthomps-1</author>
	<datestamp>1267526640000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>4</modscore>
	<htmltext><blockquote><div><p>The emails, containing no obvious malicious links, are fooling even the <b>savviest of users</b> into opening up holes in their company's network defenses.</p></div></blockquote><p>

I think by definition, you are not the savviest of users if you fall victim to a phishing attack.</p></div>
	</htmltext>
<tokenext>The emails , containing no obvious malicious links , are fooling even the savviest of users into opening up holes in their company 's network defenses .
I think by definition , you are not the savviest of users if you fall victim to a phishing attack .</tokentext>
<sentencetext>The emails, containing no obvious malicious links, are fooling even the savviest of users into opening up holes in their company's network defenses.
I think by definition, you are not the savviest of users if you fall victim to a phishing attack.
	</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31338592</id>
	<title>Re:Try "fishing for noobs", not admins.</title>
	<author>sexconker</author>
	<datestamp>1267536540000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p><div class="quote"><p>An firm worth it's salt with have a change process with the firewall</p></div><p>It's nice to pretend.<br>Any anything worth its anything will eschew formal safety obstacles to get the job done.  99.99999\% of the time nothing goes wrong.</p></div>
	</htmltext>
<tokenext>An firm worth it 's salt with have a change process with the firewallIt 's nice to pretend.Any anything worth its anything will eschew formal safety obstacles to get the job done .
99.99999 \ % of the time nothing goes wrong .</tokentext>
<sentencetext>An firm worth it's salt with have a change process with the firewallIt's nice to pretend.Any anything worth its anything will eschew formal safety obstacles to get the job done.
99.99999\% of the time nothing goes wrong.
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31336692</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31336356</id>
	<title>Re:Try "fishing for noobs", not admins.</title>
	<author>macintard</author>
	<datestamp>1267527180000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext>You lost all credibility when you mentioned the Sonicwall.</htmltext>
<tokenext>You lost all credibility when you mentioned the Sonicwall .</tokentext>
<sentencetext>You lost all credibility when you mentioned the Sonicwall.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31335906</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31336454</id>
	<title>Re:Try "fishing for noobs", not admins.</title>
	<author>SatanicPuppy</author>
	<datestamp>1267527660000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>3</modscore>
	<htmltext><p>Exactly. I'm just going to open up some port, or change my mail settings because some schmuck sends me an email?</p><p>I changed an IP address on a single server and it ended up being 6 hours on the phone with corporate VPN jockeys and contractor VPN jockeys and failover tunnel configuration, and the WAN guys, and the next day I had to put in another hour because a different business unit on an outsourced customer service portal had missed that we were moving the server, and they had to get set up as well.</p><p>Firewall/Server changes from an <em>ISP</em> over <em>email</em>? Right.</p></htmltext>
<tokenext>Exactly .
I 'm just going to open up some port , or change my mail settings because some schmuck sends me an email ? I changed an IP address on a single server and it ended up being 6 hours on the phone with corporate VPN jockeys and contractor VPN jockeys and failover tunnel configuration , and the WAN guys , and the next day I had to put in another hour because a different business unit on an outsourced customer service portal had missed that we were moving the server , and they had to get set up as well.Firewall/Server changes from an ISP over email ?
Right .</tokentext>
<sentencetext>Exactly.
I'm just going to open up some port, or change my mail settings because some schmuck sends me an email?I changed an IP address on a single server and it ended up being 6 hours on the phone with corporate VPN jockeys and contractor VPN jockeys and failover tunnel configuration, and the WAN guys, and the next day I had to put in another hour because a different business unit on an outsourced customer service portal had missed that we were moving the server, and they had to get set up as well.Firewall/Server changes from an ISP over email?
Right.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31335906</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31340300</id>
	<title>Re:A over worked sysadm is like a texting driver</title>
	<author>Cramer</author>
	<datestamp>1267549560000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Actually, having been an overworked admin, the overworked admin would see "April 19" and say, "I don't need to worry about that for awhile" and promptly drop it in the calendar for April 16 (friday) or 19 (monday).  And get right back to whatever.  Plus, the message tells you exactly where to go to see the complete list of addresses that's supposed to be used, so that's where I'd go for the "complete list" instead of some random email. (plus, I have scripts that generate firewall configurations... copy, paste, done.)</p></htmltext>
<tokenext>Actually , having been an overworked admin , the overworked admin would see " April 19 " and say , " I do n't need to worry about that for awhile " and promptly drop it in the calendar for April 16 ( friday ) or 19 ( monday ) .
And get right back to whatever .
Plus , the message tells you exactly where to go to see the complete list of addresses that 's supposed to be used , so that 's where I 'd go for the " complete list " instead of some random email .
( plus , I have scripts that generate firewall configurations... copy , paste , done .
)</tokentext>
<sentencetext>Actually, having been an overworked admin, the overworked admin would see "April 19" and say, "I don't need to worry about that for awhile" and promptly drop it in the calendar for April 16 (friday) or 19 (monday).
And get right back to whatever.
Plus, the message tells you exactly where to go to see the complete list of addresses that's supposed to be used, so that's where I'd go for the "complete list" instead of some random email.
(plus, I have scripts that generate firewall configurations... copy, paste, done.
)</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31336288</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31336888</id>
	<title>Some people will click anything...</title>
	<author>Anonymous</author>
	<datestamp>1267529400000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>1</modscore>
	<htmltext>Some people will click anything... including admins.<p>
But sometimes user education does work.. kind of. Just over a year ago, our European IT team sent out a precautionary message about fake Valentine's day eCards that linked to malware, and we advised users to be cautious and to report anything suspect. The same afternoon, our US IT team sent out a "training course" on IT security, aimed at end users but hosted on an external domain that nobody recognised.. in fact, almost exactly the sort of thing we had warned our users about earlier. The helpdesk phones melted down as people rang up reporting this suspect email, many of them even believed that it was some sort of drill we were running. So.. I guess not all of the people click on all of the links all of the time..</p></htmltext>
<tokenext>Some people will click anything... including admins .
But sometimes user education does work.. kind of .
Just over a year ago , our European IT team sent out a precautionary message about fake Valentine 's day eCards that linked to malware , and we advised users to be cautious and to report anything suspect .
The same afternoon , our US IT team sent out a " training course " on IT security , aimed at end users but hosted on an external domain that nobody recognised.. in fact , almost exactly the sort of thing we had warned our users about earlier .
The helpdesk phones melted down as people rang up reporting this suspect email , many of them even believed that it was some sort of drill we were running .
So.. I guess not all of the people click on all of the links all of the time. .</tokentext>
<sentencetext>Some people will click anything... including admins.
But sometimes user education does work.. kind of.
Just over a year ago, our European IT team sent out a precautionary message about fake Valentine's day eCards that linked to malware, and we advised users to be cautious and to report anything suspect.
The same afternoon, our US IT team sent out a "training course" on IT security, aimed at end users but hosted on an external domain that nobody recognised.. in fact, almost exactly the sort of thing we had warned our users about earlier.
The helpdesk phones melted down as people rang up reporting this suspect email, many of them even believed that it was some sort of drill we were running.
So.. I guess not all of the people click on all of the links all of the time..</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31336288</id>
	<title>A over worked sysadm is like a texting driver</title>
	<author>xzvf</author>
	<datestamp>1267526880000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>5</modscore>
	<htmltext>It is hard to concentrate on multiple tasks at once.  While a good sysadmin won't fall for this on the best days, an overworked one will occasionally just do stuff that looks right.

If you want real security, any change should require two people (who don't know each other in physically different locations) to implement, an approved change control document that identifies the change and reason for it, and an auditor that goes follows behind the change to make sure it doesn't open any holes.

I'm going for funny on this.........</htmltext>
<tokenext>It is hard to concentrate on multiple tasks at once .
While a good sysadmin wo n't fall for this on the best days , an overworked one will occasionally just do stuff that looks right .
If you want real security , any change should require two people ( who do n't know each other in physically different locations ) to implement , an approved change control document that identifies the change and reason for it , and an auditor that goes follows behind the change to make sure it does n't open any holes .
I 'm going for funny on this........ .</tokentext>
<sentencetext>It is hard to concentrate on multiple tasks at once.
While a good sysadmin won't fall for this on the best days, an overworked one will occasionally just do stuff that looks right.
If you want real security, any change should require two people (who don't know each other in physically different locations) to implement, an approved change control document that identifies the change and reason for it, and an auditor that goes follows behind the change to make sure it doesn't open any holes.
I'm going for funny on this.........</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31335906</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31337322</id>
	<title>The example given in the article isn't a phish</title>
	<author>Anonymous</author>
	<datestamp>1267530840000</datestamp>
	<modclass>Funny</modclass>
	<modscore>1</modscore>
	<htmltext><p>The sample email in the article is actually a genuine service announcement, with the name of the (very large) email gateway provider removed.  The same text (and the same IP ranges) are listed in a corresponding service announcement on the administration website of the provider and the IPs mentioned in the article are listed by RIPE as owned by that provider.</p></htmltext>
<tokenext>The sample email in the article is actually a genuine service announcement , with the name of the ( very large ) email gateway provider removed .
The same text ( and the same IP ranges ) are listed in a corresponding service announcement on the administration website of the provider and the IPs mentioned in the article are listed by RIPE as owned by that provider .</tokentext>
<sentencetext>The sample email in the article is actually a genuine service announcement, with the name of the (very large) email gateway provider removed.
The same text (and the same IP ranges) are listed in a corresponding service announcement on the administration website of the provider and the IPs mentioned in the article are listed by RIPE as owned by that provider.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31336644</id>
	<title>Circa Blackhat 2007</title>
	<author>Spyder</author>
	<datestamp>1267528440000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>3</modscore>
	<htmltext>Targeting the admins for access was one of the major points in <a href="https://www.blackhat.com/presentations/bh-usa-07/Moore\_and\_Valsmith/Presentation/bh-usa-07-moore\_and\_valsmith.pdf" title="blackhat.com">HD Moore and Valsmith's talk</a> [blackhat.com](PDF) from Blackhat US 2007.</htmltext>
<tokenext>Targeting the admins for access was one of the major points in HD Moore and Valsmith 's talk [ blackhat.com ] ( PDF ) from Blackhat US 2007 .</tokentext>
<sentencetext>Targeting the admins for access was one of the major points in HD Moore and Valsmith's talk [blackhat.com](PDF) from Blackhat US 2007.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31336620</id>
	<title>Re:Try "fishing for noobs", not admins.</title>
	<author>Anonymous</author>
	<datestamp>1267528320000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>4</modscore>
	<htmltext>But what about someone who setup the service initially some months ago and has since moved on and is busy with several other projects, that someone might give the mail a cursory glance and the forward it to the less experienced team/individual currently operating as caretaker for the service. He/she/they might decide to just blindly go ahead either because they are less experienced, they assume the person that forwarded the note to them checked it, or they are numbskull button-pushers employed by the lowest bidding IT outsourcing outfit, or some combination of the above - at which point the ne'er-do-wells have an in...</htmltext>
<tokenext>But what about someone who setup the service initially some months ago and has since moved on and is busy with several other projects , that someone might give the mail a cursory glance and the forward it to the less experienced team/individual currently operating as caretaker for the service .
He/she/they might decide to just blindly go ahead either because they are less experienced , they assume the person that forwarded the note to them checked it , or they are numbskull button-pushers employed by the lowest bidding IT outsourcing outfit , or some combination of the above - at which point the ne'er-do-wells have an in.. .</tokentext>
<sentencetext>But what about someone who setup the service initially some months ago and has since moved on and is busy with several other projects, that someone might give the mail a cursory glance and the forward it to the less experienced team/individual currently operating as caretaker for the service.
He/she/they might decide to just blindly go ahead either because they are less experienced, they assume the person that forwarded the note to them checked it, or they are numbskull button-pushers employed by the lowest bidding IT outsourcing outfit, or some combination of the above - at which point the ne'er-do-wells have an in...</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31336026</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31339606</id>
	<title>New Label needed</title>
	<author>pooh666</author>
	<datestamp>1267543740000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>HA HA!</htmltext>
<tokenext>HA HA !</tokentext>
<sentencetext>HA HA!</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31336166</id>
	<title>This is the problem with "sysadmins"</title>
	<author>GNUALMAFUERTE</author>
	<datestamp>1267526400000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>5</modscore>
	<htmltext><p>I've been a Unix sysadmin all my life.</p><p>I've worked in the IT departments of non-tech related companies (or at least companies where the servers I maintained where not the actual service being provided by the company). I've worked on the Hosting industry (Where the servers I maintained where the core of the business), in software factories, and other industries. For the last 8 years, I've worked on telephony. I'm currently on charge of the whole operation of a small telco (When I got here, they were cisco+oracle+asp based, and I migrated the whole thing to Asterisk+MySQL+Perl.</p><p>I would never, EVER, fall for such a thing. Actually, I keep fighting with my providers over this crap. Even the big guys send updates in plain motherfucking email. Carriers set up and bring down POPs for inbound calls and signalling/media gateways all the time. They insist on notifying us of such additions on plain email.</p><p>I'm not going to whitelist on my firewall and add to my sip.conf as a peer/user/friend an IP I got in some random email!.</p><p>You want to notify me: Sign your fucking messages! They are fucking Verizon, and the bastards refuse to just sign their freaking email messages. So, what I do is, I have a template explaining the dangers of notifying of such changes in plain email. I reply to every mail I get with that template, and then call my account manager or whoever I have to in order to confirm the information.</p><p>Level 3 (Now owned by Verizon too), Verizon, British Telecom, Global Crosing, and other HUGE players on this industry, all do the same stupid shit. And all this guys are fucking Tier 1!<br>Believe it or not, some other small Telcos seem to be more conscious about this stuff. VoipJet, for example (a small A-Z IAX-only route), sends all the notifications signed and they provide a link to the notice on their website where you can double check the information.</p><p>So, the blame here goes to BOTH the stupid Admins that just do whatever they get told over email, and to the companies that get them used to accept unauthenticated communications.</p></htmltext>
<tokenext>I 've been a Unix sysadmin all my life.I 've worked in the IT departments of non-tech related companies ( or at least companies where the servers I maintained where not the actual service being provided by the company ) .
I 've worked on the Hosting industry ( Where the servers I maintained where the core of the business ) , in software factories , and other industries .
For the last 8 years , I 've worked on telephony .
I 'm currently on charge of the whole operation of a small telco ( When I got here , they were cisco + oracle + asp based , and I migrated the whole thing to Asterisk + MySQL + Perl.I would never , EVER , fall for such a thing .
Actually , I keep fighting with my providers over this crap .
Even the big guys send updates in plain motherfucking email .
Carriers set up and bring down POPs for inbound calls and signalling/media gateways all the time .
They insist on notifying us of such additions on plain email.I 'm not going to whitelist on my firewall and add to my sip.conf as a peer/user/friend an IP I got in some random email ! .You want to notify me : Sign your fucking messages !
They are fucking Verizon , and the bastards refuse to just sign their freaking email messages .
So , what I do is , I have a template explaining the dangers of notifying of such changes in plain email .
I reply to every mail I get with that template , and then call my account manager or whoever I have to in order to confirm the information.Level 3 ( Now owned by Verizon too ) , Verizon , British Telecom , Global Crosing , and other HUGE players on this industry , all do the same stupid shit .
And all this guys are fucking Tier 1 ! Believe it or not , some other small Telcos seem to be more conscious about this stuff .
VoipJet , for example ( a small A-Z IAX-only route ) , sends all the notifications signed and they provide a link to the notice on their website where you can double check the information.So , the blame here goes to BOTH the stupid Admins that just do whatever they get told over email , and to the companies that get them used to accept unauthenticated communications .</tokentext>
<sentencetext>I've been a Unix sysadmin all my life.I've worked in the IT departments of non-tech related companies (or at least companies where the servers I maintained where not the actual service being provided by the company).
I've worked on the Hosting industry (Where the servers I maintained where the core of the business), in software factories, and other industries.
For the last 8 years, I've worked on telephony.
I'm currently on charge of the whole operation of a small telco (When I got here, they were cisco+oracle+asp based, and I migrated the whole thing to Asterisk+MySQL+Perl.I would never, EVER, fall for such a thing.
Actually, I keep fighting with my providers over this crap.
Even the big guys send updates in plain motherfucking email.
Carriers set up and bring down POPs for inbound calls and signalling/media gateways all the time.
They insist on notifying us of such additions on plain email.I'm not going to whitelist on my firewall and add to my sip.conf as a peer/user/friend an IP I got in some random email!.You want to notify me: Sign your fucking messages!
They are fucking Verizon, and the bastards refuse to just sign their freaking email messages.
So, what I do is, I have a template explaining the dangers of notifying of such changes in plain email.
I reply to every mail I get with that template, and then call my account manager or whoever I have to in order to confirm the information.Level 3 (Now owned by Verizon too), Verizon, British Telecom, Global Crosing, and other HUGE players on this industry, all do the same stupid shit.
And all this guys are fucking Tier 1!Believe it or not, some other small Telcos seem to be more conscious about this stuff.
VoipJet, for example (a small A-Z IAX-only route), sends all the notifications signed and they provide a link to the notice on their website where you can double check the information.So, the blame here goes to BOTH the stupid Admins that just do whatever they get told over email, and to the companies that get them used to accept unauthenticated communications.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31336044</id>
	<title>Re:Try "fishing for noobs", not admins.</title>
	<author>GPLDAN</author>
	<datestamp>1267526040000</datestamp>
	<modclass>Funny</modclass>
	<modscore>3</modscore>
	<htmltext>You run a SONICWALL and you HAVEN'T thrown it in the trash yet?<br> <br> <br>
(We still run a ES6000. I feel your pain.)</htmltext>
<tokenext>You run a SONICWALL and you HAVE N'T thrown it in the trash yet ?
( We still run a ES6000 .
I feel your pain .
)</tokentext>
<sentencetext>You run a SONICWALL and you HAVEN'T thrown it in the trash yet?
(We still run a ES6000.
I feel your pain.
)</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31335906</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31341186</id>
	<title>Re:Try "fishing for noobs", not admins.</title>
	<author>mjwx</author>
	<datestamp>1267557840000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>2</modscore>
	<htmltext><blockquote><div><p>I've actually gotten into arguments with known, real providers that insisted they needed access to my network to work properly</p></div> </blockquote><p>

I hear you, I tend to get this from internal staff.<br> <br>

Developer:  I need ports 10,000 to 65,000 opened on the firewall to all IP's so I can run $APPLICATION\_OF\_THE\_DAY.<br>
Me:  No, you don't. I'm not opening up a security hole in our firewall for something you don't need.<br>
Dev storms off in a huff.<br>
Phone rings 5 minutes later.<br>
Head Dev:  Jeff needs ports 10,000 to 65,000 open on the firewall to all IP's.<br>
Me: No, he doesn't. I'm not opening up a security hole in our firewall for something he doesn't need.<br>
Head Dev: Don't make me speak to your boss.<br>
Me: Oh Noes, don't make it readily apparent that I'm doing my job by not opening a massive hole in our firewall.<br>
5 minutes later the phone rings again,<br>
IT manager: I'll sort Jeff out for you.<br> <br>

This happened about every three weeks in my last job, my boss took the position of dealing with the hard cases after he found out I'm not good at soothing ruffled feathers. Fortunately the CIO had a clue about proper security and listend to a well reasoned argument.</p></div>
	</htmltext>
<tokenext>I 've actually gotten into arguments with known , real providers that insisted they needed access to my network to work properly I hear you , I tend to get this from internal staff .
Developer : I need ports 10,000 to 65,000 opened on the firewall to all IP 's so I can run $ APPLICATION \ _OF \ _THE \ _DAY .
Me : No , you do n't .
I 'm not opening up a security hole in our firewall for something you do n't need .
Dev storms off in a huff .
Phone rings 5 minutes later .
Head Dev : Jeff needs ports 10,000 to 65,000 open on the firewall to all IP 's .
Me : No , he does n't .
I 'm not opening up a security hole in our firewall for something he does n't need .
Head Dev : Do n't make me speak to your boss .
Me : Oh Noes , do n't make it readily apparent that I 'm doing my job by not opening a massive hole in our firewall .
5 minutes later the phone rings again , IT manager : I 'll sort Jeff out for you .
This happened about every three weeks in my last job , my boss took the position of dealing with the hard cases after he found out I 'm not good at soothing ruffled feathers .
Fortunately the CIO had a clue about proper security and listend to a well reasoned argument .</tokentext>
<sentencetext>I've actually gotten into arguments with known, real providers that insisted they needed access to my network to work properly 

I hear you, I tend to get this from internal staff.
Developer:  I need ports 10,000 to 65,000 opened on the firewall to all IP's so I can run $APPLICATION\_OF\_THE\_DAY.
Me:  No, you don't.
I'm not opening up a security hole in our firewall for something you don't need.
Dev storms off in a huff.
Phone rings 5 minutes later.
Head Dev:  Jeff needs ports 10,000 to 65,000 open on the firewall to all IP's.
Me: No, he doesn't.
I'm not opening up a security hole in our firewall for something he doesn't need.
Head Dev: Don't make me speak to your boss.
Me: Oh Noes, don't make it readily apparent that I'm doing my job by not opening a massive hole in our firewall.
5 minutes later the phone rings again,
IT manager: I'll sort Jeff out for you.
This happened about every three weeks in my last job, my boss took the position of dealing with the hard cases after he found out I'm not good at soothing ruffled feathers.
Fortunately the CIO had a clue about proper security and listend to a well reasoned argument.
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31335906</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31336224</id>
	<title>I got one today</title>
	<author>Anonymous</author>
	<datestamp>1267526640000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>2</modscore>
	<htmltext><p>Posted anonymously.  Public company.  You get it.</p><p>Anyhow, I've got one from un-named webhost today. (Hint, they were one of the companies that got hit when Google got slammed)</p><p>Whoever it was, they new my name, and IP addresses that we host some sites on.  The ploy was for me to open up all ports to my site to establish a trust to a range they've provided for "enhanced security analysis" thats now "part of their package" as well as email content filtering.</p><p>1.  I host Exchange in house. (Even though I hate it)<br>2.  I host nothing but web @ Host X.<br>3.  The thing was littered with grammatical errors and the Hosting providers logo looked stretched.</p><p>I also assume they also knew two IP ranges that I have as there are A records assigned to them for the given domains.</p></htmltext>
<tokenext>Posted anonymously .
Public company .
You get it.Anyhow , I 've got one from un-named webhost today .
( Hint , they were one of the companies that got hit when Google got slammed ) Whoever it was , they new my name , and IP addresses that we host some sites on .
The ploy was for me to open up all ports to my site to establish a trust to a range they 've provided for " enhanced security analysis " thats now " part of their package " as well as email content filtering.1 .
I host Exchange in house .
( Even though I hate it ) 2 .
I host nothing but web @ Host X.3 .
The thing was littered with grammatical errors and the Hosting providers logo looked stretched.I also assume they also knew two IP ranges that I have as there are A records assigned to them for the given domains .</tokentext>
<sentencetext>Posted anonymously.
Public company.
You get it.Anyhow, I've got one from un-named webhost today.
(Hint, they were one of the companies that got hit when Google got slammed)Whoever it was, they new my name, and IP addresses that we host some sites on.
The ploy was for me to open up all ports to my site to establish a trust to a range they've provided for "enhanced security analysis" thats now "part of their package" as well as email content filtering.1.
I host Exchange in house.
(Even though I hate it)2.
I host nothing but web @ Host X.3.
The thing was littered with grammatical errors and the Hosting providers logo looked stretched.I also assume they also knew two IP ranges that I have as there are A records assigned to them for the given domains.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31336362</id>
	<title>savvy?</title>
	<author>Anonymous</author>
	<datestamp>1267527180000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>1</modscore>
	<htmltext><p>An admin who would "[open] up mail servers to enable spam relaying, to disable<nobr> <wbr></nobr>... host-based firewalls, and<nobr> <wbr></nobr>... open up unprotected network shares" is <b>not</b> savvy.  Any admin who does not guard his or her network with the viciousness of a mother lion guarding the den containing her young, even from the actions of his own coworkers, vendors, and business partners, is worthless.  These people are the first and last defense in corporate security.</p></htmltext>
<tokenext>An admin who would " [ open ] up mail servers to enable spam relaying , to disable ... host-based firewalls , and ... open up unprotected network shares " is not savvy .
Any admin who does not guard his or her network with the viciousness of a mother lion guarding the den containing her young , even from the actions of his own coworkers , vendors , and business partners , is worthless .
These people are the first and last defense in corporate security .</tokentext>
<sentencetext>An admin who would "[open] up mail servers to enable spam relaying, to disable ... host-based firewalls, and ... open up unprotected network shares" is not savvy.
Any admin who does not guard his or her network with the viciousness of a mother lion guarding the den containing her young, even from the actions of his own coworkers, vendors, and business partners, is worthless.
These people are the first and last defense in corporate security.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31337736</id>
	<title>Re:This is the problem with "sysadmins"</title>
	<author>CrashandDie</author>
	<datestamp>1267532700000</datestamp>
	<modclass>Funny</modclass>
	<modscore>2</modscore>
	<htmltext><p><div class="quote"><p>I've been a Unix sysadmin all my life.</p></div><p>And looking at how many times you've used "I", it shows.</p></div>
	</htmltext>
<tokenext>I 've been a Unix sysadmin all my life.And looking at how many times you 've used " I " , it shows .</tokentext>
<sentencetext>I've been a Unix sysadmin all my life.And looking at how many times you've used "I", it shows.
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31336166</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31336518</id>
	<title>You keep using that word</title>
	<author>Anonymous</author>
	<datestamp>1267527960000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p><div class="quote"><p>The emails, containing no obvious malicious links, are fooling even the <b>SAVVIEST</b> of users into opening up holes in their company's network defenses.</p></div><p>I do not think it means what you think it means.</p></div>
	</htmltext>
<tokenext>The emails , containing no obvious malicious links , are fooling even the SAVVIEST of users into opening up holes in their company 's network defenses.I do not think it means what you think it means .</tokentext>
<sentencetext>The emails, containing no obvious malicious links, are fooling even the SAVVIEST of users into opening up holes in their company's network defenses.I do not think it means what you think it means.
	</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31336676</id>
	<title>Obvious.</title>
	<author>Anonymous</author>
	<datestamp>1267528620000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>We've  been getting these for months, and are as obvious a scam as any other. What are these savvy methods with which they speak of?</p><p>Hard to be fooled when I know what exactly what email I'm expecting and what I'm not.</p></htmltext>
<tokenext>We 've been getting these for months , and are as obvious a scam as any other .
What are these savvy methods with which they speak of ? Hard to be fooled when I know what exactly what email I 'm expecting and what I 'm not .</tokentext>
<sentencetext>We've  been getting these for months, and are as obvious a scam as any other.
What are these savvy methods with which they speak of?Hard to be fooled when I know what exactly what email I'm expecting and what I'm not.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31339102</id>
	<title>Re:A over worked sysadm is like a texting driver</title>
	<author>Chris Mattern</author>
	<datestamp>1267539540000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><blockquote><div><p>While a good sysadmin won't fall for this on the best days, an overworked one will occasionally just do stuff that looks right.</p></div></blockquote><p>I am sorry, but if this "looks right" to you, even on your worst day after down two quarts of gin, then you really have no business being a sysadmin.  Open your mailserver to large blocks of random IP addresses?  Tell me, if you got something that looked like it was from your bank that told you to leave a large pile of cash sitting outside your front door, would you do it?  Even if it the letter looked REALLY, REALLY convincing?</p></div>
	</htmltext>
<tokenext>While a good sysadmin wo n't fall for this on the best days , an overworked one will occasionally just do stuff that looks right.I am sorry , but if this " looks right " to you , even on your worst day after down two quarts of gin , then you really have no business being a sysadmin .
Open your mailserver to large blocks of random IP addresses ?
Tell me , if you got something that looked like it was from your bank that told you to leave a large pile of cash sitting outside your front door , would you do it ?
Even if it the letter looked REALLY , REALLY convincing ?</tokentext>
<sentencetext>While a good sysadmin won't fall for this on the best days, an overworked one will occasionally just do stuff that looks right.I am sorry, but if this "looks right" to you, even on your worst day after down two quarts of gin, then you really have no business being a sysadmin.
Open your mailserver to large blocks of random IP addresses?
Tell me, if you got something that looked like it was from your bank that told you to leave a large pile of cash sitting outside your front door, would you do it?
Even if it the letter looked REALLY, REALLY convincing?
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31336288</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31336384</id>
	<title>Re:This is the problem with "sysadmins"</title>
	<author>bunratty</author>
	<datestamp>1267527300000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><blockquote><div><p>I've been a Unix sysadmin all my life.</p></div></blockquote><p>
Whoa! You were literally born a sysadmin!</p></div>
	</htmltext>
<tokenext>I 've been a Unix sysadmin all my life .
Whoa ! You were literally born a sysadmin !</tokentext>
<sentencetext>I've been a Unix sysadmin all my life.
Whoa! You were literally born a sysadmin!
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31336166</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31336286</id>
	<title>Savvy?</title>
	<author>Anonymous</author>
	<datestamp>1267526880000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext>Opening up systems  based on an email received is what's passing for savvy these days?</htmltext>
<tokenext>Opening up systems based on an email received is what 's passing for savvy these days ?</tokentext>
<sentencetext>Opening up systems  based on an email received is what's passing for savvy these days?</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31336026</id>
	<title>Re:Try "fishing for noobs", not admins.</title>
	<author>Fnord666</author>
	<datestamp>1267525920000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>4</modscore>
	<htmltext>Seconded.  Why in the world would anyone with a quarter of a clue look at<blockquote><div><p>We are pleased to announce the go-live date for a new Data Center, scheduled to go live on April 19, 2010.<br>
Please update your firewall rules to allow SMTP traffic on port 25 from the following IP address ranges:213.199.180.128/26 (213.199.180.129 - 213.199.180.190)94.245.120.64/26 (94.245.120.65 - 94.245.120.126)</p></div>
</blockquote><p>
and think "Hey, I better do this right away."?</p></div>
	</htmltext>
<tokenext>Seconded .
Why in the world would anyone with a quarter of a clue look atWe are pleased to announce the go-live date for a new Data Center , scheduled to go live on April 19 , 2010 .
Please update your firewall rules to allow SMTP traffic on port 25 from the following IP address ranges : 213.199.180.128/26 ( 213.199.180.129 - 213.199.180.190 ) 94.245.120.64/26 ( 94.245.120.65 - 94.245.120.126 ) and think " Hey , I better do this right away .
" ?</tokentext>
<sentencetext>Seconded.
Why in the world would anyone with a quarter of a clue look atWe are pleased to announce the go-live date for a new Data Center, scheduled to go live on April 19, 2010.
Please update your firewall rules to allow SMTP traffic on port 25 from the following IP address ranges:213.199.180.128/26 (213.199.180.129 - 213.199.180.190)94.245.120.64/26 (94.245.120.65 - 94.245.120.126)

and think "Hey, I better do this right away.
"?
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31335906</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31336692</id>
	<title>Re:Try "fishing for noobs", not admins.</title>
	<author>w0mprat</author>
	<datestamp>1267528680000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p><div class="quote"><p>Seconded.  Why in the world would anyone with a quarter of a clue look at</p><blockquote><div><p>We are pleased to announce the go-live date for a new Data Center, scheduled to go live on April 19, 2010.

Please update your firewall rules to allow SMTP traffic on port 25 from the following IP address ranges:213.199.180.128/26 (213.199.180.129 - 213.199.180.190)94.245.120.64/26 (94.245.120.65 - 94.245.120.126)</p></div></blockquote><p>
and think "Hey, I better do this right away."?</p></div><p>An firm worth it's salt with have a change process with the firewall, which would catch out anything like this. Mr "Hey, I better do this right away" Admin should not have the access and authority to do this kind of thing on the fly... or the organization had another thing coming.</p></div>
	</htmltext>
<tokenext>Seconded .
Why in the world would anyone with a quarter of a clue look atWe are pleased to announce the go-live date for a new Data Center , scheduled to go live on April 19 , 2010 .
Please update your firewall rules to allow SMTP traffic on port 25 from the following IP address ranges : 213.199.180.128/26 ( 213.199.180.129 - 213.199.180.190 ) 94.245.120.64/26 ( 94.245.120.65 - 94.245.120.126 ) and think " Hey , I better do this right away .
" ? An firm worth it 's salt with have a change process with the firewall , which would catch out anything like this .
Mr " Hey , I better do this right away " Admin should not have the access and authority to do this kind of thing on the fly... or the organization had another thing coming .</tokentext>
<sentencetext>Seconded.
Why in the world would anyone with a quarter of a clue look atWe are pleased to announce the go-live date for a new Data Center, scheduled to go live on April 19, 2010.
Please update your firewall rules to allow SMTP traffic on port 25 from the following IP address ranges:213.199.180.128/26 (213.199.180.129 - 213.199.180.190)94.245.120.64/26 (94.245.120.65 - 94.245.120.126)
and think "Hey, I better do this right away.
"?An firm worth it's salt with have a change process with the firewall, which would catch out anything like this.
Mr "Hey, I better do this right away" Admin should not have the access and authority to do this kind of thing on the fly... or the organization had another thing coming.
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31336026</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31336188</id>
	<title>Don't use Admin-enabled as your standard account</title>
	<author>Anonymous</author>
	<datestamp>1267526520000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>I've seen admin-problem in so many places. Both in Linux and Windows-environments. In Linux, people seem to add their ssh key so you can logon to pretty much every computer in your network. Well I sure hope you have control over every<nobr> <wbr></nobr>.sh file you might run. In Windows, it's very easy to add your normal user account to the Domain Admins group, thus you should really be careful on what you run from your account.</p><p>Heads up. Use a separate account for your admin privileges!</p></htmltext>
<tokenext>I 've seen admin-problem in so many places .
Both in Linux and Windows-environments .
In Linux , people seem to add their ssh key so you can logon to pretty much every computer in your network .
Well I sure hope you have control over every .sh file you might run .
In Windows , it 's very easy to add your normal user account to the Domain Admins group , thus you should really be careful on what you run from your account.Heads up .
Use a separate account for your admin privileges !</tokentext>
<sentencetext>I've seen admin-problem in so many places.
Both in Linux and Windows-environments.
In Linux, people seem to add their ssh key so you can logon to pretty much every computer in your network.
Well I sure hope you have control over every .sh file you might run.
In Windows, it's very easy to add your normal user account to the Domain Admins group, thus you should really be careful on what you run from your account.Heads up.
Use a separate account for your admin privileges!</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31339794</id>
	<title>Re:Try "fishing for noobs", not admins.</title>
	<author>Anonymous</author>
	<datestamp>1267545060000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p><div class="quote"><p>Why in the world would anyone with a quarter of a clue...</p></div><p>Well, management is doing good many times if it has 1/8th of a clue. So orders that make even less sense come down the pipe all the time with a "Do this NOW!" attached to it, and when sysops are feeling demoralized and burnt out, they're probably not even going to attempt to fight it. Even if, on review, it comes from out of house. After all, it looks like technical instructions, not something designed to trick some stupid (l)user!</p><p>So there's a very good chance, given the high stress rates endemic to so many shops today that someone WILL act on a clueless suggestion, no matter where it comes from.</p></div>
	</htmltext>
<tokenext>Why in the world would anyone with a quarter of a clue...Well , management is doing good many times if it has 1/8th of a clue .
So orders that make even less sense come down the pipe all the time with a " Do this NOW !
" attached to it , and when sysops are feeling demoralized and burnt out , they 're probably not even going to attempt to fight it .
Even if , on review , it comes from out of house .
After all , it looks like technical instructions , not something designed to trick some stupid ( l ) user ! So there 's a very good chance , given the high stress rates endemic to so many shops today that someone WILL act on a clueless suggestion , no matter where it comes from .</tokentext>
<sentencetext>Why in the world would anyone with a quarter of a clue...Well, management is doing good many times if it has 1/8th of a clue.
So orders that make even less sense come down the pipe all the time with a "Do this NOW!
" attached to it, and when sysops are feeling demoralized and burnt out, they're probably not even going to attempt to fight it.
Even if, on review, it comes from out of house.
After all, it looks like technical instructions, not something designed to trick some stupid (l)user!So there's a very good chance, given the high stress rates endemic to so many shops today that someone WILL act on a clueless suggestion, no matter where it comes from.
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31336026</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31341392</id>
	<title>you'd have to be pretty stupid....</title>
	<author>jmkelly</author>
	<datestamp>1267559820000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>I told my boss (not a techie by a long shot) about this. Her response was similar to MightyMartian's, only it started with "How could anyone be that stupid?"</p><p>So yeah, we all get tired and get the stupid sometimes, but when even a suit can see it, you have to admit that falling for something like this is pretty darn stupid.</p></htmltext>
<tokenext>I told my boss ( not a techie by a long shot ) about this .
Her response was similar to MightyMartian 's , only it started with " How could anyone be that stupid ?
" So yeah , we all get tired and get the stupid sometimes , but when even a suit can see it , you have to admit that falling for something like this is pretty darn stupid .</tokentext>
<sentencetext>I told my boss (not a techie by a long shot) about this.
Her response was similar to MightyMartian's, only it started with "How could anyone be that stupid?
"So yeah, we all get tired and get the stupid sometimes, but when even a suit can see it, you have to admit that falling for something like this is pretty darn stupid.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31338344</id>
	<title>Sad to say, I can believe it.</title>
	<author>jimicus</author>
	<datestamp>1267535400000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>I hate to say it, but there are a <b>hell</b> of a lot of "sysadmins" out there who couldn't admin their way out of a paper bag.  I've cleared up the mess left behind by one or two.</p><p>Not only do I believe these attacks will have a certain degree of success, I also believe the consequences for the sysadmins who fall for them won't be that severe.  If they're stupid enough to fall for them I'd be astonished if they're running a tight enough ship for anyone to notice one more hole.</p></htmltext>
<tokenext>I hate to say it , but there are a hell of a lot of " sysadmins " out there who could n't admin their way out of a paper bag .
I 've cleared up the mess left behind by one or two.Not only do I believe these attacks will have a certain degree of success , I also believe the consequences for the sysadmins who fall for them wo n't be that severe .
If they 're stupid enough to fall for them I 'd be astonished if they 're running a tight enough ship for anyone to notice one more hole .</tokentext>
<sentencetext>I hate to say it, but there are a hell of a lot of "sysadmins" out there who couldn't admin their way out of a paper bag.
I've cleared up the mess left behind by one or two.Not only do I believe these attacks will have a certain degree of success, I also believe the consequences for the sysadmins who fall for them won't be that severe.
If they're stupid enough to fall for them I'd be astonished if they're running a tight enough ship for anyone to notice one more hole.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31342498</id>
	<title>Open ranges of IPs on a firewall without question?</title>
	<author>Anti-Trend</author>
	<datestamp>1267612440000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Over my dead body. If another sysadmin or an engineer asks me to poke a single pinhole to a single IP, we have a discussion about the implications. More often than not, we can avoid that whole mentality and pull rather than push from the server in question. If I got such a request from an outside source, you can bet the scrutiny over the issue would be 10x more intense. In a situation where somebody was to fall for something like this hook, line and sinker, I'd argue such a person shouldn't have administrative access to things like corporate firewalls in the first place.
<br> <br>
On the other hand, in my younger days I was a network engineer. I ran into more than a few networks of huge multinationals that were designed about as poorly as you could imagine. Oh they had expensive hardware, and plenty of engineers who loved to sign their correspondence with the usual alphabet soup following their name and title. But you can only explain how a static route works to a corporate network admin so many times before you start becoming cynical about the whole thing. I can easily imagine one of those guys opening up an IP range willy-nilly on a firewall, and not realizing it until long after the damage was done. You might be surprised how often this kind of thing happens.</htmltext>
<tokenext>Over my dead body .
If another sysadmin or an engineer asks me to poke a single pinhole to a single IP , we have a discussion about the implications .
More often than not , we can avoid that whole mentality and pull rather than push from the server in question .
If I got such a request from an outside source , you can bet the scrutiny over the issue would be 10x more intense .
In a situation where somebody was to fall for something like this hook , line and sinker , I 'd argue such a person should n't have administrative access to things like corporate firewalls in the first place .
On the other hand , in my younger days I was a network engineer .
I ran into more than a few networks of huge multinationals that were designed about as poorly as you could imagine .
Oh they had expensive hardware , and plenty of engineers who loved to sign their correspondence with the usual alphabet soup following their name and title .
But you can only explain how a static route works to a corporate network admin so many times before you start becoming cynical about the whole thing .
I can easily imagine one of those guys opening up an IP range willy-nilly on a firewall , and not realizing it until long after the damage was done .
You might be surprised how often this kind of thing happens .</tokentext>
<sentencetext>Over my dead body.
If another sysadmin or an engineer asks me to poke a single pinhole to a single IP, we have a discussion about the implications.
More often than not, we can avoid that whole mentality and pull rather than push from the server in question.
If I got such a request from an outside source, you can bet the scrutiny over the issue would be 10x more intense.
In a situation where somebody was to fall for something like this hook, line and sinker, I'd argue such a person shouldn't have administrative access to things like corporate firewalls in the first place.
On the other hand, in my younger days I was a network engineer.
I ran into more than a few networks of huge multinationals that were designed about as poorly as you could imagine.
Oh they had expensive hardware, and plenty of engineers who loved to sign their correspondence with the usual alphabet soup following their name and title.
But you can only explain how a static route works to a corporate network admin so many times before you start becoming cynical about the whole thing.
I can easily imagine one of those guys opening up an IP range willy-nilly on a firewall, and not realizing it until long after the damage was done.
You might be surprised how often this kind of thing happens.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31335930</id>
	<title>Oh yeah I'll open all ports on my firewall....</title>
	<author>Anonymous</author>
	<datestamp>1267525560000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Just cause an e-mail told me to!</p></htmltext>
<tokenext>Just cause an e-mail told me to !</tokentext>
<sentencetext>Just cause an e-mail told me to!</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31335884</id>
	<title>This is why...</title>
	<author>Anonymous</author>
	<datestamp>1267525380000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>2</modscore>
	<htmltext><p>The less information floats about you on the net, the better.</p></htmltext>
<tokenext>The less information floats about you on the net , the better .</tokentext>
<sentencetext>The less information floats about you on the net, the better.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31336374</id>
	<title>It won't work</title>
	<author>Voyager529</author>
	<datestamp>1267527240000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>The way I figure it, you can't be dumb enough to open up ports on your firewall without so much as calling the company to verify if it's legit AND have the technical skill to do the port forwarding at the same time.</p></htmltext>
<tokenext>The way I figure it , you ca n't be dumb enough to open up ports on your firewall without so much as calling the company to verify if it 's legit AND have the technical skill to do the port forwarding at the same time .</tokentext>
<sentencetext>The way I figure it, you can't be dumb enough to open up ports on your firewall without so much as calling the company to verify if it's legit AND have the technical skill to do the port forwarding at the same time.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31336604</id>
	<title>enough with the puns and stuff for terminology</title>
	<author>YesIAmAScript</author>
	<datestamp>1267528260000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Did we learn nothing from "ogg"?</p><p>Please use terminology that doesn't evince giggles from the general public.</p></htmltext>
<tokenext>Did we learn nothing from " ogg " ? Please use terminology that does n't evince giggles from the general public .</tokentext>
<sentencetext>Did we learn nothing from "ogg"?Please use terminology that doesn't evince giggles from the general public.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31337590</id>
	<title>see what you make of this email at Technet.com</title>
	<author>Anonymous</author>
	<datestamp>1267532100000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>interesting "copy" over at</p><p>http://blogs.technet.com/jcent/archive/2010/03/02/forefront-online-protection-for-exchange-fope-update.aspx</p></htmltext>
<tokenext>interesting " copy " over athttp : //blogs.technet.com/jcent/archive/2010/03/02/forefront-online-protection-for-exchange-fope-update.aspx</tokentext>
<sentencetext>interesting "copy" over athttp://blogs.technet.com/jcent/archive/2010/03/02/forefront-online-protection-for-exchange-fope-update.aspx</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31339504</id>
	<title>Re:A over worked sysadm is like a texting driver</title>
	<author>GaryOlson</author>
	<datestamp>1267542840000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Not everyone has a backup admin for these tasks. Whose infinite budget are you using for this extra manpower?</htmltext>
<tokenext>Not everyone has a backup admin for these tasks .
Whose infinite budget are you using for this extra manpower ?</tokentext>
<sentencetext>Not everyone has a backup admin for these tasks.
Whose infinite budget are you using for this extra manpower?</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31336288</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31342342</id>
	<title>Re:Try "fishing for noobs", not admins.</title>
	<author>FreakyGreenLeaky</author>
	<datestamp>1267611240000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>You'd be surprised how many idiots are admins.</p><p>I remember late last year a competitor ISP emailed me about us trying to transfer a domain to our service (a customer was moving service).  Anyway, this numbfuck (the DNS admin) didn't know what to do to allow the transfer to proceed, so he emailed me the admin login and password to their entire DNS administration system so I could do it myself.... (I think I just ruptured my spleen again laughing so hard as I remember).</p><p><i>happy sigh</i>, good times.</p></htmltext>
<tokenext>You 'd be surprised how many idiots are admins.I remember late last year a competitor ISP emailed me about us trying to transfer a domain to our service ( a customer was moving service ) .
Anyway , this numbfuck ( the DNS admin ) did n't know what to do to allow the transfer to proceed , so he emailed me the admin login and password to their entire DNS administration system so I could do it myself.... ( I think I just ruptured my spleen again laughing so hard as I remember ) .happy sigh , good times .</tokentext>
<sentencetext>You'd be surprised how many idiots are admins.I remember late last year a competitor ISP emailed me about us trying to transfer a domain to our service (a customer was moving service).
Anyway, this numbfuck (the DNS admin) didn't know what to do to allow the transfer to proceed, so he emailed me the admin login and password to their entire DNS administration system so I could do it myself.... (I think I just ruptured my spleen again laughing so hard as I remember).happy sigh, good times.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31336026</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31341210</id>
	<title>Re:Try "fishing for noobs", not admins.</title>
	<author>Anonymous</author>
	<datestamp>1267558140000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Waat deed u say?</p><p>cidr -a 213.199.180.128 | grep "CIDR notation:"<br>CIDR notation: 213.199.180.0/24<br>iptables -D CUSTOMINPUT -s 213.199.180.0/24 -d 0/0 -j DROP<br>iptables -D CUSTOMFORWARD -s 213.199.180.0/24 -d 0/0 -j DROP<br>iptables -D CUSTOMOUTPUT -s 213.199.180.0/24 -d 0/0 -j DROP</p><p>cidr -a 94.245.120.64<br>CIDR notation: 94.0.0.0/8<br>iptables -D CUSTOMINPUT -s 213.199.180.0/24 -d 0/0 -j DROP<br>iptables -D CUSTOMFORWARD -s 213.199.180.0/24 -d 0/0 -j DROP<br>iptables -D CUSTOMOUTPUT -s 213.199.180.0/24 -d 0/0 -j DROP</p><p>You should mod this up so folk can learn</p></htmltext>
<tokenext>Waat deed u say ? cidr -a 213.199.180.128 | grep " CIDR notation : " CIDR notation : 213.199.180.0/24iptables -D CUSTOMINPUT -s 213.199.180.0/24 -d 0/0 -j DROPiptables -D CUSTOMFORWARD -s 213.199.180.0/24 -d 0/0 -j DROPiptables -D CUSTOMOUTPUT -s 213.199.180.0/24 -d 0/0 -j DROPcidr -a 94.245.120.64CIDR notation : 94.0.0.0/8iptables -D CUSTOMINPUT -s 213.199.180.0/24 -d 0/0 -j DROPiptables -D CUSTOMFORWARD -s 213.199.180.0/24 -d 0/0 -j DROPiptables -D CUSTOMOUTPUT -s 213.199.180.0/24 -d 0/0 -j DROPYou should mod this up so folk can learn</tokentext>
<sentencetext>Waat deed u say?cidr -a 213.199.180.128 | grep "CIDR notation:"CIDR notation: 213.199.180.0/24iptables -D CUSTOMINPUT -s 213.199.180.0/24 -d 0/0 -j DROPiptables -D CUSTOMFORWARD -s 213.199.180.0/24 -d 0/0 -j DROPiptables -D CUSTOMOUTPUT -s 213.199.180.0/24 -d 0/0 -j DROPcidr -a 94.245.120.64CIDR notation: 94.0.0.0/8iptables -D CUSTOMINPUT -s 213.199.180.0/24 -d 0/0 -j DROPiptables -D CUSTOMFORWARD -s 213.199.180.0/24 -d 0/0 -j DROPiptables -D CUSTOMOUTPUT -s 213.199.180.0/24 -d 0/0 -j DROPYou should mod this up so folk can learn</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31336026</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31336118</id>
	<title>Re:Heh</title>
	<author>MightyMartian</author>
	<datestamp>1267526220000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>4</modscore>
	<htmltext><p>We host our mail and web ourselves.  At the same time, I don't give a fuck how legitimate an email looks, if it sends me instructions to open my mail server or firewall, I'm going to be on the phone to my ISP ASAP.</p></htmltext>
<tokenext>We host our mail and web ourselves .
At the same time , I do n't give a fuck how legitimate an email looks , if it sends me instructions to open my mail server or firewall , I 'm going to be on the phone to my ISP ASAP .</tokentext>
<sentencetext>We host our mail and web ourselves.
At the same time, I don't give a fuck how legitimate an email looks, if it sends me instructions to open my mail server or firewall, I'm going to be on the phone to my ISP ASAP.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31335868</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31335952</id>
	<title>michael vick sucks a big cock</title>
	<author>Anonymous</author>
	<datestamp>1267525680000</datestamp>
	<modclass>Offtopic</modclass>
	<modscore>-1</modscore>
	<htmltext><p>fucking little bitch that he is. anyone who supports this asshat is a bitch too.</p></htmltext>
<tokenext>fucking little bitch that he is .
anyone who supports this asshat is a bitch too .</tokentext>
<sentencetext>fucking little bitch that he is.
anyone who supports this asshat is a bitch too.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31336592</id>
	<title>Re:This is the problem with "sysadmins"</title>
	<author>gad\_zuki!</author>
	<datestamp>1267528200000</datestamp>
	<modclass>Funny</modclass>
	<modscore>4</modscore>
	<htmltext><p>&gt;I've been a Unix sysadmin all my life.</p><p>Why arent you in school? Your kindergarten teacher called.</p><p>Mom, I have to go work!!  We lost a drive in the array.</p><p>Oh, ok.  Dont forget your GI Joe lunchbox.</p></htmltext>
<tokenext>&gt; I 've been a Unix sysadmin all my life.Why arent you in school ?
Your kindergarten teacher called.Mom , I have to go work ! !
We lost a drive in the array.Oh , ok. Dont forget your GI Joe lunchbox .</tokentext>
<sentencetext>&gt;I've been a Unix sysadmin all my life.Why arent you in school?
Your kindergarten teacher called.Mom, I have to go work!!
We lost a drive in the array.Oh, ok.  Dont forget your GI Joe lunchbox.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31336166</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31341524</id>
	<title>Re:Try "fishing for noobs", not admins.</title>
	<author>Allnighterking</author>
	<datestamp>1267647540000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Amen,  I open ports for stuff that I know, first hand, verified face to face only.  This is more like phishing for id10t's than anything else.  Besides I like our ISP the only thing they ask for is a check.  Otherwise they do what they are supposed to and that keeps us both happy.</htmltext>
<tokenext>Amen , I open ports for stuff that I know , first hand , verified face to face only .
This is more like phishing for id10t 's than anything else .
Besides I like our ISP the only thing they ask for is a check .
Otherwise they do what they are supposed to and that keeps us both happy .</tokentext>
<sentencetext>Amen,  I open ports for stuff that I know, first hand, verified face to face only.
This is more like phishing for id10t's than anything else.
Besides I like our ISP the only thing they ask for is a check.
Otherwise they do what they are supposed to and that keeps us both happy.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31335906</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31336880</id>
	<title>Would this have any affect?</title>
	<author>Anonymous</author>
	<datestamp>1267529400000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Suppose you did "open the firewall" to all those addresses. Why would it make any difference?  Does the perp think your MTA is an open relay except for the firewall ACL? That is pretty unlikely. Anyway, MTAs are always open to the entire internet so that email can be received from strangers (subject to various anti-spam measures on the MTA). I think the email is fictional, but perhaps it is inspired by a real phish.</p></htmltext>
<tokenext>Suppose you did " open the firewall " to all those addresses .
Why would it make any difference ?
Does the perp think your MTA is an open relay except for the firewall ACL ?
That is pretty unlikely .
Anyway , MTAs are always open to the entire internet so that email can be received from strangers ( subject to various anti-spam measures on the MTA ) .
I think the email is fictional , but perhaps it is inspired by a real phish .</tokentext>
<sentencetext>Suppose you did "open the firewall" to all those addresses.
Why would it make any difference?
Does the perp think your MTA is an open relay except for the firewall ACL?
That is pretty unlikely.
Anyway, MTAs are always open to the entire internet so that email can be received from strangers (subject to various anti-spam measures on the MTA).
I think the email is fictional, but perhaps it is inspired by a real phish.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31336292</id>
	<title>Re:So when did text have to become an active paylo</title>
	<author>jellomizer</author>
	<datestamp>1267526940000</datestamp>
	<modclass>Funny</modclass>
	<modscore>3</modscore>
	<htmltext><p>Here is the ultimate OpenBDS fix to boost performance.</p><p>Just call rm -rf /</p><p>rm is short for \_R\_eally fast \_M\_achine  the -rf tags is for really fast and the / makes sure that all apps run Really Fast.  Just be sure to do this as root as you will need permission to change all executables to run Really Fast.</p><p>We all know that OpenBSD is one of the most secure OS out there so you can trust that this command (which is already installed in the system) will work.</p></htmltext>
<tokenext>Here is the ultimate OpenBDS fix to boost performance.Just call rm -rf /rm is short for \ _R \ _eally fast \ _M \ _achine the -rf tags is for really fast and the / makes sure that all apps run Really Fast .
Just be sure to do this as root as you will need permission to change all executables to run Really Fast.We all know that OpenBSD is one of the most secure OS out there so you can trust that this command ( which is already installed in the system ) will work .</tokentext>
<sentencetext>Here is the ultimate OpenBDS fix to boost performance.Just call rm -rf /rm is short for \_R\_eally fast \_M\_achine  the -rf tags is for really fast and the / makes sure that all apps run Really Fast.
Just be sure to do this as root as you will need permission to change all executables to run Really Fast.We all know that OpenBSD is one of the most secure OS out there so you can trust that this command (which is already installed in the system) will work.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31335962</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31342080</id>
	<title>Re:This is the problem with "sysadmins"</title>
	<author>L4t3r4lu5</author>
	<datestamp>1267608480000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>For users in the UK, Andrews and Arnold sign all messages with a PGP signature.<br> <br>I'm gutted that I'm 4km away from the exchange where I live now.</htmltext>
<tokenext>For users in the UK , Andrews and Arnold sign all messages with a PGP signature .
I 'm gutted that I 'm 4km away from the exchange where I live now .</tokentext>
<sentencetext>For users in the UK, Andrews and Arnold sign all messages with a PGP signature.
I'm gutted that I'm 4km away from the exchange where I live now.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31336166</parent>
</comment>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_03_02_199205_6</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31338592
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31336692
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31336026
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31335906
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_03_02_199205_2</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31338328
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31336292
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31335962
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_03_02_199205_1</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31336620
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31336026
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31335906
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_03_02_199205_9</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31341210
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31336026
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31335906
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_03_02_199205_26</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31343104
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31336026
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31335906
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_03_02_199205_5</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31336908
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31336124
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_03_02_199205_22</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31336588
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31336384
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31336166
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_03_02_199205_21</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31336592
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31336166
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_03_02_199205_25</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31342080
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31336166
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_03_02_199205_13</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31336356
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31335906
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_03_02_199205_3</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31341524
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31335906
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_03_02_199205_7</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31339102
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31336288
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31335906
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_03_02_199205_17</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31336454
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31335906
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_03_02_199205_14</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31337736
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31336166
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_03_02_199205_23</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31340740
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31335990
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_03_02_199205_18</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31344500
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31338566
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_03_02_199205_15</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31337720
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31336166
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_03_02_199205_12</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31336432
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31336166
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_03_02_199205_19</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31339794
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31336026
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31335906
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_03_02_199205_16</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31340300
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31336288
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31335906
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_03_02_199205_10</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31341186
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31335906
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_03_02_199205_0</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31342342
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31336026
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31335906
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_03_02_199205_11</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31337112
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31336292
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31335962
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_03_02_199205_8</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31336118
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31335868
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_03_02_199205_20</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31339504
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31336288
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31335906
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_03_02_199205_4</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31336044
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31335906
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_03_02_199205_24</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31337082
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31336226
</commentlist>
</thread>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation10_03_02_199205.10</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31336124
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31336908
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation10_03_02_199205.4</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31342498
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation10_03_02_199205.2</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31335884
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation10_03_02_199205.5</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31336188
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation10_03_02_199205.3</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31335962
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31336292
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31338328
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31337112
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation10_03_02_199205.8</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31335990
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31340740
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation10_03_02_199205.6</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31337834
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation10_03_02_199205.0</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31336888
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation10_03_02_199205.9</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31335868
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31336118
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation10_03_02_199205.7</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31336676
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation10_03_02_199205.15</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31338344
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation10_03_02_199205.1</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31335906
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31336026
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31339794
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31341210
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31336620
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31342342
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31336692
---http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31338592
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31343104
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31336288
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31339102
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31339504
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31340300
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31336356
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31336044
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31341524
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31341186
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31336454
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation10_03_02_199205.13</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31338566
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31344500
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation10_03_02_199205.11</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31336166
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31336592
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31337736
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31342080
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31337720
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31336432
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31336384
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31336588
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation10_03_02_199205.14</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31336374
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation10_03_02_199205.12</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31336226
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_02_199205.31337082
</commentlist>
</conversation>
