Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Comment Re:source code stolen? (Score 1) 256

More likely the hacker took over someone's desktop machine that was running exploitable software, and was inside the network. Now they can get to file servers, source repository, etc., as soon as the person who had that desktop signs in to those servers. They probably also took over some other desktops used by people without that access. But they just keep trying and eventually get lucky. I'm sure a lot of people there were using exploitable software.

Slashdot Top Deals

The only difference between a car salesman and a computer salesman is that the car salesman knows he's lying.

Working...