0
1

[–] ArsCortica 0 points 1 point (+1|-0) ago 

It certainly would explain why the hack targetted Ashley Madisons prime platform and another side platform for men seeking younger women (read: sugardaddies seeking prostitutes) but not its second side-platform for older women seeking younger men.

Oh the irony.

2
-1

[–] Clientkill 2 points -1 points (+1|-2) ago 

It really bugs me that people are using "woman" as an adjective lately

1
1

[–] Tecktonik 1 point 1 point (+2|-1) ago 

On the one hand, McAfee was once a well known security guy and might have some good experience here. On the other hand, the last I had heard he was on the run from officials in Belize for suspected murder... but according to Wikipedia he is now safe in the US again.

[–] [deleted] 0 points 2 points (+2|-0) ago 

[Deleted]

0
1

[–] arrggg [S] 0 points 1 point (+1|-0) ago 

Yeah, his new projects are pretty cool. http://www.futuretensecentral.com/

1
3

[–] HelloBuddy1234 1 point 3 points (+4|-1) ago 

I know John McAfee is a nut that has been living off his .com boom millions for the last decade, but I decided to entertain this article since maybe he knows some people. This article is a joke though. His first technical analysis to support the lone insider idea is:

"the data contains actual MySQL database dumps. This is not just someone copying a table and making into a .csv file. Hackers rarely have full knowledge of the technology stack of a target."

What a silly comment. Hackers rarely know how to use MySQL, the web's most popular database? And mysqldump is the primary method to backup a MySQL database. I don't even know how to do it any other way. The syntax is literally mysqldump -u [username] -p [password] [database_name] > dump.sql. Ohhhh, but a hacker wouldn't know that because it requires knowledge of the "technology stack"?

1
-1

[–] Malevolence 1 point -1 points (+0|-1) ago 

Hell, I'm not a hacker but even I know how to use MySQL.

1
2

[–] TravelGuy 1 point 2 points (+3|-1) ago 

He wasn't saying the hackers don't know how to use mysql. He was saying that they rarely know the target technology.

0
0

[–] stradian ago 

There are two predominant web stack solutions: Microsoft's web services on Windows Server with Access, and LAMP (Linux, Apache, MySQL, php). Chances are its most likely MySQL, then Access, then a text document...

0
2

[–] Tecktonik 0 points 2 points (+2|-0) ago 

That in itself is a dubious notion - that the tools and skills hackers use to hack are unrelated to "target technology". But then how would they even know what data to steal, since they are ignorant of how website technology works? Could they not, maybe, perhaps, learn about these things? Knowing how a website is put together isn't exactly a secret anymore.