SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Gold/Mining/Energy : Gold Price Monitor -- Ignore unavailable to you. Want to Upgrade?


To: IngotWeTrust who wrote (87474)6/27/2002 9:41:35 AM
From: IngotWeTrust  Respond to of 116752
 
CNBC did a headline disection on this WA-Post (see previous post for URL)...msnbc has picked it up acc'd to Garrett...they emphasised Nuclear Power plant vulnerability and gas (pipelines) vulnerability...maybe he hasn't read the flood out of Mesa and Tempe AZ...

BTW>..mini grub...my previous post was a "RADAR GRUB"



To: IngotWeTrust who wrote (87474)6/27/2002 11:31:54 AM
From: Zardoz  Read Replies (3) | Respond to of 116752
 
It's not about who you know.
It's not about what you know.

It's about what you want to know, and what you want to due with the information.
Al Qaeda doesn't scare me, cause they are like lamers walking into the empty field surrounded by US military, screaming:"Yo, Yanks, this is where we are, come and get us". It's the reports that you don't here about that should scare you. A echlon listening station can pick up all activity if they really want to. But it's the process of de-encrypting and analizing the data that can take time. Nothing worse then finding out little Marie hates her mother and is telling her aunt via encrypted emails. But the direction of near useless data going through a station is the suggestion of a crime in progress. Information can be stored in many formats such as Jpeg's. The ability for the protectorers to secure reliable information from multiple occurences of discrete messages can almost guarntee that they recieve nothing. {you can send pcitures with information in them in 10, 20 or more files, and without the ability to assure those messages are interlinked, the testing of one makes the retrieval of data into a useless endevour} They is no security on the internet, never has been, never will be. Sure a firewall will get 99.9% of lamers, but the real worry is the 0.1% or less that deem you have something of value that they want. Best to have two systems and use only the insecure system for access to anything on the interent. I have over 560 Gigs of data here on 2 systems. The most you're going to ever see is 1 40Gig HD Hack all you want, unless you enter the protocal right the first time, the second system shuts down the access to itself. I use a zero knowledge test to verify access to the second computer from this primary. The questions given preclude anyone from knowing the correct response. It takes 30 Mseconds to scramble the FAT {File allocation Table} 3 minutes to destroy all data {I mean destroy} all 520 remaining gigs of data.

But just to be on subject...
Got Gold, Tutor?



To: IngotWeTrust who wrote (87474)6/27/2002 11:56:21 AM
From: long-gone  Respond to of 116752
 
here's another take on same
CNS News
Computers As Tools of Terror: Cyber Attacks Feared

(CNSNews.com) - The government confirms a U.S. Post report that the al Qaeda terrorist network may be close to using the Internet as a tool to wreak death and havoc on America. Foreigners reportedly are trying to hack into the computer networks of America's emergency telephone systems, electrical generation and transmission facilities, water plants, nuclear power plants and gas distribution networks. Terrorists may be trying to gain control of America's infrastructure through computers to launch a devastating "cyber attack." The Washington Post said if terrorists can take control of a dam's floodgates, for example, or substations handling 300,000 volts of electricity, "an intruder could use virtual tools to destroy real-world lives and property." Government experts told the newspaper that terrorists may be planning to use cyber attacks in conjunction with a more conventional attack involving explosives.
cnsnews.com