• 0 Posts
  • 281 Comments
Joined 1 year ago
cake
Cake day: April 13th, 2024

help-circle






  • I’d start with the following, and refine if necessary:

    “Gaining unauthorized access to a protected computer resource by technical means.”

    • Port scanning --> Not hacking because there isn’t any access to resources gained*
    • Using default passwords that weren’t changed --> Not hacking because the resource wasn’t protected*
    • Sending spam --> Not hacking because there isn’t any access to resources gained
    • Beating the admin with a wrench until he tells you the key --> Not hacking because it’s not by technical means.
    • Accessing teacher SSN’s published on the state website in the HTML --> Not hacking because the resource wasn’t protected, and on the contrary was actively published**
    • Distributed denial of service attack --> Not hacking because there isn’t any access to resources gained

    * Those first two actually happened in 2001 here in Switzerland when the WEF visitors list was on a database server with default password, they had to let a guy (David S.) go free
    ** The governor and his idiot troupe eventually stopped their grandstanding and didn’t file charges against Josh Renaud of the St. Louis Post-Dispatch reporter, luckily






  • This week I heard from a network group lead of a university hospital, that they have a similar issue. Some medical devices that come with control computers can’t be upgraded, because they were only certified for medical use with the specific software they came with.

    They just isolate those devices as much as possible on the network, not much else to do, when there is no official support and recertification for upgrading. And of course nobody wants to spend half a million on a new imaging device when the old one is still fine except for the OS of the control computer.

    Sounds like a shitty place to be, I pity those guys.

    That said, if you were talking about normal client computers then it’s inexcusable.







  • In my experience that’s usually the case for XG-PON and XGS-PON networks. Because you’re sharing one port on the OLT with up to 63 neighbours. Though I think most build outs aim for 16 or 32 splits.

    Anyway they don’t want to risk you sending when it’s not your turn or disturbing your neighbours connection in any other way, they make you use their ONU. Basically the same old story like with the coax cable modems. Just because some idiot (or rather industry group of idiots) had to go and turn fiber back into a shared medium to save on cable and ports a bit.



  • Yep. Relevant sentence bolded by me below

    6d) Convey the object code by offering access from a designated place (gratis or for a charge), and offer equivalent access to the Corresponding Source in the same way through the same place at no further charge. You need not require recipients to copy the Corresponding Source along with the object code. If the place to copy the object code is a network server, the Corresponding Source may be on a different server (operated by you or a third party) that supports equivalent copying facilities, provided you maintain clear directions next to the object code saying where to find the Corresponding Source. Regardless of what server hosts the Corresponding Source, you remain obligated to ensure that it is available for as long as needed to satisfy these requirements.