Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

2 lawmakers say computers hacked by Chinese
AP on Breitbart.com ^ | 6/11/08 | Pete Yost and Lara Jakes Jordan - ap

Posted on 06/11/2008 12:34:17 PM PDT by NormsRevenge

click here to read article


Navigation: use the links below to view more comments.
first 1-2021-29 next last

1 posted on 06/11/2008 12:34:17 PM PDT by NormsRevenge
[ Post Reply | Private Reply | View Replies]

In this Sept. 20, 2006 file photo, Rep. Frank R. Wolf, R-Va. gestures during a news conference on Capitol Hill in Washington. Wolf said Wednesday, June 11,2 008, the FBI has found that four of his government computers have been hacked by sources working out of China. (AP Photo/Lawrence Jackson, File)


2 posted on 06/11/2008 12:36:25 PM PDT by NormsRevenge (Semper Fi ... Godspeed ... ICE toll-free tip hotline 1-866-DHS-2-ICE ... 9/11 .. Never FoRget!!!)
[ Post Reply | Private Reply | To 1 | View Replies]

The FBI declined to comment. In Beijing, the Chinese Ministry of Foreign Affairs had no immediate comment. Last week, China denied the accusations regarding Gutierrez’s laptop and the alleged effort to hack Commerce Department computers.

Wolf said he has known about the hacking for a long time but was discouraged from discussing it publicly by people inside U.S. government, whom he refused to identify.

“The problem has been that no one wants to talk about this issue,” said Wolf. “Every time I’ve started to do something I’ve been told ‘You can’t do this.’ A lot of people have made it very, very difficult.”


3 posted on 06/11/2008 12:37:24 PM PDT by NormsRevenge (Semper Fi ... Godspeed ... ICE toll-free tip hotline 1-866-DHS-2-ICE ... 9/11 .. Never FoRget!!!)
[ Post Reply | Private Reply | To 2 | View Replies]

To: NormsRevenge

What a bunch of dummies! Sensitive files should never be kept on a computer that has portals to the internet.

The home computer we have that has a portal to the internet unfortunately has an IP address that is within the range used by government computers. We get hacked all the time!

Sensitive data - financial records and favorite recipes - are kept on our other computer, a stand alone.


4 posted on 06/11/2008 12:38:08 PM PDT by SatinDoll (Desperately desiring a conservative government.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: SatinDoll

Good idea to have a computer that can’t connect to the internet.


5 posted on 06/11/2008 12:41:32 PM PDT by wastedyears (Like a bat outta Hell.)
[ Post Reply | Private Reply | To 4 | View Replies]

To: wastedyears
Good idea to have a computer that can’t connect to the internet.

I have no prolems with security... and connect with all four of my Macs, networked, and open to Mr. Gore's invention. Try and get in! It's on right now!


6 posted on 06/11/2008 12:47:03 PM PDT by WVKayaker ( "Life is pleasant. Death is peaceful. It's the transition that's troublesome..." I. Asimov)
[ Post Reply | Private Reply | To 5 | View Replies]

To: WVKayaker

Not sure why this is news; my firewall gets felt up by the far east just about every day.


7 posted on 06/11/2008 12:53:33 PM PDT by DonaldC
[ Post Reply | Private Reply | To 6 | View Replies]

To: WVKayaker

All evidence to the contrary.

http://www.infoworld.com/article/08/03/27/Gone-in-2-minutes-Mac-gets-hacked-first-in-contest_1.html


8 posted on 06/11/2008 1:00:12 PM PDT by TexasGunLover ("Either you're with us or you're with the terrorists."-- President George W. Bush)
[ Post Reply | Private Reply | To 6 | View Replies]

To: TexasGunLover

“Nobody was able to hack into the systems on the first day of the contest when contestants were only allowed to attack the computers over the network, but on Thursday the rules were relaxed so that attackers could direct contest organizers using the computers to do things like visit Web sites or open e-mail messages.”

This is funny. Just shows computer security is as good as the idiot driving it. Course without local access to the machine, it seemed pretty secure.


9 posted on 06/11/2008 1:06:33 PM PDT by DonaldC
[ Post Reply | Private Reply | To 8 | View Replies]

To: DonaldC

That was a quote from the infoworld link, by the way. :)


10 posted on 06/11/2008 1:16:33 PM PDT by DonaldC
[ Post Reply | Private Reply | To 9 | View Replies]

To: NormsRevenge

chicom bump for later............


11 posted on 06/11/2008 1:16:41 PM PDT by indthkr
[ Post Reply | Private Reply | To 1 | View Replies]

To: DonaldC
Computers are inherently insecure.

Linux, Windows, Mac OS, other flavors of Unix, all have their faults. Fan boys will defend one over the other, but the fact is they all have their stability, security and reliability problems.
12 posted on 06/11/2008 1:19:27 PM PDT by TexasGunLover ("Either you're with us or you're with the terrorists."-- President George W. Bush)
[ Post Reply | Private Reply | To 9 | View Replies]

To: NormsRevenge
Wolf said that in his office, the hackers "got everything," including all the casework regarding political dissidents around the world.

What a 1st class imbecile this guy is..
He is known to be anti-Chicom, and and working on Chinese human right issues - AND HE PUTS THAT INFO ON HIS UNSECURED LAPTOP - even though everyone and his mother know the chicoms have been hacking into everthing they think has value???
A lot of good people over in China could die because of this lame-brain..

13 posted on 06/11/2008 1:26:03 PM PDT by Riodacat (Legum servi sumus ut liberi esse possimus.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: TexasGunLover
All Some evidence to the contrary.

Please explain what happened. I think I know. If you're interested in a proper explanation, you can scan Swordmaker's files, or just ask him. I just use my computers.

I can leave my Mac on all the time. Unfortunately, viruses are programs, and can only rub if I tell them to do so. Of course, it has to get past a firewall, built into OSX.

Show evidence of something real, in the wild, that can actually penetrate my native security, and not something from somebody trying to sell anti-whatever software!

I'll buy you a bottle of your choice if you can prove the ability to spy on my computer exists. Take over my computer, and I'll buy you a case!

14 posted on 06/11/2008 1:44:13 PM PDT by WVKayaker ( "Life is pleasant. Death is peaceful. It's the transition that's troublesome..." I. Asimov)
[ Post Reply | Private Reply | To 8 | View Replies]

To: WVKayaker
OSX/Inqtana.A, and Leap.A are examples of viruses that have been seen in the wild that affect the Mac OS X platform.

Like any other OS, Macs can be, have been, and are being cracked right now. As the article stated, like other OS's Mac OS was not able to be cracked over the network. This also applies to Vista and recent Linux distributions.

With physical access, like other platforms including Windows and Linux, I can gain access to your files with nothing more than a Mac OS installation disk. No password required.

Due to the very nature of the TCP/IP stack, your non-SSL network traffic is completely interpretable.
15 posted on 06/11/2008 2:04:30 PM PDT by TexasGunLover ("Either you're with us or you're with the terrorists."-- President George W. Bush)
[ Post Reply | Private Reply | To 14 | View Replies]

To: WVKayaker

I hear there’s a backdoor if you’re watching the “China Syndrome” on a Mac.

I wouldn’t taunt them if I were you.


16 posted on 06/11/2008 2:07:33 PM PDT by wolfcreek (I see miles and miles of Texas....let's keep it that way.)
[ Post Reply | Private Reply | To 6 | View Replies]

To: TexasGunLover
With physical access, like other platforms including Windows and Linux, I can gain access to your files with nothing more than a Mac OS installation disk. No password required.

Smith & Wesson may limit your access...

17 posted on 06/11/2008 2:09:31 PM PDT by WVKayaker ( "Life is pleasant. Death is peaceful. It's the transition that's troublesome..." I. Asimov)
[ Post Reply | Private Reply | To 15 | View Replies]

To: wolfcreek
Never cared for Kurt. I'm a Jet Li guy! (after Chuck Norris, of course!)


18 posted on 06/11/2008 2:16:55 PM PDT by WVKayaker ( "Life is pleasant. Death is peaceful. It's the transition that's troublesome..." I. Asimov)
[ Post Reply | Private Reply | To 16 | View Replies]

To: WVKayaker
& Wesson may limit your access...

Never the point of the argument. The point is, they're all unsecure. Besides, you don't stay at home all day long do you?

Where there's a will, there's a way.
19 posted on 06/11/2008 2:18:22 PM PDT by TexasGunLover ("Either you're with us or you're with the terrorists."-- President George W. Bush)
[ Post Reply | Private Reply | To 17 | View Replies]

To: TexasGunLover
whatever...


20 posted on 06/11/2008 2:34:35 PM PDT by WVKayaker ( "Life is pleasant. Death is peaceful. It's the transition that's troublesome..." I. Asimov)
[ Post Reply | Private Reply | To 19 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-29 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson