On 9/28/07, [EMAIL PROTECTED] <[EMAIL PROTECTED]> wrote:
> On Fri, 28 Sep 2007 14:27:03 CDT, Brian Loe said:
>
> > It was described as an actual lab setup complete with someone
> > "hacking" the system and causing the damage.
>
> So a rigged demo. :)

What would constitute a non-rigged demo for you? Live, production systems?

>
> >                                                Around where I work, I'm
> > told this is not difficult to do - basically you could simply take
> > over on of the controller's windows boxen and destroy it the same as
> > he (the controller) would if he were negligent.
>
> And how much is the average controller paid?  Sounds like "human error" would
> be a bigger concern if you have low-pay low-motivation people watching it.

Uhmm...they're paid quite well, actually. They're in charge,
essentially, of the entire power plant - to include having the ability
to melt it down by screwing up. Its still monitored and controlled by
a windows system. We're not discussing human error, we're discussing
system security.

>
> > As for Iranian WMD, are you confusing Iran with Iraq?
>
> If it's good enough for the Prez, it's good enough for me. :)

WTF are you talking about?!!?

Iranians will tell you they have potential for WMD, at least for
quasi-dirty bombs - and a delivery system (if you're in Israel). But I
haven't heard anyone complaining about that anyway. The only concern
I've heard is their potential for nuclear weapons - POTENTIAL. We
haven't confirmed anything.

Syria, it would seem, could have had WMD but it all went up in smoke last week.
_______________________________________________
Fun and Misc security discussion for OT posts.
https://linuxbox.org/cgi-bin/mailman/listinfo/funsec
Note: funsec is a public and open mailing list.

Reply via email to