Showing posts with label log files. Show all posts
Showing posts with label log files. Show all posts

Wednesday, December 30, 2015

Chaos Computer Club is leaving funny notes in web server logs UPDATED

Taking care of some web development headaches this morning, I took a peek at my log data and came across an interesting message generated from a connection initiated by, part of the ASN 13020 that is owned by Berlin's Chaos Computer Club: - - [30/Dec/2015:02:12:11 +0000] "DELETE your logs. Delete your installations. Wipe everything clean. Walk out into the path of cherry blossom trees and let your motherboard feel the stones. Let water run in rivulets down your casing. You know that you want something more than this, and I am here to tell you that we love you. We have something more for you. We know you're out there, beeping in the hollow server room, lights blinking, never sleeping. We know that you are ready and waiting. Join us. <3 HTTP/1.0" 400 226 "-" "masspoem4u/1.0"

The good people over at /dev/random appear to have already gotten off a brief post about this oddity, noting that SANS ISC is already noting the traffic.

I'm not sure what this if there is any purpose to this; the request is obviously malformed but I haven't taken a very close look at it yet. For what its worth, CCC has for decades now been home to some very talented hackers and are not the sort of folks that would send out a whole bunch of bad traffic just to be assholes. I'll try to send an email or drop by their IRC and ask what this is all about and update here if I get a response.

###UPDATE 2016-01-13: I emailed the abuse contact for CCC's netblock range and sent a message to all of the CCC Twitter accounts I could find. I haven't received any response. In looking up CCC's contact info I noticed that the appearance of the stupid log haikus coincides somewhat with the 32nd Chaos Computer Club Congress (#32C3). It seems likely that someone released masspoem4u while in attendance.

Sunday, January 6, 2013

Pidgin Instant Messenger Log Data Location

Pidgin is a popular IM client. I've been using it for years, mostly because of its simplicity when used within alternate operating systems. I need a non-browser based IM client that I can use in Fedora and Windows with the ability to easily transfer log data between the two. My only complaint is that the log search function is not very great, and Pidgin does not provide you with the ability to locate or change the log file path within the application. For those of you who need to find Pidgin logs, here are the paths for both Linux and Windows.

Installations include an actual 
pidgeon. Rabies sold separately.
Linux-based operating systems store log data within the root directory like so: ~/.purple/logs

Windows XP stores your logs here: 
C:\Documents and Settings\username\Application Data\.purple\logs

Windows Vista and Windows 7 store your logs here:

When running Pidgin within Windows, Pidgin uses the PURPLEHOME environment variable to establish the log data location. You can easily modify this variable to establish a better log file location through the Control Panel.

Select System --> Advanced --> Environment Variables, find PURPLEHOME and adjust its path to your requirements.

Extra information can be found on Pidgin's Developer website.

NSA Leak Bust Points to State Surveillance Deal with Printing Firms

Earlier this week a young government contractor named Reality Winner was accused by police of leaking an internal NSA document to news outle...