Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
my cat is norris
Mar 11, 2010

#onecallcat

It's all automated and I don't know anything about the Exchange filters, so all I can say is that our security guy had a bit of a wake-up call yesterday. He does have certain IP ranges filtered, but idk how effective that even really is in this world of VPNs.

Adbot
ADBOT LOVES YOU

Entropic
Feb 21, 2007

patriarchy sucks
My company recently had a pissing match with Telus when our e-mail auto-responders got into a loop with each other.

devmd01
Mar 7, 2006

Elektronik
Supersonik

Schadenboner posted:

The mistake was in accepting mail from Russia, hth?

Or any IP traffic at all. We literally block the world on our edge firewalls except for the US and the Cayman Islands. Exec traveling outside the US for some reason? Better put in a ticket with what country and the dates and we will allow it only for that period.

Between making sure O365 is using modern auth across the board and disabling pop/imap, this has greatly reduced incidences of any successful phishing attacks causing further damage. If they can’t get to our ADFS to authenticate in to O365, then they can’t get in period. Yes, this doesn’t help if they are proxied through a US host, but it’s pretty effective otherwise.

Canuck-Errant
Oct 28, 2003

MOOD: BURNING - MUSIC: DISCO INFERNO BY THE TRAMMPS
Grimey Drawer

Entropic posted:

The glitch I had was much more literally hellish sounding.

This was the first thing callers got when they called the main number. At very high volume.

Sounds like an alien numbers station more than a portal to hell IMO

Ghostlight
Sep 25, 2009

maybe for one second you can pause; try to step into another person's perspective, and understand that a watermelon is cursing me



Our helpdesk runs off a shared mailbox on which we turned off external senders.

MF_James
May 8, 2008
I CANNOT HANDLE BEING CALLED OUT ON MY DUMBASS OPINIONS ABOUT ANTI-VIRUS AND SECURITY. I REALLY LIKE TO THINK THAT I KNOW THINGS HERE

INSTEAD I AM GOING TO WHINE ABOUT IT IN OTHER THREADS SO MY OPINION CAN FEEL VALIDATED IN AN ECHO CHAMBER I LIKE

devmd01 posted:

Or any IP traffic at all. We literally block the world on our edge firewalls except for the US and the Cayman Islands. Exec traveling outside the US for some reason? Better put in a ticket with what country and the dates and we will allow it only for that period.

Between making sure O365 is using modern auth across the board and disabling pop/imap, this has greatly reduced incidences of any successful phishing attacks causing further damage. If they can’t get to our ADFS to authenticate in to O365, then they can’t get in period. Yes, this doesn’t help if they are proxied through a US host, but it’s pretty effective otherwise.

Plenty of IPs will get mis-categorized, I assume you're doing geo IP blocking? It's pretty effective, but we would run into at least 1 IP a week that was actually from somewhere in asia but was being categorized by the vendor as from the US.

Still, defense in depth and all that.

mllaneza
Apr 28, 2007

Veteran, Bermuda Triangle Expeditionary Force, 1993-1952




Schadenboner posted:

The mistake was in accepting mail from Russia, hth?

In the dark days before our gMail migration I had inherited a Communicate 4.5 server running on OS X 10.6 Server (on a G5 tower). Even with Postini filtering we got absolute floods of spam. So I started blocking larger and larger blocks of IP addresses. Pretty quickly I was blocking Class Cs, and then multiple Class Cs. I got frustrated one morning and blocked.... I think it was 8.0.0.0/8 to 12.0.0.0/8. Eastern and NE Europe basically.

After lunch one of the department heads swung by my desk and mentioned that they hadn't had any email from $biggestClient today.

They're in Finland.

Oops.

So I punched a (small) hole in the middle of that range and sent out a calmly worded email to the project team list.

Gerdalti
May 24, 2003

SPOON!
I've got one that I'm actually hoping you guys can help me out with here. Got a ticket from one of our digital marketing people. They're trying to do some audience match BS with Ebay, and essentially, I don't know how to help them.

We have a CSV file with a list of names, email addresses, etc.
Ebay wants us to:
1) Name the file a specific way.
Easy
2) Convert all email addresses to UPPERCASE.
Easy
3) Hash each email address using SHA-256
I have no loving idea how to do this.

4) Encrypt the file.
Fine, we'll use GPG4Win and Kleopatra

I'm really stuck on step 3 though. I'm a server, network, desktop, cloud guy. This seems to be falling down into programming/scripting, and it a bit out of my realm.

Any thoughts?

Arquinsiel
Jun 1, 2006

"There is no such thing as society. There are individual men and women, and there are families. And no government can do anything except through people, and people must look to themselves first."

God Bless Margaret Thatcher
God Bless England
RIP My Iron Lady
That seems to be asking you to do multiple things at once. Do they want the email address field in the .csv to be hashed? Do they want a file that is just a .csv consisting of only the email address hashed?

Gerdalti
May 24, 2003

SPOON!

Arquinsiel posted:

That seems to be asking you to do multiple things at once. Do they want the email address field in the .csv to be hashed? Do they want a file that is just a .csv consisting of only the email address hashed?

You're correct.
They literally want an encrypted file (PGP) , that contains hashed (SHA256) email addresses. Double-safe? Seems a bit silly for email addresses, but it's what Ebay wants.

I'm hoping that I do not have to be the person that does this for the dozens of files and bajillions of email addresses they're going to want. So I'll need something that a) can do this on Windows 10 and b) can be done by a standard User account.

Sigh. I suppose I could try to write a powershell script that reads the base csv, feeds it to get-stringhash, then exports the hash back to a new CSV file, then encrypt it with gpg4win when it's done.

Gerdalti fucked around with this message at 14:33 on Apr 26, 2019

Volguus
Mar 3, 2009
echo "aa@aa.com"|sha256sum

Proteus Jones
Feb 28, 2013



Gerdalti posted:

I've got one that I'm actually hoping you guys can help me out with here. Got a ticket from one of our digital marketing people. They're trying to do some audience match BS with Ebay, and essentially, I don't know how to help them.

We have a CSV file with a list of names, email addresses, etc.
Ebay wants us to:
1) Name the file a specific way.
Easy
2) Convert all email addresses to UPPERCASE.
Easy
3) Hash each email address using SHA-256
I have no loving idea how to do this.

4) Encrypt the file.
Fine, we'll use GPG4Win and Kleopatra

I'm really stuck on step 3 though. I'm a server, network, desktop, cloud guy. This seems to be falling down into programming/scripting, and it a bit out of my realm.

Any thoughts?

Unless you want it to take infinity days, something like a python script (or maybe PowerShell?) is going to be the only solution. This is doubly true if it's going to be ongoing.

Ultimately, except for step 4, the whole thing is text manipulation. You can read in a CSV with Python and then create the new file (with special file name), do your caps conversion on a specific field, use hashlib to apply the hash and then write out to the new CSV file.

hashlib is super simple:

code:
import hashlib
       .
       .
       .
plainEmail = "EMAIL@EAMIL.EMAIL"
hashEmail = hashlib.sha256(plainEmail.encode()) 

Agrikk
Oct 17, 2003

Take care with that! We have not fully ascertained its function, and the ticking is accelerating.
You know what is cool about IT?

For every problem that leaves me thinking “I leave no idea how I’d go about tackling that.” There is someone who goes, “oh that’s easy. Just do blah blah blah” and knocks it out of the park.

It’s trippy sometimes.

Gerdalti
May 24, 2003

SPOON!

Agrikk posted:

You know what is cool about IT?

For every problem that leaves me thinking “I leave no idea how I’d go about tackling that.” There is someone who goes, “oh that’s easy. Just do blah blah blah” and knocks it out of the park.

It’s trippy sometimes.

That's why I posted it here.

As an update, I found out that the file is simply 1 column of email addresses, so I've managed to automate steps 2 and 3, and now I'm struggling to get GPG4win to run properly in the powershell script. Any ideas? I just can't get it to parse properly no matter what I do.

code:
<#
    Powershell to hash email strings to SHA256
    This Will accept any file as input 
    *** format must be single email address per line ***
    Email addresses are converted to uppercase before hashing
#>

# File Browser Dialog
Add-Type -AssemblyName System.Windows.Forms
$FileBrowser = New-Object System.Windows.Forms.OpenFileDialog -Property @{ InitialDirectory = [Environment]::GetFolderPath('Desktop') }
$null = $FileBrowser.ShowDialog()

# Create output file name, and remove existing file with that name
$filename,$ext1 = $FileBrowser.FileName.split('.')
$hashfile = $filename+'.hash'
Remove-Item $hashfile

#Hash each line, and output to file
foreach($line in [System.IO.File]::ReadLines($FileBrowser.FileName))
{
       $line=$line.ToUpper()
       $hasher = New-Object -TypeName "System.Security.Cryptography.SHA256CryptoServiceProvider"
       $encoding = [System.Text.Encoding]::UTF8
       $hash = ($hasher.ComputeHash($encoding.GetBytes($line)) | % {
            "{0:X2}" -f $_
        }) -join ""
       echo $hash | Out-File -FilePath $hashfile -Append
}

$ebaykey = 'Z:\Ebay\GPG4Win\Ebay-Key.asc'
$pgpfilename = $hashfile + '.gpg'
$gpgpath = 'Z:\Ebay\GPG4Win\bin\gpg.exe'
$gpgencryptstring = '-r "email@ebay.com" -o ' + $pgpfilename + ' --encrypt ' + $hashfile
$gpgencryptnow = $gpgpath + ' ' + $gpgencryptstring

& Z:\Ebay\GPG4Win\bin\gpg.exe --import $ebaykey

#### THIS BITCH RIGHT HERE ####
# Full Command is:

# Z:\Ebay\GPG4Win\bin\gpg.exe -r "email@ebay.com" -o Z:\ebay\emails.hash.gpg --encrypt Z:\ebay\emails.hash

# This works on a command line, but not in a PS Script
################################

terrenblade
Oct 29, 2012

my cat is norris posted:

A Russian email address sent our service desk address a little test email at 4:48 PM yesterday.

After the service system sent back a positive automated response, the flood gates opened. Between 5:04 PM and 6:06 AM, we received over 1000 false help tickets advertising everything from pharmaceuticals to mail order brides.

My helpdesk got three of the 'deleterious soft' emails, in Chinese. I almost died laughing.

spankmeister
Jun 15, 2008






Unsalted sha256 is super easy to crack, I bet I could get like 75% of those email addresses back.

Anyway, you can definitely do this in Python but for this id just use bash like

code:

while read email
do
    echo ${email^^} | sha256sum >> outputfile
done < inputfile

Gerdalti
May 24, 2003

SPOON!
I don't know why, but wrapping the GPG calls in a function fixed it.
For those interested in this lovely lovely project:

code:
# Set GPG Parameters

# Define GPG Path
$gpgpath = 'Z:/Ebay/GPG4Win/bin/gpg.exe'

# Ebay Public Key
$ebaykey = 'Z:/Ebay/GPG4Win/Ebay-Key.asc'
$ebayrecipient = 'email@ebay.com'

# Output File
$pgpfilename = $hashfile + '.gpg'


# GPG Function
function gpg_me {
  & $gpgpath -q --import $ebaykey
  & $gpgpath --yes --batch --trust-model always -q -e -r $ebayrecipient -o $pgpfilename $hashfile
}

gpg_me

Weedle
May 31, 2006




Dirt Road Junglist posted:

At least you've never inadvertently terminated your company's Japanese CEO? :v: In my defense, he was on my list!

...I realize, typing this, that it makes me sound like I'm an international assassin and not a computer toucher.

Why not both?

PBS
Sep 21, 2015

Gerdalti posted:

I don't know why, but wrapping the GPG calls in a function fixed it.
For those interested in this lovely lovely project:

code:
Your code

I have a few critiques on the code that may help you out.

code:
# File Browser Dialog
Add-Type -AssemblyName System.Windows.Forms
$FileBrowser = New-Object System.Windows.Forms.OpenFileDialog -Property @{ InitialDirectory = [Environment]::GetFolderPath('Desktop') }
$null = $FileBrowser.ShowDialog()
All fine.

code:
# Create output file name, and remove existing file with that name
$filename,$ext1 = $FileBrowser.FileName.split('.')
$hashfile = $filename+'.hash'
This assumes there's only one period in the filename, not a big deal really but could be a little confusing at some point.

code:
Remove-Item -Path $hashfile
I really shy away from deleting user's files without the user specifically and knowingly initiating that action. Not a huge deal but could potentially bite you.
You're going to get an error if there's not already a .hash file with that name present, this can be handled with a simple test.

code:
foreach($line in [System.IO.File]::ReadLines($FileBrowser.FileName))
{
       $line=$line.ToUpper()
       $hasher = New-Object -TypeName "System.Security.Cryptography.SHA256CryptoServiceProvider"
       $encoding = [System.Text.Encoding]::UTF8
       $hash = ($hasher.ComputeHash($encoding.GetBytes($line)) | % {
            "{0:X2}" -f $_
        }) -join ""
       echo $hash | Out-File -FilePath $hashfile -Append
}
I see a few improvement opportunities here, one of which is very significant.

First, there's no point in declaring $hasher and $encoding more than once. This will incur a performance penalty (though a fairly minor one), cut those and stick them above the for-loop.
Second, overall $hash is fine, but it is a little hard to read and a bit slow.
Third, you don't need to echo $hash to append it. You can pipe it directly.
Lastly, every single run of the for-loop you're having to open your file to append the hash. This will totally cripple your script from a performance perspective.

There are a few easy ways to handle that last point and the best method really depends on your environment and the files you're working with. You could add a test inside the loop to dump once an array reaches a certain size (I'd use this method if the files are larger than 10k/20k lines). If the lists are shorter you can just write it all to an array and dump it to a file at the very end.

Here are some of the things I mentioned implemented,

code:
<#
    Powershell to hash email strings to SHA256
    This Will accept any file as input 
    *** format must be single email address per line ***
    Email addresses are converted to uppercase before hashing
#>

# File Browser Dialog
Add-Type -AssemblyName System.Windows.Forms
$FileBrowser = New-Object System.Windows.Forms.OpenFileDialog -Property @{ InitialDirectory = [Environment]::GetFolderPath('Desktop') }
$null = $FileBrowser.ShowDialog()
# Create output file name, and remove existing file with that name
$filename,$ext1 = $FileBrowser.FileName.split('.')
$hashfile = $filename+'.hash'

if (Test-Path -Path $hashfile) {
    Remove-Item -Path $hashfile
}

$hashList = New-Object System.Collections.Generic.List[System.String]
$hasher = [System.Security.Cryptography.HashAlgorithm]::Create('sha256')
$encoding = [System.Text.Encoding]::UTF8
$count = 0

#Hash each line, and add to hashList array
foreach($line in [System.IO.File]::ReadLines($FileBrowser.FileName))
{
       $line=$line.ToUpper()
       $hash = ($hasher.ComputeHash($encoding.GetBytes($line)))
       $hashString = [System.BitConverter]::ToString($hash).Replace('-','')
       $hashList.Add($hashString)
}


$hashList | Out-File -FilePath $hashfile -Append

####
#Cut out the GPG stuff, no comments there
###
With a list of 10000 email addresses it went from 3+ minutes to process down to less than 4 0.5 seconds just by implementing these changes.

This task would also be a good candidate for parallelization if you're looking at significantly larger lists.

PBS fucked around with this message at 17:28 on Apr 27, 2019

Gerdalti
May 24, 2003

SPOON!
That's some great advice. I'm not very good with power shell, so I'll look at implementing those Monday morning.

I couldn't get a definitive answer on how large the files will be, but experience has me thinking 500000 to 1500000 rows isn't out of the question.

Thanks!

PBS
Sep 21, 2015

Gerdalti posted:

That's some great advice. I'm not very good with power shell, so I'll look at implementing those Monday morning.

I couldn't get a definitive answer on how large the files will be, but experience has me thinking 500000 to 1500000 rows isn't out of the question.

Thanks!

Made a few more edits. It'll now process 1.5m rows in ~80 seconds on my machine.

Also, can be done fairly simply (and significantly more quickly) via python.

Python 3.6
code:
from tkinter.filedialog import askopenfilename
import time
import hashlib
import os.path

filename = askopenfilename()
starttime = time.time()

split_filename = filename.split('.')
hash_filename = split_filename[0] + '.hash'

if os.path.isfile(hash_filename):
    os.remove(hash_filename)

with open(filename, 'r', encoding='utf-8') as email_list:

    with open(hash_filename, 'w', encoding='utf-8') as hash_list:

        for line in email_list:
            line = line.strip().upper().encode('utf-8')
            hash = hashlib.sha256(line).hexdigest()
            hash_list.write(hash + '\n')

endtime = time.time()
totaltime = endtime - starttime
print(f'Total Time: {totaltime} Seconds')


Total Time: 6.09424614906311 Seconds
Lines: 1,500,000

PBS fucked around with this message at 18:19 on Apr 27, 2019

Proteus Jones
Feb 28, 2013



PBS posted:

Also, can be done fairly simply (and significantly more quickly) via python.

Yeah, Python is pretty much tailor made for this kind of stuff. But since they’re talking Powershell, I’m guessing Windows so they may not have/not be able to install Python.

Dirt Road Junglist
Oct 8, 2010

We will be cruel
And through our cruelty
They will know who we are

PBS posted:

Made a few more edits. It'll now process 1.5m rows in ~80 seconds on my machine.

Also, can be done fairly simply (and significantly more quickly) via python.

Python 3.6
code:
from tkinter.filedialog import askopenfilename
import time
import hashlib
import os.path

filename = askopenfilename()
starttime = time.time()

split_filename = filename.split('.')
hash_filename = split_filename[0] + '.hash'

if os.path.isfile(hash_filename):
    os.remove(hash_filename)

with open(filename, 'r', encoding='utf-8') as email_list:

    with open(hash_filename, 'w', encoding='utf-8') as hash_list:

        for line in email_list:
            line = line.strip().upper().encode('utf-8')
            hash = hashlib.sha256(line).hexdigest()
            hash_list.write(hash + '\n')

endtime = time.time()
totaltime = endtime - starttime
print(f'Total Time: {totaltime} Seconds')


Total Time: 6.09424614906311 Seconds
Lines: 1,500,000

Python is pretty great, but if you're stuck on any Powershell in the future, there's a megathread.
https://forums.somethingawful.com/showthread.php?threadid=3286440

PBS
Sep 21, 2015

Proteus Jones posted:

Yeah, Python is pretty much tailor made for this kind of stuff. But since they’re talking Powershell, I’m guessing Windows so they may not have/not be able to install Python.

Yeah, that's why I did the best I could in powershell first.

If you can get python on any machine of the same OS type you can also compile a python script into an executable, making it more portable.

Shut up Meg
Jan 8, 2019

You're safe here.
Usually for stuff like this, I highlight the best bits.
This is all best bits.

quote:

A 26-year-old internet entrepreneur faces up to 20 years behind bars in America, and a potential $250,000 fine, after attempt to steal a really not-very-good domain name.

While that may sound excessive, it was how Rossi Lorathio Adams II, of Cedar Rapids, Iowa, tried to get hold of the internet address doitforstate.com that put him in trouble: he got his cousin to break into the home of the man who owned the domain name, and demanded he transfer it at gunpoint.

The armed robbery went wrong when the domain owner, Ethan Deyo, thought that the gunman, 43-year-old Sherman Hopkins, was going to kill him and fought back. In the ensuing struggle, Deyo was shot in the leg but managed to get hold of the gun and shot Hopkins several times in the chest before calling the cops. A year later, Hopkins was sent down for 20 years.

Full details of what happened and why emerged last week during a four-day trial in Iowa, and the story is even crazier than we reported previously. Back in July 2017, we were confused as to why anybody would go to such extraordinary lengths for an internet address. It turns out that Adams had become obsessed with getting hold of the domain in order to build up his business of clips of drunk people doing stupid things.

Adams set up a company called "State Snaps" while a student of Iowa State University, and built up over a million followers on social media channels – including Snapchat, Instagram and Twitter – by posting short videos of drunk students doing idiotic things, often while semi-naked. The university wasn't amused and asked him to cut it out but Adams – going by the handle "Polo" – refused and tried to build a business out of it by running events and selling T-shirts with phrases like "Probably Drunk" as well as a common Iowa university slogan that followers had started putting on his posts: "Do it for State!" As part of this effort, Adams trademarked the hashtag #DoItForState and tried to register the domain doitforstate.com, but it was already registered to another Iowan, Ethan Deyo, and so he had to settle for the name doit4state.com instead.

Adams became obsessed with getting hold of the full spelled-out domain name, and things slowly escalated. In June 2015, Adams turned up to Deyo's house unannounced and told him he wanted to buy the domain name. Deyo – who had also trademarked the domain name – didn't want to sell. Adams didn’t let up, though, and kept contacting Deyo and his brother Christopher about purchasing the name. When Deyo stopped responding to him, Adams got his business partner to start asking for the domain – while instructing him not to let Deyo know that they knew one another. That effort failed, too, after he said he wanted $20,000 for the name and Adams wasn't willing to pay it.

A trial jury this month heard that Adams got increasingly aggressive – at one point sending gun emojis to someone that used doitforstate.com to promote concerts (Adams was trying to set up his site as a concert promotional tool, too). Then, in May 2017, he again turned up unannounced at Deyo's house wearing a "State Snaps" T-shirt, and told Christopher Deyo: "I'm here for the name whatever it takes. I'm not leaving without it." Deyo told the court that Adams punched his hand, presumably in an attempt at intimidation, but he again refused to sell the dot-com.

It was at this point that Adams persuaded his cousin, convicted felon Sherman Hopkins who was living in a homeless shelter at the time, to get the name through force. The details are extraordinary. Adams took Hopkins and a friend of his – David Davis – to a Target store where Davis bought two burner phones so Hopkins and Adams could communicate during the break-in. It was an effort to cover his tracks.

Then, on June 21, 2017 – Hopkins broke into Deyo's house equipped with the phone, a taser and a handgun. He had pulled nylons over his head and was wearing sunglasses in an effort to mask his identity. When he spotted Deyo at the top of a staircase, Hopkins yelled, "Come here, motherfucker!" and ran after him, kicking in Deyo's bedroom door, grabbing him and dragging him to the home office where his computer was. Hopkins then pulled out a handwritten note – which detectives later found Adams' palm print on – that detailed how to move the domain from Deyo's GoDaddy account to Adams'.domain

It included Adams' email address and his GoDaddy account details – an account that had several other domains in. Hopkins then put the gun against Deyo's head and told him to follow the instructions. Deyo duly did so but he needed to put in a mailing address and phone number to carry out the transfer and asked Hopkins what to type in; a request that neither Adams or Hopkins had planned for. Hopkins became infuriated and hit Deyo several times in the head with the butt of his gun and repeatedly tased him.

But the transfer still needed an address and phone number so Hopkins called Adams on the phones they had bought and ended up putting Deyo on the phone with the man that had bugging him and his brother for two years for the domain and was now trying to steal it through force. Deyo told the court he immediately recognized Adams' voice.

Adams gave Deyo an address and phone number to type in but during the exchange, Hopkins became increasingly agitated and started hitting Deyo again. Deyo testified that Hopkins told him: "This better be right. You better do this right. You know who you stole from. If you go to the police or tell anyone about this I’ll be back for you." Then, according to Deyo, he cocked the gun and threatened: "If this isn’t right I’m going to blow your loving head off!" Deyo pushed the gun away from his head and a fight broke out. The gun went off and a bullet hit Deyo in the leg. Fearing for his life, Deyo kept fighting and managed to get hold of the gun, before shooting Hopkins several times in the chest. Deyo then called the police and when they turned up they found Hopkins bleeding in his house.

Despite the whole plan having gone horribly wrong, Adams still thought he was going to get the domain, and the day after the botched robbery called GoDaddy to ask what had happened to a domain name he was expecting to see turn up in his account. By then of course, the police were all over the situation. They had Adams' note including the email address – rj_mr_adams123@yahoo.com – and GoDaddy account number which, amazingly, wasn't an untraceable account but Adams' long-standing personal account with all of his contact details.

The police soon found their way to Adams and when he was interviewed admitted that the email address was his and that he had tried to buy the domain. He admitted that he had been to Deyo's house in the past. He denied knowing about the phones before admitting he had been with Hopkins and Davis at the Target store but didn't know what was in the bag that Davis came out with, before admitting that he did know what was in the bag and had in fact given Davis the $100 to buy the phones.

It wasn't a difficult case, and after only an hour's deliberation the jury returned with a guilty verdict for Rossi Lorathio Adams II for "conspiracy to interfere with commerce by force, threats, and violence." He will be sentenced later this year, and faces a fine of up to $250,000 and a maximum jail sentence of 20 years – the same as his cousin who carried out the robbery. Which should give them both plenty of time to learn about search engine optimization.

mllaneza
Apr 28, 2007

Veteran, Bermuda Triangle Expeditionary Force, 1993-1952




PBS posted:

This assumes there's only one period in the filename, not a big deal really but could be a little confusing at some point.

OP wants to use $var.LastIndexOf('.') to find the very last period.

Thanks Ants
May 21, 2004

#essereFerrari


Shut up Meg posted:

Usually for stuff like this, I highlight the best bits.
This is all best bits.

At first I was “huh, you go to prison for domain squatting?” but then carried on reading and it was just :aaa:

PBS
Sep 21, 2015

Thanks Ants posted:

At first I was “huh, you go to prison for domain squatting?” but then carried on reading and it was just :aaa:

Amazing that anyone could be that stupid. Of course they could trace it back to him, the guy that had been harassing him for the name.

Thanks Ants
May 21, 2004

#essereFerrari


“Here just transfer the domain into this account in my name with all my other domains”

Data Graham
Dec 28, 2009

📈📊🍪😋



Next time I’m writing front-end form validation I’ll be thinking about a guy getting pistol-whipped while filling it in

Weedle
May 31, 2006




Data Graham posted:

Next time I’m writing front-end form validation I’ll be thinking about a guy getting pistol-whipped while filling it in

Add a check box labeled “I am currently being held at gunpoint,” which, if checked, dispatches the police to the submitter’s IP address.

PBS
Sep 21, 2015

Thanks Ants posted:

“Here just transfer the domain into this account in my name with all my other domains”

Even if he hadn't when he eventually setup a service at that domain it'd likely have been traceable back to him too.

There's a lot of layers of stupid there.

CitizenKain
May 27, 2001

That was Gary Cooper, asshole.

Nap Ghost
He didn't think that even after the robbery and the domain ended up in his account, that somehow just stay there? Like no one would ever go to the police?

Neddy Seagoon
Oct 12, 2012

"Hi Everybody!"

CitizenKain posted:

He didn't think that even after the robbery and the domain ended up in his account, that somehow just stay there? Like no one would ever go to the police?

He had his cousin tell the guy NOT to go to the police, didn't you pay attention? :pseudo:

Carth Dookie
Jan 28, 2013

Imagine waking up every day to the fact that you nearly got killed over an internet domain.

Decades of leaded gas fumes have made us crazy as a species.

Javid
Oct 21, 2004

:jpmf:
See, if you told me "a guy was robbed of a domain registration at gunpoint"... I can imagine a scenario where some online scammer has some untraceable hosting and false registration credentials to point it at, and just ties the dude up for a few hours while they hoover up people's login info or whatever, and the few hours they get are enough to be worth the effort.

But no, he thought he could just steal a domain name forever and nobody would figure that out.

Winifred Madgers
Feb 12, 2002

Carth Dookie posted:

Imagine waking up every day to the fact that you nearly got killed over an internet domain.

Decades of leaded gas fumes have made us crazy as a species.

The truth is even more unbearable: we're inherently like this with or without gas fumes.

Bigass Moth
Mar 6, 2004

I joined the #RXT REVOLUTION.
:boom:
he knows...

CitizenKain posted:

He didn't think that even after the robbery and the domain ended up in his account, that somehow just stay there? Like no one would ever go to the police?

He was hoping the other guy would be too intimidated to ever report it.

Shut up Meg
Jan 8, 2019

You're safe here.
I'll be honest, I would not be surprised if one of you relates an IT story where your boss hands you a gun.

Adbot
ADBOT LOVES YOU

The Fool
Oct 16, 2003


Shut up Meg posted:

I'll be honest, I would not be surprised if one of you relates an IT story where your boss hands you a gun.

I have one, but it was because my boss was buying the gun and wanted to show it off. Nothing exciting happened.

Unrelated, the guy he bought the gun from is in prison now.

  • 1
  • 2
  • 3
  • 4
  • 5