[email protected] wrote:
You'd think. There are ways to target about any strategy you can think
of if someone is really interested in targeting you. My company got
struck not long ago even *with* all of the draconian restrictions on our
IT system. It's just a matter of the hacker figuring out what you're
doing, how you do it, and coming up with a counter strategy. Happens all
the time.

I visited a guy once who had Vax-VMS then Solaris then Linux boxes
before his daughter's MS box.

He was amused at the notion of someone trying to battle past those
three OS's before getting to the MS box. (He was a Mensa Society guy.)

He figured there might be three people on the planet who knew them
all well enough - and doubted they'd waste their time on a little
home system - if at all!

Meanwhile his daughter kept breaking-out of the limits he set on
her surfing, so he decided to concentrate on teaching her to make
good choices about what she viewed rather than fight her at the
technology-level in such a porous OS/browser environment.

Plus, she shared his brain-gene!



Yeah...we think that's what happened to our workplace, but we're really not sure. And - as my (Mensa-credited) IT guy was re-resting up my machine I mis-typed a company address and got a very convincing spoof of a company page (*my* own company) that we hadn't firewalled yet...and I only mis-typed one character! He noted it...and hopefully that particular one won't happen again. But any ones he missed...

--
     - Rufus
_______________________________________________
support-seamonkey mailing list
[email protected]
https://lists.mozilla.org/listinfo/support-seamonkey

Reply via email to