Posted on 11/27/2010 8:26:46 PM PST by SeekAndFind
GOD BLESS THE MOSSAD!
Pods on wiki-leaks for telling on Israel.
GOD BLESS THE MOSSAD!
Piss on wiki-leaks for telling on Israel.
Microsoft system 7 is crap code.
So, the Iranians should have used UNIX or Linux instead?
How about OpenVMS?
Siemens used Microsoft
Snow Leopard?
None of it matters. muslims have not invented anything in over 1,000 years - being a copy-cat and thinking your important is a silly position.
Must have been Israel that planted this bug. If it had been done by us, why didn’t we give it to North Korea too?
... and the first best story ever told is ... ?
I hope Siemens had a hand in this Search and Destroy as I’m getting a second Siemens hearing aid on the 2nd...
If you go to the Sky News video, you come away with the idea that this technology is aimed at the West and we are so far behind the curve that we have already lost the Cyberwar of the future because we are so far behind.
To the contrary, I believe this shows the world just how far in advance the West is in cyberwarfare—and the glimpse that the mystery hackers allowed the rest of the world to see was specifically meant to demonstrate our lead as a warning.
At least I hope so.
May God bless and protect Israel.
The Greatest Story Ever Told?
I don’t know much about this stuff, but I wonder if the thing could be like certain trojans: you think you’ve gotten rid of them, you wipe the hard drive and reinstall everything, and six months or six weeks later the damn thing is back.
Ah, didn’t know that was a movie. Looked it up. Thanks.
This is a classic rock and a hard place problem. Clamp down tight, kill efficiencies. Don't clamp down and get hit again...
I cant imagine why theyd do that unless Siemens itself is part of this or is under heavy pressure from the German government to cooperate.
The password in question is the database access password use by the SCADA software. It cannot be changed without a software update apparently. Just bad design, not nefarious pressure. From Siemens' website:
The user login and the password for WinCC are freely definable and have nothing to do with access to the internal database. The internal system authentication from WinCC to the Microsoft SQL database is based on pre-defined access data. This data is not visible for the customer and is used as an internal system mechanism for communication between the WinCC system components and the database. Changing the access data would impede communication between WinCC and the database and is therefore not recommended. Tightening up authentication procedures is being examined.
The other thing about this article that I think is wrong is that the certificate stolen from Realtek would have been used to sign software executables to hide them from Windows and from scanning software by making it look like a legitimate driver or application from Realtek.
I am not a nuclear physicist, but since centrifuge cascades are in series, not parallel, I would think that ALL of the centrifuges would have to work correctly at the same time, requiring very high reliability.
Would you want to reuse centrifuges that had been monkeyed with by Stuxnet in series with known good centrifuges?
It just keeps getting better. Are you feeling lucky, Mahmoud?
That’s all sorts of awesome. Of course, knowing the problem is one thing. Knowing how to fix the problem, quite another.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.