jackofallgeeks: (pl4y with 3vil)
John Noble ([personal profile] jackofallgeeks) wrote2008-07-15 10:44 am

ph34r teh sysadmin

So, a sysadmin hijacks
an entire network and, for fear of some sort of remote attack that would
destroy valuable documents, they search his car and home for a device that
might initiate such an attack. But if you think about it, that's kind of
stupid: what kind of a device are you looking for? If he left a way
to destroy things, it's probably just a script somewhere on the network. In
the best case it requires someone to connect to the network and tell it to
go, but a more fail-proof method would be a "time bomb" that needs to be
tagged every so often or else it bursts. If THAT's the case, they're
probably already too late.