Jump to content



Photo

The near impossible battle against Hackers

u.s. government electronic guerrillas dell inc stuxnet internet infrastructure major tech companies

  • Please log in to reply
20 replies to this topic

#16 +warwagon

warwagon

    Only you can prevent forest fires.

  • 26,179 posts
  • Joined: 30-November 01
  • Location: Iowa

Posted 26 February 2013 - 02:28

Remember to remove your java, children!


#17 pack34

pack34

    Professional Electron Wrangler

  • 1,007 posts
  • Joined: 04-July 11

Posted 26 February 2013 - 02:40

It's a good idea but it seems to me it would be better to place them on private networks not connected to the Internet at large.


That wouldn't exactly be very cheap to have that much dedicated fiber running throughout the country. Plus, sometimes it doesn't really matter. All it takes is an infected phone or flash drive to touch the power plant's internal network for them to be compromised with a nasty piece of malware. .

#18 Shiranui

Shiranui

    Iconoclast

  • 3,839 posts
  • Joined: 24-December 03

Posted 26 February 2013 - 02:59

Remember to remove your java children!


But, I don't have any java children.

#19 Solid Knight

Solid Knight

    Neowinian Senior

  • 5,140 posts
  • Joined: 22-February 08
  • Location: New Orleans, LA

Posted 26 February 2013 - 03:09

Put important stuff on an isolated network. Problem solved.

#20 farmeunit

farmeunit

    The other white meat.

  • 2,887 posts
  • Joined: 05-May 03
  • Location: Branson, MO USA

Posted 26 February 2013 - 03:11

no such thing as 'steal data' as the original data isn't lost,
it should read/write as 'copying/duplicating data'


It is stealing data, as in they didn't have that data/knowledge before. It can be used against a corporation, or governement entity. It's not like it's "just music" or something else.

#21 Solid Knight

Solid Knight

    Neowinian Senior

  • 5,140 posts
  • Joined: 22-February 08
  • Location: New Orleans, LA

Posted 26 February 2013 - 03:22

no such thing as 'steal data' as the original data isn't lost,
it should read/write as 'copying/duplicating data'


The copy they made is stolen though.