It is my firm belief as a computer scientist that, given enough time and effort, you can hack into anything. However, the people who are seriously into such stuff do not advertise themselves.
Hah!Eradicating FarmVille might be a service to humanity.![]()
I'm not a computer scientist or a hacker, but I don't think that's completely true. I can't see any way that it would be possible to hack a computer that isn't connected to a network, or at least a network to which the hacker has access. Of course that also places certain limits on the utility of the computer, but if you want absolute security from computers, you can't get much better than that.It is my firm belief as a computer scientist that, given enough time and effort, you can hack into anything. However, the people who are seriously into such stuff do not advertise themselves.
yes I will have no symapthy for those people who have put alot of hours (and possibly cash) into various facebook games, if they are all taken off line, and accounts deleted.Eradicating FarmVille might be a service to humanity.![]()
you have a point, too much talk after the riots of the government being able to shut down socail media websitess, when expect for very small areas, it wont have achieved much.This is very bad, it's going to be used by our government to justify it's "cyber security" policies, which are 95% about spying on people, and 5% about providing protection to vital infrastructure.
With no crisis allowed to go unexploited anything like this provides justification for it. To make it worse, one facet of cyber security includes an internet kill switch and this could prove justification for that too (though it's possible the London Riots could have done that as Blackberries were used to facilitate coordination of the riots)
To make it worse, one facet of cyber security includes an internet kill switch and this could prove justification for that too (though it's possible the London Riots could have done that as Blackberries were used to facilitate coordination of the riots)
To make it worse, one facet of cyber security includes an internet kill switch and this could prove justification for that too (though it's possible the London Riots could have done that as Blackberries were used to facilitate coordination of the riots)
Do you have anything to corroborate that claim? The whole design of the Internet would seem to prevent the existence of a single "kill switch" - traffic would just be rerouted via other paths.
And the Blackberry shutdown would have been done by RIM shutting down the servers that process BBM traffic, not by shutting down the Internet.
Likewise, as with most with similar ways of thinking, the conspiracy focuses on the what with little about they why. The reasons why the government would want to spy on us always seem a little thin--almost an afterthought. The supposed benefit the government gets from that information isn't worth much compared to the effort and expense required to get it.Rampant paranoia is basically CuttingEdge's "thing." Lots of speculation about how technology either is being or will be abused to violate privacy and spy on people. But she never seems to have any insight as to how we should deal with any potential privacy threats, other than to legally curtail technology so that it is less useful and thus less "dangerous."
I meant connected computers and you do have a point. However, even un-connected computers can be hacked into. There are ways to "catch" electronic and magnetic waves from the next room and "recreate" what a computer does on some other computer.I'm not a computer scientist or a hacker, but I don't think that's completely true. I can't see any way that it would be possible to hack a computer that isn't connected to a network, or at least a network to which the hacker has access. Of course that also places certain limits on the utility of the computer, but if you want absolute security from computers, you can't get much better than that.It is my firm belief as a computer scientist that, given enough time and effort, you can hack into anything. However, the people who are seriously into such stuff do not advertise themselves.
There are ways to "catch" electronic and magnetic waves from the next room and "recreate" what a computer does on some other computer.
We use essential cookies to make this site work, and optional cookies to enhance your experience.