Help support WeTheArmed.com by visiting our sponsors.

Author Topic: Trojan horse software in infrastructure systems.  (Read 1117 times)

booksmart

  • Token Left Leaning Idealist Libertarian
  • Senior Contributor
  • *****
  • Posts: 6758
  • E. Pluribus Unum.

  • Offline

WeTheArmed.com

  • Advertisement
  • ***

    ksuguy

    • Senior Contributor
    • *****
    • Posts: 5033

    • Offline
    Re: Trojan horse software in infrastructure systems.
    « Reply #1 on: November 07, 2014, 11:09:26 am »
    Not surprising at all given the fact that a lot of the people in charge have no idea how computers work.
    Kansas

    huey148

    • Senior Contributor
    • *****
    • Posts: 2790
      • Huey's Gunsight

    • Offline
    Re: Trojan horse software in infrastructure systems.
    « Reply #2 on: November 08, 2014, 06:26:58 am »
    We had an old Win2k server compromised at Camp Arifjan by the Chinese in 2007 that the contractors took offline (it was a shared drive file server).  Turns out one of the troops in my area brought it in by using a proxy page service to get to stuff the J6 had blocked on the firewall.  It was on NIPR...Pretty much everything on NIPR should be considered suspect, but like a lot of hacks the low end guy at the keyboard ruins it for everyone by not following the rules.

    Sent from my SCH-I545 using Tapatalk
    Huey's Gunsight  http://www.hueysgunsight.blogspot.com

    "I don't know about you guys, but I got a woody..how 'bout you SFC Hopewell"

    Help support WeTheArmed.com by visiting our sponsors.