Are we crackers to be anxious over hackers?
I don't own this space under my name. I should have leased it while I still could
clicker, as far as I know, first use was in 1965 with the introduction of the WE177 series. I suspect some idiot having produced an OR for an unbreakable key then for got to patent it.
I saw the key advertised in Motor Sport as an ignition-key after market option around 1966 and on gaming machines not long after.
All our keys were in unique pairs and serial numbered. We discovered that two keys, with different serial numbers, both operated the same lock. So much for the chances of two identical sets in 1:10.000,000. Then again we may have got a match between one of the first 10 Mill and the next batch
I saw the key advertised in Motor Sport as an ignition-key after market option around 1966 and on gaming machines not long after.
All our keys were in unique pairs and serial numbered. We discovered that two keys, with different serial numbers, both operated the same lock. So much for the chances of two identical sets in 1:10.000,000. Then again we may have got a match between one of the first 10 Mill and the next batch
Join Date: Jul 2006
Location: bristol
Age: 56
Posts: 1,051
Likes: 0
Received 0 Likes
on
0 Posts
Going back to the original question, then yes I think we should be very anxious about hacking, and not just Internet hacking.
Since the '60s the Western world has become more and more reliant on many forms of communication, and disrupting these would cause chaos to everyday life. Many of you will know which disruptions would lead to deaths and hardship very quickly, so I don't think its wise for me to elaborate further on a public forum.
Since the '60s the Western world has become more and more reliant on many forms of communication, and disrupting these would cause chaos to everyday life. Many of you will know which disruptions would lead to deaths and hardship very quickly, so I don't think its wise for me to elaborate further on a public forum.
Hacking eh? I agree with Barnstormer... And so do the US Government.. BBC News - Huawei and ZTE pose security threat, warns US panel
They've vetoed Huawei takover of an number of us infrastructure/technology providers.
Closer to home a number of the UK operators have a vendor split whereby they use Huawei plus an-other depending where you are making your voice or data connection, you may well be on infrastructure that has concerns.
They've vetoed Huawei takover of an number of us infrastructure/technology providers.
Closer to home a number of the UK operators have a vendor split whereby they use Huawei plus an-other depending where you are making your voice or data connection, you may well be on infrastructure that has concerns.
Join Date: Jun 2009
Location: Lincolnshire
Age: 82
Posts: 165
Likes: 0
Received 0 Likes
on
0 Posts
You don't necessarily need to be connected to the Internet to be compromised.
We had a bit of a scare in the late 60's when it was discovered that those dastardly Russkies were parking up plain vans outside Foreign Embassies. The vans contained very sensitive electronic listening devices which were able to pick up electromagnetic fields & radio frequency emissions from electric typewriters.
At the time, I was responsible for maintaining two Scientific computers, one at the Home Office & one at HM Treasury, so the rush was on to cover the electronic components with a mylar barrier (like a Faraday cage), which did nothing to help the cooling!!!
Damn! Is that a black van coming up the driveway?
We had a bit of a scare in the late 60's when it was discovered that those dastardly Russkies were parking up plain vans outside Foreign Embassies. The vans contained very sensitive electronic listening devices which were able to pick up electromagnetic fields & radio frequency emissions from electric typewriters.
At the time, I was responsible for maintaining two Scientific computers, one at the Home Office & one at HM Treasury, so the rush was on to cover the electronic components with a mylar barrier (like a Faraday cage), which did nothing to help the cooling!!!
Damn! Is that a black van coming up the driveway?
I don't own this space under my name. I should have leased it while I still could
Remember the intranet separation of internet is not necessarily absolute. There may be a wall between systems used by users by the bearers may well be common within the national and international infrastructures. The weakness may well be outside the military and within companies such as BT.
Originally Posted by PN
All our keys were in unique pairs and serial numbered
Last edited by Courtney Mil; 14th May 2013 at 18:10.
I don't own this space under my name. I should have leased it while I still could
CM, oh dear. You are right that a one-off key is unique. Equally one key of a pair is not unique but a set, comprising one or more items may be unique.
In this case it was SEF Keys.
Equally, as we had two pairs those two pairs were not unique.
My A- and see you.
In this case it was SEF Keys.
Equally, as we had two pairs those two pairs were not unique.
My A- and see you.
Join Date: Jan 2007
Location: London
Age: 66
Posts: 345
Likes: 0
Received 0 Likes
on
0 Posts
The only secure network is one that has no connection to the outside world and hopefully severe searching and checking to make sure no muppet brings in a USB stick or worse. If the prison serveice can do it surley the MOD etc can do it.
Dyson,
That was the solution I was suggesting earlier. It seems everyone that wants a global connection sees (or is talked into believing) the standard industry solution as the secure system the salesmen tell them it is.
That was the solution I was suggesting earlier. It seems everyone that wants a global connection sees (or is talked into believing) the standard industry solution as the secure system the salesmen tell them it is.
Join Date: Apr 1998
Location: Mesopotamos
Posts: 5
Likes: 0
Received 0 Likes
on
0 Posts
...and hopefully severe searching and checking to make sure no muppet brings in a USB stick or worse.
The whole issue of computer security is an area where the most obscene risks are taken in some areas whilst apparently strict security is applied in others. Systems are exceptionally complex and have many many holes.
As someone pointed out you need many layers of security - not merely at the perimeter and you have to design your system with the assumption that people will and even have already found ways in.
I think that the worst mistake of most computer systems is to centralise information such that there is someone, somewhere in the organisation (e.g. in the server room) who effectively has access to all of it. I'm not greatly experienced in how to achieve this so it's just my gut feeling: no person should be able to know it all.
The only other plan I can think of is to spend a great deal of effort in generating false information so that anybody who steals it has to doubt any individual piece.
As someone pointed out you need many layers of security - not merely at the perimeter and you have to design your system with the assumption that people will and even have already found ways in.
I think that the worst mistake of most computer systems is to centralise information such that there is someone, somewhere in the organisation (e.g. in the server room) who effectively has access to all of it. I'm not greatly experienced in how to achieve this so it's just my gut feeling: no person should be able to know it all.
The only other plan I can think of is to spend a great deal of effort in generating false information so that anybody who steals it has to doubt any individual piece.
I don't own this space under my name. I should have leased it while I still could
We then went to the server room and I asked about backups as we were just introducing a new backup regime and I had instituted different levels - daily in different room, weekly in different building etc.
The IT man proudly showed me their backup tapes on a curtained shelf under the servers.
When we left their Admin wallah said "That was wrong, wasn't it?"
Computers would be fine without people.
Join Date: Oct 2002
Location: 1 Dunghill Mansions, Putney
Posts: 1,797
Likes: 0
Received 1 Like
on
1 Post
Israel suspects China in failed cyberattack vs. defense industry
The Chengdu J-10 team must have mislaid their Lavi blueprints.
I/C
The attempted attack took place several weeks ago in the form of an email sent to scores of industry executives and program officials from an unnamed German company “known to Israeli industry,” said Nir Dvori, senior defense reporter at Israel's Channel 2 News.
In his Oct. 27 report, Dvori said, “defensive measures” managed to detect and “close down” the threat before recipients had an opportunity to open the mail and release a Trojan horse embedded within the seemingly innocent correspondence.
“Defensive measures discovered the attack and thwarted it. The assessment here is that the attack came from the Chinese defense industry,” Channel 2 reported.
In his Oct. 27 report, Dvori said, “defensive measures” managed to detect and “close down” the threat before recipients had an opportunity to open the mail and release a Trojan horse embedded within the seemingly innocent correspondence.
“Defensive measures discovered the attack and thwarted it. The assessment here is that the attack came from the Chinese defense industry,” Channel 2 reported.
I/C
Join Date: Feb 2006
Location: Hanging off the end of a thread
Posts: 33,072
Received 2,940 Likes
on
1,252 Posts
I say bring back invisible ink, digestible paper and carrier pigeons
Other simple one is hiding text in images
How to hide text inside an image - Trick
QuickCrypto - Steganography Software - Conceal Information in Folders, Images, Sounds
By the way, speaking of Keys, the Austin A40 ones could open the door of the Vulcans
Last edited by NutLoose; 29th Oct 2013 at 19:17.
I read a Lt Colonel has been put in charge of MoD's new "cyber warfare" department. Anyone who has seen the way Lt Colonels are routinely dismissed in MoD HQ as unnecessary annoyances will sympathize with the guy.
Join Date: Apr 2008
Location: The Whyte House
Age: 95
Posts: 1,966
Likes: 0
Received 0 Likes
on
0 Posts
By the way, speaking of Keys, the Austin A40 ones could open the door of the Vulcans