On Sunday, June 22, 2003, at 06:16 PM, Kyle Hansen wrote:


On 6/22/03 3:06 AM, "Shelby Hill" <[EMAIL PROTECTED]> Spew into the
Cybertrough:

How susceptible is a computer to hackers?  I have a friend here in
France that insists that one is totally unprotected & that someone can
enter in even when the machine is off.  That sounds crazy to me.

If your computer is turned off it is impossible. He is full of garbage. If
it's just asleep...well that's a whole other story.




I've been told that with RoadRunner or other cable ISPs, your machine can be hacked when not on because the connection is always on. The example of someone using your hard drive for storage of stolen files was cited.
There's no truth to this then?
Donald



-- The iMac List is sponsored by <http://lowendmac.com/> and...

Small Dog Electronics    http://www.smalldog.com  | Refurbished Drives |
- Epson Stylus Color 580 Printers - new at $69    |  & CDRWs on Sale!  |

Support Low End Mac <http://lowendmac.com/lists/support.html>

iMac List info:         <http://lowendmac.com/imac/list.shtml>
 --> AOL users, remove "mailto:";
Send list messages to:  <mailto:[EMAIL PROTECTED]>
To unsubscribe, email:  <mailto:[EMAIL PROTECTED]>
For digest mode, email: <mailto:[EMAIL PROTECTED]>
Subscription questions: <mailto:[EMAIL PROTECTED]>
Archive: <http://www.mail-archive.com/imac-list%40mail.maclaunch.com/>


---------------------------------------------------------------
The Think Different Store
http://www.ThinkDifferentStore.com
---------------------------------------------------------------




Reply via email to