Skip to comments.
Mysterious Net traffic Spurs
Code Hunt
CNET ^
| 20 June 2003
| Robert Lemos
Posted on 06/20/2003 7:51:25 PM PDT by Hal1950
click here to read article
Navigation: use the links below to view more comments.
first 1-20, 21-24 next last
1
posted on
06/20/2003 7:51:26 PM PDT
by
Hal1950
To: Hal1950
sorry but technically, this smells like morons with new tools that don't know what they are doing.
2
posted on
06/20/2003 7:57:35 PM PDT
by
CJ Wolf
To: Hal1950
I think this stuff is hitting my commercial installation. And it has been clogging the system.
To: Hal1950
These strange packets must be Neo running around the Matrix.
4
posted on
06/20/2003 8:03:56 PM PDT
by
nhoward14
To: CJ Wolf
it's orrin !!
5
posted on
06/20/2003 8:10:24 PM PDT
by
glock rocks
(shoot fast. shoot straight. shoot safe. practice. carry. molon labe)
To: nhoward14
Jimmy Hoffa!
To: Hal1950
I suspect in time, someone with a disassembler will be able to figure out what this code is up to.
Imagine, though, that we were all using Palladium machines. Where would we be then?
7
posted on
06/20/2003 8:36:05 PM PDT
by
supercat
(TAG--you're it!)
To: Hal1950
Hacker Found!!Helen the Hacked.
An ugly development...origin unknown
To: this_ol_patriot
Helen the Hacked. LOL. But I would point out that they are looking for a hacker, not a hack.
9
posted on
06/20/2003 9:08:02 PM PDT
by
Rocky
To: Hal1950
Verrrry inneresting.
10
posted on
06/20/2003 9:14:45 PM PDT
by
Ciexyz
To: Hal1950
"When the Borg come, they'll come in force. They don't do anything piecemeal"
Maybe a "outsourced IT worker"?
To: Hal1950; blam
Mysterious Net traffic Spurs Code Hunt
Maybe the net has gotten complex enough that it is able to support a neural net consciousness and what they're detecting is its thoughts.
12
posted on
06/20/2003 9:49:54 PM PDT
by
aruanan
To: Hal1950
It's probably a stealth searchbot from a communist country's military intelligence apparatus, looking for vulnerabilities and sensitive information of any kind. Such information could be used for a wide range of criminal or terrorist activities.
13
posted on
06/20/2003 9:58:33 PM PDT
by
SpaceBar
To: aruanan
Skynet.....
To: Hal1950
It must be the "greys" getting revenge for Roswell.
or maybe it is the "father of the internet" (gore)
15
posted on
06/20/2003 10:01:33 PM PDT
by
ChefKeith
(NASCAR...everything else is just a game!)
To: Nexus; adam_az; rwfromkansas; Quix; BagCamAddict; Ernest_at_the_Beach; palmer
To: FairOpinion; *tech_index; MizSterious; shadowman99; Sparta; freedom9; martin_fierro; ...
17
posted on
06/20/2003 11:16:42 PM PDT
by
Ernest_at_the_Beach
(Recall Gray Davis and then start on the other Democrats)
To: SpaceBar
It's probably a stealth searchbot from a communist country's military intelligence apparatus, looking for vulnerabilities and sensitive information of any kind. Such information could be used for a wide range of criminal or terrorist activities.
I think your tinfoil hat is a little tight this morning.
18
posted on
06/21/2003 7:19:53 AM PDT
by
adam_az
To: aruanan
AS code is binary, not uni, it finally happened. A "1" mated with a "0" and produced a packet.
It's running around the internet trying to find its mommy.
19
posted on
06/21/2003 9:37:22 AM PDT
by
happygrl
To: adam_az
I said:
It's probably a stealth searchbot from a communist country's military intelligence apparatus, looking for vulnerabilities and sensitive information of any kind. Such information could be used for a wide range of criminal or terrorist activities.
Then you said:
I think your tinfoil hat is a little tight this morning.
And now I reply:
Well, you might think my scenario is outlandish, and the stuff of conspiricy theories, but
this link (washington post) is about a graduate student who, using standard network query tools, mapped a large amount of corporate lan/wan and larger structures on the internet to the degree where US authorities want his thesis kept under wraps since it could be used by terrorists. So? Is my hypothesis really that outlandish? Don't answer, because the answer is evidently "no", and other people in high places seem to think so as well. I don't doubt for a microsecond that all sorts of nefarious groups including criminals, terrorists, and military agencies of foriegn governments are examining every nook and cranny of the net to understand its underlying structure and possible vulnerabilities. So instead of reaching for the increasingly tired tin-foil hat saw, and attempting to discredit the messenger, you might try thinking outside the box instead.
20
posted on
07/08/2003 10:16:47 PM PDT
by
SpaceBar
Navigation: use the links below to view more comments.
first 1-20, 21-24 next last
Disclaimer:
Opinions posted on Free Republic are those of the individual
posters and do not necessarily represent the opinion of Free Republic or its
management. All materials posted herein are protected by copyright law and the
exemption for fair use of copyrighted works.
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson