| TIP: Click on subject to list as thread! | ANSI |
| echo: | |
|---|---|
| to: | |
| from: | |
| date: | |
| subject: | corupted tagline.$$$ |
CA> If the 'key' is truly random what is there to LOOK for? the key of course... what's so hard about that? CA> This does NOT explain where the writers of virus scanners GET CA> the byte sequences of each virus from? Do writers of virii CA> volunteer this information - NOT! of course not... they simply infect machines that are "sacrificed" for the job and then watch what goes on... there are plenty of hardware debuggers and custom designed electronics that one could simply watch and then freeze the operation for a snapshot... it's not an uncommon thing... have you ever heard of "TEMPEST" ?? if not, you need to open your eyes/mind a bit more... it is possible to reproduce everything that your computer does without any kind of wire linking it to the reproduction machine... =EVERYTHING= can be seen... even your keystrokes... of course, it costs hundreds of thousands, if not millions, of $$$ to do but it is possible, is done on routine basis, and done from a distance... computers are such radio broadcast stations... )\/(ark* Origin: (1:3634/12) SEEN-BY: 396/1 632/0 371 633/260 262 267 270 371 634/397 635/506 728 639/252 SEEN-BY: 670/218 @PATH: 3634/12 3651/9 396/1 633/260 635/506 728 633/267 |
|
| SOURCE: echomail via fidonet.ozzmosis.com | |
Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.