Exactly. He found the exploit and wrote it in a couple hours...took over the mac in about as much time as it takes to go to a web page. Same way most windows machines are taken over.
On Wed, Jul 22, 2009 at 7:01 PM, Rev. Stewart Marshall < [email protected]> wrote: > But is that not what most hackers do? > > They examine and look at the OS they want to hack and then through trial > and error find the way to do it. > > Stewart > > At 07:23 PM 7/22/2009, you wrote: > > He didn't hack a Mac in 30 seconds. He ran a prepared script. Big >> difference. >> > > Rev. Stewart A. Marshall > mailto:[email protected] > Prince of Peace www.princeofpeaceozark.org > Ozark, AL SL 82 > > > > ************************************************************************* > ** List info, subscription management, list rules, archives, privacy ** > ** policy, calmness, a member map, and more at http://www.cguys.org/ ** > ************************************************************************* > ************************************************************************* ** List info, subscription management, list rules, archives, privacy ** ** policy, calmness, a member map, and more at http://www.cguys.org/ ** *************************************************************************
