posted on May, 17 2014 @ 10:06 PM
Well a huge distinction must be made here between different types of access. There is physical access and remote access. Physical access means doing
what the girl did, basically being on that computer, in which case she ran the code which was designed for this task. Almost anyone can do this. But
remote access is a different story. Sure, the same thing can be done remotely, but it is much more difficult and fewer people can accomplish it.
Just about anything that can be done at a computer can be done remotely. You can remotely give access to your computer to another machine by utilizing
software, but we are talking about "hacking" here, used in the sense of blackhat stuff. To take over a machine the goal is to get superuser access,
or in Windows I suppose it would be admin access. I find that most people don't understand what hacking is in its most common form.
People think of others plugging away at a keyboard or whatever, not really realizing what is going on. The most common way to get a remote machine to
do anything is to find an exploit. The true hackers are those who write their own scripts to exploit a bug in a piece of software. There are various
types of exploits that do different things. The scary part is that people who do not know what they are doing can still accomplish fairly
sophisticated hacks because they can just download a script someone else has placed online, then identify their target and exploit a bug in the
system. A bug could be a piece of software that hasn't been patched. This is why security updates are important.
Now of course it is more complicated than all that, but that is the gist. But one still doesn't have to worry about the majority of ten year olds
doing something like this. They don't have to worry about most people. The ones I would worry about are those finding exploits and exploiting them.
They are the rare breed, while the so called script-kiddies are just piggybacking off the work of others. And how do they get information? They read
it on online boards. So there are good guys protecting systems by reading this information and attempting to fix exploits or alert the developer to
the exploits. The sooner they get fixed the better.
But someone who is exploiting a piece of software but doesn't publish the fact, and if nobody else has found it, they can be quite dangerous. It all
just depends on the system. Hacking wireless networks can work in the same way as well, although it depends on how sophisticated it is. When I was in
the air force we used to crack wireless connections for fun. Relatively simple. One time I took my grandfather to Houston to see a specialist, and I
waited in the car and realized the entire wireless network for the hospital had a freaking default password. I alerted them to this fact and hopefully
they changed it, because this was not just the free wifi for the people. This was administration stuff. How I was the first one to see that is beyond
You try the simplest things first, like default passwords for certain routers or whatever. The weakest link in any security is usually the person
making the password. It is relatively simple to brute-force a password if it is a dictionary word. Social engineering has also been used quite often
to gain remote access. Although I imagine that with new privacy laws and whatnot this is a thing of the past.
When I was still in high school I remember seeing a url that was at the bottom of the homework we always got. So of course I had to see what that was
all about. And I am not proud of this, and I didn't need to do this to pass or anything, but I used a bit of social engineering to get the login
information for the site, and had all the answers, for homework and tests. A more corrupt individual could have used such information to make money,
lol, but I just left it at that. I just like seeing what I can accomplish sometimes. I've wised up a lot since then however.
I guess my point is that there are knowledgeable people out there on both sides, and while you have criminals out there doing bad things, there are
always good guys attempting to stay one step ahead of them. Now as far as the government's spying goes, it is virtually impossible to combat in all
its forms. Especially if they have begun installing chips in hardware, like routers. No amount of security will protect you from spying if they have
covertly placed something like that. And I don't know enough about cell phone protection to know if one can keep calls from being monitored. I would
imagine that the NSA has some technology that is far ahead of consumer technology when it comes to cracking encryption and whatnot as well.
Supercomputers likely abound within the NSA.