Re: Sudden attack is not a clone
Also... whoever thinks hacking is purely based on trust of a human is clearly naive of cybersecurity. Hacking comes in many forms. There's this that is not based on trust of humans but of computers. It poses as a keyboard and can inject vulnerabilities into a system in a few seconds just by plugging it into a computer. There's also this which is a multipurpose device that can act as a serial port, parallel port, ethernet port and more, and it uses that trust (not of humans but of computers) to open vulnerabilities in the system. I could go on and on about ways of injecting vulnerabilities into computer systems. You know that old router you have laying around? That's a gold mine for hackers. And its not based on trust, but based on stupidity: ISPs leaving ports open for "remote management" to "assist" users results in your router being subsumed into a botnet.
@61, thumbs up, man. Great post.
-- Audiogames-reflector mailing list Audiogames-reflector@sabahattin-gucukoglu.com https://sabahattin-gucukoglu.com/cgi-bin/mailman/listinfo/audiogames-reflector