1
Help! We're trapped in the computer, and the computer is trapped in 2008! Someone call the time police!
This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.
I think something neat would be if somebody found an exploit in Windows' wireless stack. Write a worm for it that spreads by walking near somebody who is infected. Release it quietly, and track the geographical progress. It would be just like a people virus.
Yeah, there is a difference between encryption, hashing, and encoding. In this case, we're talking about encryption.
But yeah, if they build a backdoor into their encryption, that would be stupid.
Hasn't encryption always been useless, though? If you think about it, there's a plausible decryption for every encryption. Sometimes it's blatantly obvious, sometimes it's not.
No, not useless. If it was useless, it would be infinitely easy to crack!
Some encryption (by standard means) takes literally years to break. By that time, the desired data is usually purposeless.
http://vil.nai.com/vil/content/v_136821.htm
Kind of neat. Too bad its exploiting PHP/CGI.
Oh yes, an experienced sysadmin will stop a hacker with an exploit? Especially ones that allow a hacker to obtain control remotely.
So you presented an argument then took it down yourself then attempted to defend it again? Okay. Once they have access to the "make shift shell" it is more probable that there is already nothing that can be done right? Also not all hacks are found and documented right away because not all hackers help the security sites.
State the last one because other from this one I see no others in your post helping you at all.