On 9/28/07, [EMAIL PROTECTED] <[EMAIL PROTECTED]> wrote: > On Fri, 28 Sep 2007 14:27:03 CDT, Brian Loe said: > > > It was described as an actual lab setup complete with someone > > "hacking" the system and causing the damage. > > So a rigged demo. :)
What would constitute a non-rigged demo for you? Live, production systems? > > > Around where I work, I'm > > told this is not difficult to do - basically you could simply take > > over on of the controller's windows boxen and destroy it the same as > > he (the controller) would if he were negligent. > > And how much is the average controller paid? Sounds like "human error" would > be a bigger concern if you have low-pay low-motivation people watching it. Uhmm...they're paid quite well, actually. They're in charge, essentially, of the entire power plant - to include having the ability to melt it down by screwing up. Its still monitored and controlled by a windows system. We're not discussing human error, we're discussing system security. > > > As for Iranian WMD, are you confusing Iran with Iraq? > > If it's good enough for the Prez, it's good enough for me. :) WTF are you talking about?!!? Iranians will tell you they have potential for WMD, at least for quasi-dirty bombs - and a delivery system (if you're in Israel). But I haven't heard anyone complaining about that anyway. The only concern I've heard is their potential for nuclear weapons - POTENTIAL. We haven't confirmed anything. Syria, it would seem, could have had WMD but it all went up in smoke last week. _______________________________________________ Fun and Misc security discussion for OT posts. https://linuxbox.org/cgi-bin/mailman/listinfo/funsec Note: funsec is a public and open mailing list.
