Betting pages

I recently read that they have arrested several people related to the attack on an online betting company.

The good thing is that the assailants were the owners and workers of another company in the same sector.

The problem was that they deleted important information from the affected company through SQL injection attacks causing costs that amounted to about 18,000 euros, I believe.

The SQL injection is no mystery, anyone can prepare huge destruction without much knowledge, the thing is to try .. and as proof of this is that the “assailants” did all this directly from the headquarters of your company, so the The police did not have many problems in identifying them.

Someone who pretends to do something like that and does not want to be caught, would have entered from a public place, using proxies, anonymous networks, but not from his place of work and with his ip exposed.

It is best not to do anything, and if you do take care to say it, if not, look at what has happened to a US student. that without computer knowledge he accessed some internal servers of the institute where he studied, when he went to communicate it to the people in charge of the computer center so that they solved the problem, they denounced him and he faces a trial.


In the release section of the GPS mio 268 I added a new section of radars, updated to date of 04.13 07 to avoid scares with the purse and the points, although it would be better not to run .. and also new section to be able download the rest of the maps of europe.

Some comments have been added in the rest of the article to clarify certain things.

How to hunt the “bad guys” online

For some time the company responsible for the game “Dream Pinball 3D” threatened to sue all those who share this game by any p2p network, then, said and done, all those who shared it now face a trial for it.

And how did they know they had shared it?

They use a modified version of a P2P application configured to request the files to be traced. This monitoring application connects an exchange network, downloads a fragment of the files to be tracked and records the data (name and size of the file, IP address, P2P application used, time and user name) of the sources from which perform the download. The monitoring application itself performs a reverse whois search based on the IP address and obtains the Internet provider on which it depends, to which it sends a letter informing it of the alleged infraction. Subsequently, the collected data is sent to the judge so that he orders the provider to fully identify the user …

The defendants have already protested, first because the method to hunt them has been the same for which they have been accused, for sharing and second because they are only the owners of an internet connection and this does not mean that they were the ones who shared, in many cases there are wireless networks (or not) without protection and anyone has access.