Back to the main page

Mailing List Logs for ShadowRN

Message no. 1
From: "Robert A. Hayden" <hayden@*******.MANKATO.MSUS.EDU>
Subject: Attack of the SmartFrames III (Rated PG-13)
Date: Mon, 12 Jul 1993 13:52:05 -0500
Sorry Carter, I deleted your posting by boo boo so I can't quote from you.
But essentially you aswered my question of 'why couldn't we attach a
program to another computer' with 'Security measures prevent this.'

Uh, no offence, but isn't the whole purpose of decking/hacking to bypass
the security?

If I inject a program into a computer, and then trick the computer into
thinking the program is supposed to be there, then I have bypassed security.

Remember, computer security can ALWAYS be bypassed by someone with the
desire. The only secure computer is one that is turned off (and then of
course, you have Street Sammies who will come in and carry it off anyways).

{[> Robert A. Hayden ____ hayden@*******.mankato.msus.edu <]}
{[> \ /__ aq650@****.INS.CWRU.Edu <]}
{[> \/ / <]}
{[> \/ #include <std_disclaimer.h> <]}
-=-=-
(GEEK CODE 0.3): GSS d- p--/-p+ c++ l++ m+/* s-/++ g+ w++ t++ r++ x+

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Random Thought:

The sooner you make your first 5000 mistakes, the sooner you will be
able to correct them.
-- Nicolaides
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Message no. 2
From: "Robert A. Hayden" <hayden@*******.MANKATO.MSUS.EDU>
Subject: Re: Attack of the SmartFrames III (Rated PG-13) (fwd)
Date: Mon, 12 Jul 1993 18:31:24 -0500
I received the following in the mail. As I do not have the Tir
sourcebook, I cannot make comments on this. But I do believe that this
leads credence to the fact that a frame can operate autonomously and within
the computer it has been injected into.

---------- Forwarded message ----------
Date: 12 Jul 93 18:59:14 EDT
From: "Earl R. Forsythe II" <73162.3521@**********.com>
To: "\"Robert A. Hayden\"" <hayden@*******.mankato.msus.edu>
Subject: +Postage Due+Attack of the SmartFrames III (Rated PG-13)

There is some support for your position on frames (presuming I'm
interpreting it correctly, as reading various and sundry mail bits creates
a little confusion on who is supporting what) in the Tir Tairngire
Sourcebook. The major Tir corp computer systems are run in what they call
Non-Real-Time mode, which in essence means the SAN only connects to
abuffer, which stores incoming data. Only after the main system disables
the SAN and severs the MAtrix connection does it retrieve the data in the
buffer. Without the real time link, you can't worm your way in in real
time.

Okay, pretty pat and steady right?

A reply from a decker to this arrangement goes like this:

>>>>>[True, if I can't real-time I can't infiltrate my persona into the
system, but I've still got options. I can slip an autonomous program frame
-- preferably disguised as an innocous data packet -- into the buffer, for
example. When it gets loaded into the system, it commands the mainframe to
open a SAN on the sly and let my persona in that way.]<<<<<

The above is taken from page 86 of the Tir Tairngire Sourcebook, in the
telecomunications section.


Thought you might be interested,

CyberHawk


{[> Robert A. Hayden ____ hayden@*******.mankato.msus.edu <]}
{[> \ /__ aq650@****.INS.CWRU.Edu <]}
{[> \/ / <]}
{[> \/ #include <std_disclaimer.h> <]}
-=-=-
(GEEK CODE 0.3): GSS d- p--/-p+ c++ l++ m+/* s-/++ g+ w++ t++ r++ x+

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Random Thought:

The truth of a proposition has nothing to do with its credibility. And
vice versa.
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

Further Reading

If you enjoyed reading about Attack of the SmartFrames III (Rated PG-13), you may also be interested in:

Disclaimer

These messages were posted a long time ago on a mailing list far, far away. The copyright to their contents probably lies with the original authors of the individual messages, but since they were published in an electronic forum that anyone could subscribe to, and the logs were available to subscribers and most likely non-subscribers as well, it's felt that re-publishing them here is a kind of public service.