a reply to:
DontTreadOnMe
Sounds good! I replied, but I'll message you again just in case. I appreciate your help very much!
Good night
I was just reading Djarum's thread and wow: "So how did we get to where we are now? How am I back on my name? Interesting story... We've got a friend.
Said friend is good with computers and was able to look into what happened to us. We were told that the database that holds members' passwords was non
functional, as was the database that holds members' emails. So that is why passwords did not work as well as the password reset emails. Both were
toast. Let me clarify immediately that we do not know if the damage to those databases was intentional or not."
Interesting. From my knowledge of computers and coding I'd say yes, someone messed up the code intentionally. I've been making websites and such since
I was 11, back around Y2K. Anyway, I would consider myself an expert with regards to website design and coding. I do think that someone did this on
purpose, most likely, as it's the Occam's Razor answer. A system and coding doesn't just change itself. An authorized administrator typically has the
ability to manipulate the FTP source that you're using to upload ATS and all of its components.
Therefore, the culprit is someone who has access to the forum's FTP source.
You're looking for someone who messed up code and caused the system to malfunction. It probably wasn't even a lot of code. I would think removing some
brackets here and there or deleting some lines of code partially would be more than enough to cause the problem. It would take less than five minutes
to do. I bet that whoever did this has been playing around with it for a while, which would explain why I've had issues with the password and getting
locked out as early as February 2023. The next instance was in June. Then the latest one happened in October. It's not a one-off, is my point, which
makes it appear to be the work of one of the administrators or (less likely) a hacker. I think it's more likely the culprit is someone who didn't need
to hack into the system. Whoever is playing around with code has been doing so freely, which doesn't fit the bill of a hacker who tries to be unseen.
Anyway, the person responsible has computer knowledge and might be in charge of certain aspects of the ATS website such as updates etc.
The only way this wasn't purposeful is if the system you use to host the site just changed and user error resulted in not backing up passwords. Like
you hired someone who didn't know what they were doing in the FTP source and they accidentally messed up lines of code for email and passwords.
Your system reminds me of one I worked on when I worked at the transfer agency. I was in charge of editing the official verbiage for corporate actions
etc and also in charge of fixing bad code that was running rampant through our electronic library of thousands of companies of stock. Bad code in one
area that is linked to other programs can easily cause mass destruction and chaos.
So I noticed that this happened twice before this last time in October. I don't know if others experienced this multiple times, but I sure did. I
think the owners and MODs need to check the data log and see who has been altering the code or layout. That said, I would be surprised if the person
behind this wasn't an MOD or admin.
TLDR: I'm not about to say I know who it could be, but if anything I said rings a bell or sounds familiar, it might be worth looking into further.
Hope I helped.
I'd be happy to look at your code and fix things, too. Again, check the data logs to get a printout of who accessed what at what
time and what changes were saved. I doubt they're using a VPN, so you should be able to locate their IP address once you pinpoint a smaller pool of
possible suspects.
Happy hunting! Kinda reminds me of Mike Tyson's Mysteries or something.
Peace dudes
edit on ❥11/23 by Abhorsen because: (no reason given)