jackofallgeeks: (pl4y with 3vil)
[personal profile] jackofallgeeks
So, a sysadmin hijacks
an entire network and, for fear of some sort of remote attack that would
destroy valuable documents, they search his car and home for a device that
might initiate such an attack. But if you think about it, that's kind of
stupid: what kind of a device are you looking for? If he left a way
to destroy things, it's probably just a script somewhere on the network. In
the best case it requires someone to connect to the network and tell it to
go, but a more fail-proof method would be a "time bomb" that needs to be
tagged every so often or else it bursts. If THAT's the case, they're
probably already too late.

Profile

jackofallgeeks: (Default)
John Noble

August 2012

S M T W T F S
   12 34
567891011
12131415161718
19202122232425
262728293031 

Most Popular Tags

Style Credit

Expand Cut Tags

No cut tags
Page generated Aug. 25th, 2025 09:50 am
Powered by Dreamwidth Studios