Let me be the first to welcome our new software overlords.
On Fri, Oct 7, 2011 at 3:01 PM, Ben Scott <[email protected]> wrote: > The computers used by the US Air Force to fly some of the Predator > and Reaper drones -- which are platforms capable of carrying weapons > -- have apparently been compromised for by keystroke-logging malware. > The best part? They detected it a few weeks ago and they're still > flying them. > > http://www.wired.com/dangerroom/2011/10/virus-hits-drone-fleet/ > > As we know, the first rule of computer security is that once someone > else's software runs on your computer, it's not your computer anymore. > > Forget Skynet. Humanity will die because some teenage punk hacks a > weapons controller and pushes the wrong button. I wonder if the admin > password on these computers is "Joshua"? > > -- Ben > > ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ > ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ > > --- > To manage subscriptions click here: > http://lyris.sunbelt-software.com/read/my_forums/ > or send an email to [email protected] > with the body: unsubscribe ntsysadmin > -- G. Waleed Kavalec --------------------------------------------- Whether you are talking engineering, electricity, or human beings... the place where the most power is concentrated is the place where the worst things happen. Ask any 10 pound plutonium sphere. ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to [email protected] with the body: unsubscribe ntsysadmin
