Re: Sudden attack is not a clone
Also... whoever thinks hacking is purely based on trust is an idiot. Hacking comes in many forms. There's this that is not based on trust of humans but of computers. It poses as a keyboard and can inject vulnerabilities into a system in a few seconds just by plugging it into a computer. There's also this which is a multipurpose device that can act as a serial port, parallel port, ethernet port and more, and it uses that trust (not of humans but of computers) to open vulnerabilities in the system.
@61, thumbs up, man. Great post.
-- Audiogames-reflector mailing list Audiogames-reflector@sabahattin-gucukoglu.com https://sabahattin-gucukoglu.com/cgi-bin/mailman/listinfo/audiogames-reflector