Stephanie Alarcon on 14 Jul 2010 06:07:44 -0700

[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

Re: [PLUG] really dumb ubuntu question

  • From: Stephanie Alarcon <>
  • To:
  • Subject: Re: [PLUG] really dumb ubuntu question
  • Date: Wed, 14 Jul 2010 09:05:16 -0400
  • Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed;; s=gamma; h=domainkey-signature:received:received:message-id:date:from :user-agent:mime-version:to:subject:content-type :content-transfer-encoding; bh=d/M6umQguqrd0i6twT6MlMxWmdXvEICgLmhglnV4ofk=; b=QzR3ylG7JZJ9TYsfJICapHAYXG/Nq/EAlx6eOXt/97aY86zQS8b5RMf2plyWfaLpj9 IgsI8oaFKpIZeFMZ+TYG6ruHn/Eot0XyyNeWFMcKzvCnX13Q/SJ8QfPNk1y1J3fqkBh7 TT2C+nfK9wmxaURrsQXKp3L/MfE6y6MmIQUWo=
  • Reply-to: Philadelphia Linux User's Group Discussion List <>
  • Sender:
  • User-agent: Mozilla/5.0 (X11; U; Linux x86_64; en-US; rv: Gecko/20100430 Fedora/3.0.4-2.fc11 Thunderbird/3.0.4

For those following along at home:

Yeah, done and done.  From root's history it looks like I actually
deleted the whole wireless directory from out of the collection of
kernel modules.  That's kind of good news, because it should mean that
she can just reinstall the driver packages and be on her way.  The
history also showed that it was an ipw2200 driver, so I think the fix is
close at hand. Also, I have a dear friend and geek near her who is ready and able to be physically dispatched to help, which is totally above and beyond.

Also, the "firewall by mac" suggestion is totally reasonable, but the comment about allowed use in front of parents was right on. Also, they have a Verizon branded FIOS 2-in-1 thingy. I think I glanced at the interface, rolled my eyes, and moved on. That, or I just wanted to deal with machine itself.

Not the most elegant hack, but it allowed her to keep root access in case she wanted to play or install things, and I felt like if she figured it out, she deserved to have access in her room. Her parents sort of agreed.

On 07/14/2010 08:34 AM, Edmond Rodriguez wrote:
Another thought occurred to me besides the idea of getting the person
connected with an ethernet cable and doing a reverse shell to get

If the shell was not used much, and the last thing you did was take out the
wireless, you might be able to just use the history from the commands and
find out exactly what you did.
Philadelphia Linux Users Group         --
Announcements -
General Discussion  --