Skip to comments.
Large Hadron Collider hacked
Information Age ^
| 9-15-08
Posted on 09/16/2008 3:56:41 AM PDT by Renfield
click here to read article
Navigation: use the links below to view more comments.
first 1-20, 21-31 next last
1
posted on
09/16/2008 3:56:41 AM PDT
by
Renfield
To: Renfield
2
posted on
09/16/2008 4:00:20 AM PDT
by
ari-freedom
(We never hide from history. We make history!)
To: ari-freedom
No big deal, they just found the back door.
3
posted on
09/16/2008 4:03:09 AM PDT
by
shadeaud
To: shadeaud
Coffee...nose...over the keyboard....LOL thingy!
prisoner6
4
posted on
09/16/2008 4:04:09 AM PDT
by
prisoner6
(Right Wing Nuts hold the country together as the loose screws of the Left fall out.)
To: Renfield
Find the hackers, execute, rinse, repeat. These hackers need to go down HARD! Security personnel should be fired and security systems should be updated.
LLS
5
posted on
09/16/2008 4:26:54 AM PDT
by
LibLieSlayer
(GOD, Country, Family... except for dims!)
To: LibLieSlayer
Well, I want to know who made the decision to set this thing up so it is connected to the internet.
I find it hard to believe that it’s necessary for scientists to have remote access to these systems.
As an IT person, I know just how stupid management can be, even smart people in management, when it comes to system security.
You would not believe the arguments and outright disdain people have for even the simplest security measures.
More than likely, the IT team was well aware of the potential for something like this to happen and warned against setting the computer systems up the way they are.
Unfortunately, they’ll probably get in trouble or be fired for being right.
6
posted on
09/16/2008 4:39:03 AM PDT
by
stylin_geek
(Liberalism: comparable to a chicken with its head cut off, but with more spastic motions)
To: Renfield
Someone hacked the Hadron?
Where's Lorena Bobbitt?
Oh. H-a-d-r-o-n.
Never mind.
7
posted on
09/16/2008 4:43:13 AM PDT
by
N. Theknow
(Obama without a teleprompter speaks in tongues.)
To: Renfield
Hacked?
8
posted on
09/16/2008 4:50:30 AM PDT
by
The Chid
To: LibLieSlayer
Find the hackers, execute, rinse, repeat. These hackers need to go down HARD!
Yeah, kill the messenger.
9
posted on
09/16/2008 4:52:30 AM PDT
by
aruanan
To: stylin_geek
“More than likely, the IT team was well aware of the potential for something like this to happen and warned against setting the computer systems up the way they are.”
Your post is dead on. Most people, even senior management view proper security as “IT is throwing their weight around or just being paranoid.”
10
posted on
09/16/2008 4:59:51 AM PDT
by
ko_kyi
To: stylin_geek
We analyze the data in Chicago.
11
posted on
09/16/2008 5:00:45 AM PDT
by
yevgenie
To: Renfield
Can someone explain to me why such systems even have a bridge between outside access and operative control features? If its a manned system, shouldn’t all of the controls be on an isolated internal intranet?
12
posted on
09/16/2008 5:09:17 AM PDT
by
SampleMan
(Community Organizer: What liberals do when they run out of college, before they run out of Marxism.)
To: Renfield
Guess the “secrets of the universe” and “insights into the big bang” will have to wait until they change their passwords.
13
posted on
09/16/2008 5:14:54 AM PDT
by
BooksForTheRight.com
(Fight liberal lies with knowledge. Read conservative books and articles.)
To: Renfield
Why didn’t they just use a crypto device?
14
posted on
09/16/2008 5:25:37 AM PDT
by
stuartcr
(Election year.....Who we gonna hate, in '08?)
To: LibLieSlayer
I don’t agree. They committed a crime, of course, but hackers are right about one thing—they indirectly do a great service by demonstrating the futility of most security systems and they help to make them better. If a couple kids can do this, imagine with a thousand dedicated hackers with unlimited resources (Russian, al-Qaeda, Chinese) can do. I say they should hire the hackers.
WW3 has already begun—it started several years ago when the Russians started massive attacks on US military websites and against sites of allies. al-Qaeda and China have also been doing enormous levels of attacks on security systems. I’m not suggesting these guys are on the same side—if anything, there’s a thousand sides in the war. But it is going on and we need all the help we can get.
To: Renfield
It’s all fun and games until someone hacks in and creates a black hole that can’t be contained.
16
posted on
09/16/2008 5:31:07 AM PDT
by
itsthejourney
(Sarah-cuda IS the right reason)
To: SampleMan
Can someone explain to me why such systems even have a bridge between outside access and operative control features? Have you ever heard of the term, "educated idiot"?
17
posted on
09/16/2008 5:32:45 AM PDT
by
Renfield
(Turning apples into venison since 1999!)
To: stylin_geek
You make some salient points. Thanks.
LLS
18
posted on
09/16/2008 6:24:20 AM PDT
by
LibLieSlayer
(GOD, Country, Family... except when it comes to dims!)
To: aruanan
What message were they sending? I read they wanted to shut it down because as we all know... ALL LIFE WILL CEASE when they throw the switch! (sarc)
LLS
19
posted on
09/16/2008 6:34:13 AM PDT
by
LibLieSlayer
(GOD, Country, Family... except when it comes to dims!)
To: stylin_geek
Almost just as interesting, though, is the massive computer network CERN has set up to evaluate the prodigious quantities of data the LHC will produce. Called the LHC Grid, the network will encompass some 60,000 computers around the world in order to leverage enough computer power to go through the 15 petabytes of information LHC experiments will produce each year.
http://www.spiegel.de/international/europe/0,1518,577219,00.html
20
posted on
09/16/2008 6:37:32 AM PDT
by
Between the Lines
(I am very cognizant of my fallibility, sinfulness, and other limitations.)
Navigation: use the links below to view more comments.
first 1-20, 21-31 next last
Disclaimer:
Opinions posted on Free Republic are those of the individual
posters and do not necessarily represent the opinion of Free Republic or its
management. All materials posted herein are protected by copyright law and the
exemption for fair use of copyrighted works.
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson