Author: Andrew2
Tuesday, September 04, 2007 - 6:27 pm
|
|
http://ap.google.com/article/ALeqM5hz7w0ttOjJ3PWdHIEJTiNEUbopsA Apparently, there are routine attempts to break into DOD computers. This one got through. Andrew
|
Author: Deane_johnson
Tuesday, September 04, 2007 - 6:31 pm
|
|
Clinton's buddies apparently weren't aware he was gone and that things had tightened up a little.
|
Author: Andrew2
Tuesday, September 04, 2007 - 6:40 pm
|
|
"Clinton's fault:" as predictable as the Oregon rain... Andrew
|
Author: Missing_kskd
Tuesday, September 04, 2007 - 8:17 pm
|
|
I seriously doubt China is against cybercrime. Their censorship and netizen policing efforts are aggressive and ever changing. Doing what they do, takes some solid understanding of how the net works --and how people behave on it. Lots of good understanding there too, combined with a lot of plausable deniability. It could have been some faction acting on their own, for example. IMHO, this is gonna be a growing problem. If we were smart, we would be working hard to innovate and lead in this area. I believe our corporate culture hurts us in this too. A lot of great development is happening in other nations. They don't have software patents and or lack a real aggressive IP structure. We've actually been strong arming lots of nations to adopt our policies. Where it has happened, development on open systems has just moved. Those systems allow one to do anything they want, period. They are not going away either. There is simply too much freedom, and multi-national control issues continue to be problematic. With China, in particular, they are reluctant to utilize closed systems for their computing infrastructure. The same goes for elements of our intelligence operations. Failing to diversify computing systems, protocols, and people, leaves us weak in a lot of ways.
|
Author: Trixter
Tuesday, September 04, 2007 - 11:46 pm
|
|
It's ALL Slick Willy's fault!!!
|
Author: Nwokie
Wednesday, September 05, 2007 - 1:56 pm
|
|
Mail servers to work, have to have a connection to the WWW, so they are always the easiest to hack.
|