Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: rlmorel

Thanks for your reply.

I spent 30 years in IT much of it in Systems Programming and security. As I said I don’t see how he obtained this info unless someone gave it to him.

Color me stupid.


83 posted on 11/28/2010 6:50:15 PM PST by dljordan ("His father's sword he hath girded on, And his wild harp slung behind him")
[ Post Reply | Private Reply | To 59 | View Replies ]


To: dljordan

I guess that the problem I see may not be with systems or even their inherent security… the problem may very well be who decides what documents are stored on the system with a given security set up, and/or who how or why authorizes who has access to that system.

With your background, you certainly understand that you can design a system with the highest degree of security possible, but if someone gets the password out (or actually writes it on a piece of paper and tapes it about the system console) your anchor chain that supposed to hold an aircraft carrier in place against the current cannot hold a floating leaf in place.

As another poster opined, this could be standard intelligence agency operations of compromise and blackmail. An age-old standard that probably still works just as well today as it did 500 years ago.

Of course, liberals would probably say that if we threw all of our moral values out the door, then that would be great because nobody could ever get blackmailed…


85 posted on 11/28/2010 6:56:22 PM PST by rlmorel ("We treat terrorists with kid gloves, and our citizens with rubber gloves." Rush Limbaugh)
[ Post Reply | Private Reply | To 83 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson