Hacker News new | past | comments | ask | show | jobs | submit | ddbbcc's comments login

Agree. Most CFP also only provide an email address (not a form), so he can spam it to death as well ...


It seems to hide an iframe call to http://falosfax.in/info/in.cgi?


There is a site scanner here: http://sitecheck.sucuri.net (free)


Scanning "http://www.mysql.com returns "Verified Clean"...


They fixed it..


Going there and being redirected to mixergy.com/hi/ which asks for my email address... Anyone else getting that?

*edit: It only happens on a browser that haven't visited the site before.


For a company at their size, they probably already have those internal logs in place (for debugging, security, etc). Would be nice if they opened it up to the en d users.


Debugging/security logs are probably one of the last things that I'd want to hand over to customers without some serious scrubbing first. Either on purpose or accidentally (backtraces, var dumps) I've found things that I wouldn't want turned over to customers (passwords, access tokens, etc.) in logs of various project I've worked on. That var dump on a random object that was put in when tracking down some issue that could only reproduce on production seems innocent enough until someone adds an object to that one and all of a sudden the logs have passwords/account balances/etc. in them. Even if you are scrubbing them, handing over the debug/security logs just seems to introduce too large a point where you could accidentally leak information. The safe solution is to build out logging as a feature and then I completely agree with patio11 that if you need audit trails etc. you're in the enterprise game now and it (rightfully so) comes with a price tag to match.


They have the logs. They don't have it in a form which they can give to you, and they don't have an easy way to expose them to you.

Imagine if every piece of data that involves their cloud service is accessed using a custom piece of code and spread across a multitude of locations all over their network, unsorted. Now they have to build an application which can consolidate a specific customer's logs and provide an interface for them to download it. It's certainly "doable", but it's also probably the very last feature they're thinking about implementing.


Even ignoring other commenters' valid concerns about sensitive data stored in logs, this can be a tough thing to scale.

Say the logs live on disk on a filer somewhere. Need to do a security investigation? OK, dig up the file the logs are in for that particular user and grep around. Lots of disk seeks, but pretty fast.

Scaling that to support production-scale queries is a significant undertaking. (Oh, you can only do 100 seeks per second, need on average 100 seeks per query, and desire to service a low demand of 100 qps? Not gunna happen!)


Loved the interview, but what that cake from freshbooks mean? Does anyone sign up to win a cake?


Anyone that says "the cake is a lie" will get hurt.


Hey Everyone!

Saul from FreshBooks here. The cake is real...I promise. When you sign up and say you heard about us from the Podcast we pick on person a day to get a cake.

A delicious one.

s!


i think you sign up at freshbooks, let freshbooks know that mixergy referred you and you will get a cake.. maybe by dropping a note after signup or some coupon code field or something like that..


It is facebook. What would you expect? It is the same thing if Google didn't allowed facebook in their search results. Both "own" a monopoly and shouldn't be allowed to do such things.


It's not the same. Facebook is a social networking site. Google advertises to be a single stop indexer of all web sites.


Actually, the captcha is quite easy to extract (and solve), so it will probably filter out humans, not bots :)


Yes, related to the HBGary/Anonymous incident...The whole database was posted online.


About this attack, I am curious if that was targeting a specific web site or just the whole inf? Can you share the details? How many different IPs?


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: