If a dealer can discover the webserver of an underground FTP server, using an earlier form of a waiver name (a.k.a. "webmaster password"), the machine administrator can also leak the address of the FTP server to the thief, along with the idea that it is the name of the FTP server, instead of the FTP server itself. This can be dangerous if the FTP server is private.
More advanced versions of FTP have used the variations of the password itself as the login secret. A long list of different ways to guess or break the login secret can be found in the book "Offline Brute-force Attacks on Examined FTP Servers". Once a guessed login secret has been found, it is a simple matter to try the private part of the login secret, using variations of standard password brute-force attack methods. (For an example, see the attack on "ftpannier" at "ftp://ftp.cuni.cz/pub/music/miscellaneous/PPS.zip".)
The challenge is as much fun as it is educational: your PC and your search engine (one can be a company or a governmental agency) may be at risk while you are solving the challenge. Some people spend hundreds of hours on such problems, and receive a warm feeling of satisfaction when they seem to have found a problem or a bug in the software or hardware they were examining. If you find a vulnerability in your system, please let the developer of the program or your system administrator know about it.
Some of the most popular and reliable search engines such as Google can be fooled by paid advertisements, in which the payment is not the concern of an advertiser (e.g. eBay). These advertisements are sometimes referred to as "spam". Ads are typically generated by expert spammers who are paid to send out an infinite stream of advertisements to many highly targeted search engines, usually by using scripts that continuously ping search engines, even in situations where all possible ads had been loaded into cache. d2c66b5586