I do security response for a living. It is amazing how this guy was doing the same sorts of things almost 30 years ago as we do today. The technology has changed but the thought process hasn't. The way he hooked a logic analyzer to a tty, and set it to page him when it saw a certain word was essentially an early network intrusion detection system.
The hackers were similar too. They set up shop on a series of vulnerable intermediary machines (Berkley, MITRE) to mask their activities from their actual target (military).
I'm just really glad my job has never required an oscilloscope to measure round trip times for packets.
The hackers were similar too. They set up shop on a series of vulnerable intermediary machines (Berkley, MITRE) to mask their activities from their actual target (military).
I'm just really glad my job has never required an oscilloscope to measure round trip times for packets.
Tell Your Friends