ph34r teh sysadmin
Jul. 15th, 2008 10:44 am![[personal profile]](https://www.dreamwidth.org/img/silk/identity/user.png)
So, a sysadmin hijacks
an entire network and, for fear of some sort of remote attack that would
destroy valuable documents, they search his car and home for a device that
might initiate such an attack. But if you think about it, that's kind of
stupid: what kind of a device are you looking for? If he left a way
to destroy things, it's probably just a script somewhere on the network. In
the best case it requires someone to connect to the network and tell it to
go, but a more fail-proof method would be a "time bomb" that needs to be
tagged every so often or else it bursts. If THAT's the case, they're
probably already too late.
an entire network and, for fear of some sort of remote attack that would
destroy valuable documents, they search his car and home for a device that
might initiate such an attack. But if you think about it, that's kind of
stupid: what kind of a device are you looking for? If he left a way
to destroy things, it's probably just a script somewhere on the network. In
the best case it requires someone to connect to the network and tell it to
go, but a more fail-proof method would be a "time bomb" that needs to be
tagged every so often or else it bursts. If THAT's the case, they're
probably already too late.