It looks like you're using an Ad Blocker.

Please white-list or disable AboveTopSecret.com in your ad-blocking tool.

Thank you.

 

Some features of ATS will be disabled while you continue to use an ad-blocker.

 

NSA to hackers: We’re not prepared for major attack

page: 5
6
<< 2  3  4   >>

log in

join
share:

posted on Jul, 31 2012 @ 06:14 AM
link   

Originally posted by Stiglitz

Originally posted by Evil_Santa
reply to post by Stiglitz
 

If it's connected to the DMZ, someone with enough computing power, time and knowledge can get into it.


No need to be connected to a DMZ. If you can access a router on the edge of a network or take over a connection of a client in its LAN, the entire network is compromised.

It is mostly through malware that networks are breached and information stolen. Again, "social hacking" remains the most widely used method.


Again... Its called social enginnering... Kid... Get ur sh!t right for gods sake...




posted on Jul, 31 2012 @ 06:29 AM
link   
reply to post by _R4t_
 





I quit replying the guy's obviously a hormone raging teen thats new to this stuff and pasting stuff he reads on the net without really understanding the inner working of things...


You wish...
I don't know the difference between the application layer and the transport layer. LOL.
I know you badly want to discredit me. But in trying that, I have demonstrated that the prognosis made by NSA is correct. Security stinks or is none existent.
edit on 31-7-2012 by Stiglitz because: (no reason given)



posted on Jul, 31 2012 @ 06:31 AM
link   

Originally posted by _R4t_

Originally posted by Stiglitz

Originally posted by Evil_Santa
reply to post by Stiglitz
 

If it's connected to the DMZ, someone with enough computing power, time and knowledge can get into it.


No need to be connected to a DMZ. If you can access a router on the edge of a network or take over a connection of a client in its LAN, the entire network is compromised.

It is mostly through malware that networks are breached and information stolen. Again, "social hacking" remains the most widely used method.


Again... Its called social enginnering... Kid... Get ur sh!t right for gods sake...


Both terms are acceptable.
So, is the military still using open relays?



posted on Jul, 31 2012 @ 09:04 AM
link   

Sorry for the "ur" part im replying from work on an ipad with a single hand in between two other tasks lol. I quit replying the guy's obviously a hormone raging teen thats new to this stuff and pasting stuff he reads on the net without really understanding the inner working of things...


I laughed my a$$ off when it transpired you were insulting Stiglitz from a f*cking iPad!!! Like the iPad? Is it 'user-friendly' enough for you? Icons big enough?



posted on Jul, 31 2012 @ 09:00 PM
link   

Originally posted by XeroOne

Sorry for the "ur" part im replying from work on an ipad with a single hand in between two other tasks lol. I quit replying the guy's obviously a hormone raging teen thats new to this stuff and pasting stuff he reads on the net without really understanding the inner working of things...


I laughed my a$$ off when it transpired you were insulting Stiglitz from a f*cking iPad!!! Like the iPad? Is it 'user-friendly' enough for you? Icons big enough?


ipad runs on debian and its my gf i bring it to work times to times i do the updates and get free stuff tweaks on cydia for her, i wish i could bring a laptop at work but we can't due to security reasons but ipad they allow it cuz they dont know what it can do once jailbroken but yeah its my only way of contacting the outside world since the network in there is jailed from the outside





Pp




top topics
 
6
<< 2  3  4   >>

log in

join