Comment Re:Just ... (Score 3, Funny) 308
Maybe yours isn't...
Maybe yours isn't...
"...run out of the building screaming incoherently..."
Oh, wait, that won't do. That's what I do every day...
When I get sacked, I plan to grab all the doughnuts I can and run out of the building screaming incoherently.
No, it's not scummy when congress does it. They're protecting us. The walls of legislative text are actually a defense barrier, shielding our precious little minds from harmful truths. And let's be realistic, we wouldn't understand the truth anyway.
Mod parent up (extremely) +Informative.
(seriously, some earlier posts now have "+5 Funny" for one-line quips about breastfeeding.)
Original message follows...
----Origineel bericht----
Van: Shang Tsung
Verzonden: 30-06-2010 13:03:32
Onderw.: Should nmap cause a DoS on cisco routers?
Hello,
Some days ago, I had the task to discover the SNMP version that our
servers and networking devices use. So I run nmap using the following
command:
nmap -sU -sV -p 161-162 -iL target_file.txt
This command was supposed to use UDP to probe ports 161 and 162, which
are used for SNMP and SNMP Trap respectively, and return the SNMP
version.
This "innocent" command caused most networking devices to crash and
reboot, causing a Denial of Service attack and bringing down the
network.
Now my question is.. Should this had happened? Can nmap bring the whole
network down from one single machine?
Is this a configuration error of the networking devices?
This is scary...
Shang Tsung
If this comment was attacking Bush a few years ago, calling him a fascist, it might very well have been modded up (it also would've been true...). If we want a truly open forum here, we really shouldn't so quickly silence those who disagree with us.
http://tech.slashdot.org/story/07/05/15/1420238/MIT-Media-Lab-Making-Programming-Fun-For-Kids
What can be done with that secret ID? Quite a lot, it turns out. The IMSI is sent by the phone to the network when first signing on to the network; it's used by the network to figure out which call should be routed where. With someone else's IMSI, an attacker can determine the person's name and phone number, and even track his or her position. It also opens the door to active attacks—creating fake cell towers that a victim's phone will connect to, enabling every call and text message to be eavesdropped.
Moderators, please "untroll" this comment.
Is directing negative comments towards ${YOUR_PARTY} inherently trollish and anything positive "insightful"?
Miniluv really has a doubleplusgood idea here. Crimethink must be stopped, and this is a great first step to protecting us from ourselves.
Admittedly, glitter-glue is a bit more tedious than more grown-up stationary, but it begs a certain elegant economy of words.
According to all the latest reports, there was no truth in any of the earlier reports.