Iraq insurgents 'hack into video feeds from US drones'
-
Click I'm surprised this happened, but whats really surprising is this: "The hacking was possible because the remotely flown planes have an unprotected communications link." :wtf:
If everything was not true, would it be not true that everything is not true? So by saying everything is not true, you are automatically denying that everything is not true. Useful links:
Creating a bootable CD with several operating systems on. -
Click I'm surprised this happened, but whats really surprising is this: "The hacking was possible because the remotely flown planes have an unprotected communications link." :wtf:
If everything was not true, would it be not true that everything is not true? So by saying everything is not true, you are automatically denying that everything is not true. Useful links:
Creating a bootable CD with several operating systems on.Have you ever bid on a defense contract? It wouldn't surprise me to find that one of the clauses in the Predator RFP was "use industry standard video streaming protocols" or some such rot. Even if the contractor who built the thing pointed out the security vulnerability, they were probably told to shut up and build the damned thing already.
Software Zen:
delete this;
Fold With Us![^] -
Click I'm surprised this happened, but whats really surprising is this: "The hacking was possible because the remotely flown planes have an unprotected communications link." :wtf:
If everything was not true, would it be not true that everything is not true? So by saying everything is not true, you are automatically denying that everything is not true. Useful links:
Creating a bootable CD with several operating systems on."Encryption? If I can't do it, how should those camel-herding sand dwellers?" But apparently, they did piggyback on an existing protocol designed back when everyone was a sand dweller.
Personally, I love the idea that Raymond spends his nights posting bad regexs to mailing lists under the pseudonym of Jane Smith. He'd be like a super hero, only more nerdy and less useful. [Trevel]
| FoldWithUs! | sighist | µLaunch - program launcher for server core and hyper-v server -
Have you ever bid on a defense contract? It wouldn't surprise me to find that one of the clauses in the Predator RFP was "use industry standard video streaming protocols" or some such rot. Even if the contractor who built the thing pointed out the security vulnerability, they were probably told to shut up and build the damned thing already.
Software Zen:
delete this;
Fold With Us![^]the Predator was built using off-the-shelf components, though they are still $15,000,000 apiece. the problem's not limited to Predators, however.
-
the Predator was built using off-the-shelf components, though they are still $15,000,000 apiece. the problem's not limited to Predators, however.
Heard that the iraqi insurgents used a piece of software worth $26..[^] like WTF...thought there was supposed to be such a thing as a secure com channel?!?! Especially in the military... :omg: :wtf: Tom
#define STOOPID #if STOOPID Console.WriteLine("I'm stoopid!"); #endif
-
Heard that the iraqi insurgents used a piece of software worth $26..[^] like WTF...thought there was supposed to be such a thing as a secure com channel?!?! Especially in the military... :omg: :wtf: Tom
#define STOOPID #if STOOPID Console.WriteLine("I'm stoopid!"); #endif
-
Click I'm surprised this happened, but whats really surprising is this: "The hacking was possible because the remotely flown planes have an unprotected communications link." :wtf:
If everything was not true, would it be not true that everything is not true? So by saying everything is not true, you are automatically denying that everything is not true. Useful links:
Creating a bootable CD with several operating systems on. -
Welcome to the new American Defense System. Crap built by the lowest bidder because they are still running VB6.
Back in the blog beatch! http://CraptasticNation.blogspot.com/[^]
leckey wrote:
they are still running VB6.
When did they upgrade?:confused: Back in my day, they objected to hpl because it used lower case letters. Well, to be fair, it might have been due a little to my programming methods. Apparently Navy QA types object to programs that modify themselves at runtime.
"A Journey of a Thousand Rest Stops Begins with a Single Movement"
-
leckey wrote:
they are still running VB6.
When did they upgrade?:confused: Back in my day, they objected to hpl because it used lower case letters. Well, to be fair, it might have been due a little to my programming methods. Apparently Navy QA types object to programs that modify themselves at runtime.
"A Journey of a Thousand Rest Stops Begins with a Single Movement"
Oooh! I'd forgotten about self-modifying code - it must be twenty years or more since I last wrote any of that! :laugh:
All those who believe in psycho kinesis, raise my hand.
-
Heard that the iraqi insurgents used a piece of software worth $26..[^] like WTF...thought there was supposed to be such a thing as a secure com channel?!?! Especially in the military... :omg: :wtf: Tom
#define STOOPID #if STOOPID Console.WriteLine("I'm stoopid!"); #endif
Tomas Brennan wrote:
like WTF...thought there was supposed to be such a thing as a secure com channel?!?!
In the movies there is such a thing! :doh:
Simply Elegant Designs JimmyRopes Designs
Think inside the box! ProActive Secure Systems
I'm on-line therefore I am. JimmyRopes