
ya know, this bit with the hacker in the uk the us is trying to extradite, im a little wary of. Judging by the hacker's description of what he did (blank pw search/default modes) there is definite signs of possible defense mechanisms. If i wanted to put up a false wall, albeit a digital one, i would leave a computer on in admin mode with all sorts of nonsense on it, have it signed under as some top level sounding officer, put that fake officer's name on the personnell list for that base on other computers making it all look rather concise, and there you have it. Fake computer for low level hackers to get caught up in.
or it might all be "real" and you have the oldest trick in the book in play: second in command is really in command. By having the second in command be the actual comander, you confuse anyone trying to figure out whats going on by blurring the source of the commanding. Its a rather old tact really, because if you have an enemy super spy who is watching the whole top tier and getting all the data, there is still at least the doubt of which one is real. Old tacts are best really.
yeah im reading dailygrail. whatever! listening to the secret of evermore soundtrack. oh man you have no idea. the beauty!
No comments:
Post a Comment