That only clears out the current monitoring session AFAIK, it doesn't
remove entries from previous aircontrol or aircontrol2 server instances. I
created a script to do this previously that took a flat file ip list input.

On Tue, May 17, 2016 at 6:12 PM, Jesse DuPont <jesse.dup...@celeritycorp.net
> wrote:

> In the AC2 client connected to your test server, right-click each
> monitored device, choose Stop Monitoring. After that, right-click each one
> and choose Remove.
>
> *Jesse DuPont*
>
> Network Architect
> email: jesse.dup...@celeritycorp.net
> Celerity Networks LLC
>
> Celerity Broadband LLC
> Like us! facebook.com/celeritynetworksllc
>
> Like us! facebook.com/celeritybroadband
> On 5/17/16 5:10 PM, That One Guy /sarcasm wrote:
>
> whats the method to clear these ones out effectively
>
>
> On Tue, May 17, 2016 at 1:27 PM, Josh Reynolds <j...@kyneticwifi.com>
> wrote:
>
>> HRRRRNNNGGG don't do that.
>>
>> Every time you spin up and then kill an aircontrol server that you
>> managed devices from, those devices will FOREVER try and report to that
>> aircontrol server. Up to 4 or 5 per device. That generates a lot of ARP
>> every 60 seconds or so when those servers don't exist anymore.
>>
>> It takes manual intervention via scripting on each device to get them
>> clean.
>>
>> Put up a real server / vm, associate devices, and be done with it. Linux
>> works best (by far).​
>>
>> On Tue, May 17, 2016 at 1:21 PM, That One Guy /sarcasm <
>> thatoneguyst...@gmail.com> wrote:
>>
>>> this was just a test install of ac2, if i reinstall on another machine
>>> and kill this one, what do i need to do to control the devices from that?
>>>
>>> On Tue, May 17, 2016 at 1:07 PM, Josh Reynolds <j...@kyneticwifi.com>
>>> wrote:
>>>
>>>> nothing monitors toughswitches. not really.
>>>>
>>>> kill them with fire anyway
>>>>
>>>> On Tue, May 17, 2016 at 12:35 PM, That One Guy /sarcasm <
>>>> <thatoneguyst...@gmail.com>thatoneguyst...@gmail.com> wrote:
>>>>
>>>>> thats what i did, didnt find anything
>>>>>
>>>>> just found out, you apprently should not add a toghswitch, the UI is
>>>>> hanging now...thats the ubnt ive come to know :-)
>>>>>
>>>>> On Tue, May 17, 2016 at 12:33 PM, Ty Featherling <
>>>>> <tyfeatherl...@gmail.com>tyfeatherl...@gmail.com> wrote:
>>>>>
>>>>>> Discovery only works on layer 2. You have to switch it to IP mode and
>>>>>> just type in subnets like so "10.10.5.0/24, 10.11.5.0/24, " and so
>>>>>> on.
>>>>>>
>>>>>>
>>>>>>
>>>>>> -Ty
>>>>>>
>>>>>> On Tue, May 17, 2016 at 12:27 PM, That One Guy /sarcasm <
>>>>>> <thatoneguyst...@gmail.com>thatoneguyst...@gmail.com> wrote:
>>>>>>
>>>>>>> I still need to read up on how to scan subnets, it fails to add
>>>>>>> anything. I have to manually add the device
>>>>>>>
>>>>>>> On Tue, May 17, 2016 at 12:22 PM, Ty Featherling <
>>>>>>> <tyfeatherl...@gmail.com>tyfeatherl...@gmail.com> wrote:
>>>>>>>
>>>>>>>> I wish they hadn't abandoned it. It is one of the best things about
>>>>>>>> running a ubnt network. I have mine scan my subnets every night so I 
>>>>>>>> have
>>>>>>>> monitoring of all radios from the start.
>>>>>>>> On May 17, 2016 12:04 PM, "That One Guy /sarcasm" <
>>>>>>>> <thatoneguyst...@gmail.com>thatoneguyst...@gmail.com> wrote:
>>>>>>>>
>>>>>>>>> holy dog balls, that was a simple install and simple
>>>>>>>>> configuration. UBNT and beta together always scares me, but this is a 
>>>>>>>>> slick
>>>>>>>>> tool. Chuck M must have overseen it since it actually works
>>>>>>>>>
>>>>>>>>> On Tue, May 17, 2016 at 11:17 AM, That One Guy /sarcasm <
>>>>>>>>> <thatoneguyst...@gmail.com>thatoneguyst...@gmail.com> wrote:
>>>>>>>>>
>>>>>>>>>> is the windows server variant heavy?
>>>>>>>>>>
>>>>>>>>>> On Tue, May 17, 2016 at 11:16 AM, That One Guy /sarcasm <
>>>>>>>>>> <thatoneguyst...@gmail.com>thatoneguyst...@gmail.com> wrote:
>>>>>>>>>>
>>>>>>>>>>> nm, i see it now
>>>>>>>>>>>
>>>>>>>>>>> On Tue, May 17, 2016 at 11:15 AM, That One Guy /sarcasm <
>>>>>>>>>>> <thatoneguyst...@gmail.com>thatoneguyst...@gmail.com> wrote:
>>>>>>>>>>>
>>>>>>>>>>>> can you point me to where i would get it
>>>>>>>>>>>>
>>>>>>>>>>>>
>>>>>>>>>>>> On Tue, May 17, 2016 at 11:14 AM, Ty Featherling <
>>>>>>>>>>>> <tyfeatherl...@gmail.com>tyfeatherl...@gmail.com> wrote:
>>>>>>>>>>>>
>>>>>>>>>>>>> Current AC2 is beta 21. I just installed it myself after a
>>>>>>>>>>>>> failed upgrade from my old beta 12 install. It will do mass 
>>>>>>>>>>>>> firmware
>>>>>>>>>>>>> updates, password changes, and a set number of other 
>>>>>>>>>>>>> configuration changes.
>>>>>>>>>>>>> The only 2 things I wish it did that it doesn't are firewall 
>>>>>>>>>>>>> updates and
>>>>>>>>>>>>> viewing bridge tables for devices. Great tool for everything 
>>>>>>>>>>>>> else. I
>>>>>>>>>>>>> installed the local beta of the new CRM thing and It seems like 
>>>>>>>>>>>>> it barely
>>>>>>>>>>>>> does anything by comparison. If you go the the forums and find 
>>>>>>>>>>>>> the AC2 beta
>>>>>>>>>>>>> forum, the first sticky post is the latest version.
>>>>>>>>>>>>>
>>>>>>>>>>>>> -Ty
>>>>>>>>>>>>>
>>>>>>>>>>>>>
>>>>>>>>>>>>>
>>>>>>>>>>>>> -Ty
>>>>>>>>>>>>>
>>>>>>>>>>>>> On Tue, May 17, 2016 at 11:07 AM, That One Guy /sarcasm <
>>>>>>>>>>>>> <thatoneguyst...@gmail.com>thatoneguyst...@gmail.com> wrote:
>>>>>>>>>>>>>
>>>>>>>>>>>>>> We need to do some mass password changes and verification of
>>>>>>>>>>>>>> the firmware, I assume this AC2 does this, can somebody point me 
>>>>>>>>>>>>>> to the
>>>>>>>>>>>>>> most current iteration of this? We do have the beta access. Im 
>>>>>>>>>>>>>> just fearful
>>>>>>>>>>>>>> of wandering too much on the forum looking.
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> Will AC2 let me add configurations en mass? I need to change
>>>>>>>>>>>>>> and add some settings, if there is a fairly simple way of doing 
>>>>>>>>>>>>>> this
>>>>>>>>>>>>>> (preferably with error checking) assuming that AC2 doesnt do it 
>>>>>>>>>>>>>> I would
>>>>>>>>>>>>>> sure appreciate some pointers (that dont assume I am a script 
>>>>>>>>>>>>>> magician)
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> On Tue, May 17, 2016 at 10:56 AM, Josh Reynolds <
>>>>>>>>>>>>>> <j...@kyneticwifi.com>j...@kyneticwifi.com> wrote:
>>>>>>>>>>>>>>
>>>>>>>>>>>>>>> You want a toe? I can get you a toe, believe me. There are
>>>>>>>>>>>>>>> ways, Dude. You don't wanna know about it, believe me.
>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>> Hell, I can get you a toe by 3 o'clock this afternoon...
>>>>>>>>>>>>>>> with nail polish.
>>>>>>>>>>>>>>> On May 17, 2016 9:43 AM, "CBB - Jay Fuller" <
>>>>>>>>>>>>>>> <par...@cyberbroadband.net>par...@cyberbroadband.net> wrote:
>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>> I WILL SEND YOU A BILL!!! (FOR YOUR HATE)))
>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>> hah
>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>> ----- Original Message -----
>>>>>>>>>>>>>>>> *From:* Ty Featherling <tyfeatherl...@gmail.com>
>>>>>>>>>>>>>>>> *To:* <af@afmug.com>af@afmug.com
>>>>>>>>>>>>>>>> *Sent:* Tuesday, May 17, 2016 8:29 AM
>>>>>>>>>>>>>>>> *Subject:* Re: [AFMUG] ubnt malware
>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>> We're the hatiest! Our hate is refined though, and
>>>>>>>>>>>>>>>> surgically applied. The forums are more like monkeys throwing 
>>>>>>>>>>>>>>>> their
>>>>>>>>>>>>>>>> hate-shit indescriminately.
>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>> -Ty
>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>> On Tue, May 17, 2016 at 8:26 AM, Bill Prince <
>>>>>>>>>>>>>>>> <part15...@gmail.com>part15...@gmail.com> wrote:
>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>> All your hate are belong to us.
>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>> bp
>>>>>>>>>>>>>>>>> <part15sbs{at}gmail{dot}com>
>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>> On 5/17/2016 6:25 AM, Chuck McCown wrote:
>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>> Hey, we got hate here... I hate it when people complain
>>>>>>>>>>>>>>>>> about our lack of hate.  We can hate with the best of them, 
>>>>>>>>>>>>>>>>> just choose to
>>>>>>>>>>>>>>>>> reserve it for a better time and place...  afmug: higher 
>>>>>>>>>>>>>>>>> quality hate
>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>> *From:* Ty Featherling <tyfeatherl...@gmail.com>
>>>>>>>>>>>>>>>>> *Sent:* Tuesday, May 17, 2016 7:21 AM
>>>>>>>>>>>>>>>>> *To:* <af@afmug.com>af@afmug.com
>>>>>>>>>>>>>>>>> *Subject:* Re: [AFMUG] ubnt malware
>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>> When Steve comes back from somewhere complaining of too
>>>>>>>>>>>>>>>>> much hate, you know that place is a hell-hole.
>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>> -Ty
>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>> -Ty
>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>> On Tue, May 17, 2016 at 4:48 AM, That One Guy /sarcasm <
>>>>>>>>>>>>>>>>> <thatoneguyst...@gmail.com>thatoneguyst...@gmail.com>
>>>>>>>>>>>>>>>>> wrote:
>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>> holy nuggets of hate. I just got done reading the 31
>>>>>>>>>>>>>>>>>> pages of hate, now i remember why i dont ever go there
>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>> On Tue, May 17, 2016 at 12:49 AM, That One Guy /sarcasm <
>>>>>>>>>>>>>>>>>> <thatoneguyst...@gmail.com>thatoneguyst...@gmail.com>
>>>>>>>>>>>>>>>>>> wrote:
>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>> wow, port 19081 turns out to be pretty popular
>>>>>>>>>>>>>>>>>>> one im cleaning up now has a child connection active in
>>>>>>>>>>>>>>>>>>> it since i logged in, im curious what its doing
>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>> On Mon, May 16, 2016 at 10:55 PM, Mathew Howard <
>>>>>>>>>>>>>>>>>>> <mhoward...@gmail.com>mhoward...@gmail.com> wrote:
>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>> ...unless of course it gets on a PC at the office... in
>>>>>>>>>>>>>>>>>>>> which case we'd be in trouble.
>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>> On Mon, May 16, 2016 at 10:53 PM, Mathew Howard <
>>>>>>>>>>>>>>>>>>>> <mhoward...@gmail.com>mhoward...@gmail.com> wrote:
>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>> True! but that hasn't happened yet, and it still
>>>>>>>>>>>>>>>>>>>>> shouldn't get beyond that customer's radio.
>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>> On Mon, May 16, 2016 at 9:35 PM, Mike Hammett <
>>>>>>>>>>>>>>>>>>>>> <af...@ics-il.net>af...@ics-il.net> wrote:
>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>> Until it gets delivered via Flash or Java or
>>>>>>>>>>>>>>>>>>>>>> something else...   ;-)
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>> -----
>>>>>>>>>>>>>>>>>>>>>> Mike Hammett
>>>>>>>>>>>>>>>>>>>>>> Intelligent Computing Solutions
>>>>>>>>>>>>>>>>>>>>>> <http://www.ics-il.com/>
>>>>>>>>>>>>>>>>>>>>>> <https://www.facebook.com/ICSIL>
>>>>>>>>>>>>>>>>>>>>>> <https://plus.google.com/+IntelligentComputingSolutionsDeKalb>
>>>>>>>>>>>>>>>>>>>>>> <https://www.linkedin.com/company/intelligent-computing-solutions>
>>>>>>>>>>>>>>>>>>>>>> <https://twitter.com/ICSIL>
>>>>>>>>>>>>>>>>>>>>>> Midwest Internet Exchange
>>>>>>>>>>>>>>>>>>>>>> <http://www.midwest-ix.com/>
>>>>>>>>>>>>>>>>>>>>>> <https://www.facebook.com/mdwestix>
>>>>>>>>>>>>>>>>>>>>>> <https://www.linkedin.com/company/midwest-internet-exchange>
>>>>>>>>>>>>>>>>>>>>>> <https://twitter.com/mdwestix>
>>>>>>>>>>>>>>>>>>>>>> The Brothers WISP <http://www.thebrotherswisp.com/>
>>>>>>>>>>>>>>>>>>>>>> <https://www.facebook.com/thebrotherswisp>
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>> <https://www.youtube.com/channel/UCXSdfxQv7SpoRQYNyLwntZg>
>>>>>>>>>>>>>>>>>>>>>> ------------------------------
>>>>>>>>>>>>>>>>>>>>>> *From: *"Mathew Howard" < <mhoward...@gmail.com>
>>>>>>>>>>>>>>>>>>>>>> mhoward...@gmail.com>
>>>>>>>>>>>>>>>>>>>>>> *To: *"af" < <af@afmug.com>af@afmug.com>
>>>>>>>>>>>>>>>>>>>>>> *Sent: *Monday, May 16, 2016 9:16:40 PM
>>>>>>>>>>>>>>>>>>>>>> *Subject: *Re: [AFMUG] ubnt malware
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>> If you have firewall rules at the edge of the network
>>>>>>>>>>>>>>>>>>>>>> blocking the management ports ti the airrouters that are 
>>>>>>>>>>>>>>>>>>>>>> on public IPs,
>>>>>>>>>>>>>>>>>>>>>> they're probably fine. We still have some radios that 
>>>>>>>>>>>>>>>>>>>>>> are on old firmware,
>>>>>>>>>>>>>>>>>>>>>> but   I haven't been able to find anything on our 
>>>>>>>>>>>>>>>>>>>>>> network that's infected.
>>>>>>>>>>>>>>>>>>>>>> Fortunately, when I was setting up the firewall rules to 
>>>>>>>>>>>>>>>>>>>>>> block access to
>>>>>>>>>>>>>>>>>>>>>> the CPEs from outside our network, I decided it was 
>>>>>>>>>>>>>>>>>>>>>> desirable to block
>>>>>>>>>>>>>>>>>>>>>> customers from being able to get to other customers 
>>>>>>>>>>>>>>>>>>>>>> radios as well... which
>>>>>>>>>>>>>>>>>>>>>> should break the self replicating part of this thing, so 
>>>>>>>>>>>>>>>>>>>>>> even if it does
>>>>>>>>>>>>>>>>>>>>>> somehow get into our network, it shouldn't be able to 
>>>>>>>>>>>>>>>>>>>>>> get far.
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>> That said, I'm updating everything that isn't on at
>>>>>>>>>>>>>>>>>>>>>> least 5.6.2 right away.
>>>>>>>>>>>>>>>>>>>>>> On May 16, 2016 8:41 PM, "That One Guy /sarcasm" <
>>>>>>>>>>>>>>>>>>>>>> <thatoneguyst...@gmail.com>thatoneguyst...@gmail.com>
>>>>>>>>>>>>>>>>>>>>>> wrote:
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>> yeah, thats amazing me, one fella was complaining
>>>>>>>>>>>>>>>>>>>>>> about how much of a problem it would be to take a unit 
>>>>>>>>>>>>>>>>>>>>>> offline to get on a
>>>>>>>>>>>>>>>>>>>>>> bench. I would think if things are that bad that your 
>>>>>>>>>>>>>>>>>>>>>> network is
>>>>>>>>>>>>>>>>>>>>>> progressively shutting down, convenience would be the 
>>>>>>>>>>>>>>>>>>>>>> least of your
>>>>>>>>>>>>>>>>>>>>>> concerns.
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>> I have to investigate a couple anomalies on the
>>>>>>>>>>>>>>>>>>>>>> network, in the back of my mind Im hoping the air 
>>>>>>>>>>>>>>>>>>>>>> routers have been hit to
>>>>>>>>>>>>>>>>>>>>>> put a nail in their coffins so we cam go with mikrotiks 
>>>>>>>>>>>>>>>>>>>>>> as the CPE router
>>>>>>>>>>>>>>>>>>>>>> instead
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>> On Mon, May 16, 2016 at 8:33 PM, Josh Reynolds <
>>>>>>>>>>>>>>>>>>>>>> <j...@kyneticwifi.com>j...@kyneticwifi.com> wrote:
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>> Or threatening to sue because of their own personal
>>>>>>>>>>>>>>>>>>>>>>> ignorance and negligence.
>>>>>>>>>>>>>>>>>>>>>>> On May 16, 2016 8:32 PM, "Mike Hammett" <
>>>>>>>>>>>>>>>>>>>>>>> <af...@ics-il.net>af...@ics-il.net> wrote:
>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>> A good amount of it is just people that don't know
>>>>>>>>>>>>>>>>>>>>>>>> any better making false observations.
>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>> -----
>>>>>>>>>>>>>>>>>>>>>>>> Mike Hammett
>>>>>>>>>>>>>>>>>>>>>>>> Intelligent Computing Solutions
>>>>>>>>>>>>>>>>>>>>>>>> <http://www.ics-il.com/>
>>>>>>>>>>>>>>>>>>>>>>>> <https://www.facebook.com/ICSIL>
>>>>>>>>>>>>>>>>>>>>>>>> <https://plus.google.com/+IntelligentComputingSolutionsDeKalb>
>>>>>>>>>>>>>>>>>>>>>>>> <https://www.linkedin.com/company/intelligent-computing-solutions>
>>>>>>>>>>>>>>>>>>>>>>>> <https://twitter.com/ICSIL>
>>>>>>>>>>>>>>>>>>>>>>>> Midwest Internet Exchange
>>>>>>>>>>>>>>>>>>>>>>>> <http://www.midwest-ix.com/>
>>>>>>>>>>>>>>>>>>>>>>>> <https://www.facebook.com/mdwestix>
>>>>>>>>>>>>>>>>>>>>>>>> <https://www.linkedin.com/company/midwest-internet-exchange>
>>>>>>>>>>>>>>>>>>>>>>>> <https://twitter.com/mdwestix>
>>>>>>>>>>>>>>>>>>>>>>>> The Brothers WISP <http://www.thebrotherswisp.com/>
>>>>>>>>>>>>>>>>>>>>>>>> <https://www.facebook.com/thebrotherswisp>
>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>> <https://www.youtube.com/channel/UCXSdfxQv7SpoRQYNyLwntZg>
>>>>>>>>>>>>>>>>>>>>>>>> ------------------------------
>>>>>>>>>>>>>>>>>>>>>>>> *From: *"That One Guy /sarcasm" <
>>>>>>>>>>>>>>>>>>>>>>>> <thatoneguyst...@gmail.com>
>>>>>>>>>>>>>>>>>>>>>>>> thatoneguyst...@gmail.com>
>>>>>>>>>>>>>>>>>>>>>>>> *To: * <af@afmug.com>af@afmug.com
>>>>>>>>>>>>>>>>>>>>>>>> *Sent: *Monday, May 16, 2016 8:19:00 PM
>>>>>>>>>>>>>>>>>>>>>>>> *Subject: *[AFMUG] ubnt malware
>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>> From what im reading in their forums something set
>>>>>>>>>>>>>>>>>>>>>>>> off over the weekend? or is it ubnt douche nozzles?
>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>> It sounds almost as if this malware is actively
>>>>>>>>>>>>>>>>>>>>>>>> being manipulated (changing from key access to foul 
>>>>>>>>>>>>>>>>>>>>>>>> username/password,
>>>>>>>>>>>>>>>>>>>>>>>> wandering control ports, etc, like script kiddies 
>>>>>>>>>>>>>>>>>>>>>>>> found a new toy?
>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>> is this thing self propagating from the device?
>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>> --
>>>>>>>>>>>>>>>>>>>>>>>> If you only see yourself as part of the team but
>>>>>>>>>>>>>>>>>>>>>>>> you don't see your team as part of yourself you have 
>>>>>>>>>>>>>>>>>>>>>>>> already failed as part
>>>>>>>>>>>>>>>>>>>>>>>> of the team.
>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>> --
>>>>>>>>>>>>>>>>>>>>>> If you only see yourself as part of the team but you
>>>>>>>>>>>>>>>>>>>>>> don't see your team as part of yourself you have already 
>>>>>>>>>>>>>>>>>>>>>> failed as part of
>>>>>>>>>>>>>>>>>>>>>> the team.
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>> --
>>>>>>>>>>>>>>>>>>> If you only see yourself as part of the team but you
>>>>>>>>>>>>>>>>>>> don't see your team as part of yourself you have already 
>>>>>>>>>>>>>>>>>>> failed as part of
>>>>>>>>>>>>>>>>>>> the team.
>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>> --
>>>>>>>>>>>>>>>>>> If you only see yourself as part of the team but you
>>>>>>>>>>>>>>>>>> don't see your team as part of yourself you have already 
>>>>>>>>>>>>>>>>>> failed as part of
>>>>>>>>>>>>>>>>>> the team.
>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> --
>>>>>>>>>>>>>> If you only see yourself as part of the team but
>>>>>>>>>>>>>> you don't see your team as part of yourself you have already 
>>>>>>>>>>>>>> failed as part
>>>>>>>>>>>>>> of the team.
>>>>>>>>>>>>>>
>>>>>>>>>>>>>
>>>>>>>>>>>>>
>>>>>>>>>>>>
>>>>>>>>>>>>
>>>>>>>>>>>> --
>>>>>>>>>>>> If you only see yourself as part of the team but you don't see
>>>>>>>>>>>> your team as part of yourself you have already failed as part of 
>>>>>>>>>>>> the team.
>>>>>>>>>>>>
>>>>>>>>>>>
>>>>>>>>>>>
>>>>>>>>>>>
>>>>>>>>>>> --
>>>>>>>>>>> If you only see yourself as part of the team but you don't see
>>>>>>>>>>> your team as part of yourself you have already failed as part of 
>>>>>>>>>>> the team.
>>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>> --
>>>>>>>>>> If you only see yourself as part of the team but you don't see
>>>>>>>>>> your team as part of yourself you have already failed as part of the 
>>>>>>>>>> team.
>>>>>>>>>>
>>>>>>>>>
>>>>>>>>>
>>>>>>>>>
>>>>>>>>> --
>>>>>>>>> If you only see yourself as part of the team but you don't see
>>>>>>>>> your team as part of yourself you have already failed as part of the 
>>>>>>>>> team.
>>>>>>>>>
>>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>> --
>>>>>>> If you only see yourself as part of the team but you don't see your
>>>>>>> team as part of yourself you have already failed as part of the team.
>>>>>>>
>>>>>>
>>>>>>
>>>>>
>>>>>
>>>>> --
>>>>> If you only see yourself as part of the team but you don't see your
>>>>> team as part of yourself you have already failed as part of the team.
>>>>>
>>>>
>>>>
>>>
>>>
>>> --
>>> If you only see yourself as part of the team but you don't see your team
>>> as part of yourself you have already failed as part of the team.
>>>
>>
>>
>
>
> --
> If you only see yourself as part of the team but you don't see your team
> as part of yourself you have already failed as part of the team.
>
>
>

Reply via email to