Skip to comments.
Clinton: Hackers Targeted State Dept. ‘Every Hour of Every Day’
Washington Free Beacon ^
Posted on 11/03/2016 7:47:11 AM PDT by bryan999
click here to read article
Navigation: use the links below to view more comments.
first previous 1-20, 21-40, 41-53 last
To: bryan999
Ohhhhh... I get it... THAT’S why she had to have the NON-SECURE server installed in her basement...
What a doofuss.
To: bryan999
42
posted on
11/03/2016 8:43:51 AM PDT
by
ballplayer
(hvexx NKK c bmytit II iyijjhihhiyyiyiyi it iyiiy II i hi jiihi ty yhiiyihiijhijjyjiyjiiijyuiiijihyii)
To: Pietro
Think enigma, think magic and the JN 25 and purple codes and how we won WW II
We learned that AF was midway and the target of the whole Japanese Fleet. We done good. We read all or most all their mail
Hillary gave it all away
BTW...... unmentioned in all this is how much foreign mail we are currently reading
43
posted on
11/03/2016 8:43:53 AM PDT
by
bert
((K.E.; N.P.; GOPc;WASP .... Hilary is an Ameriphobe)
To: thoughtomator
I used to have some AV program that would alert you when you were pinged. I had to turn that part off because it was unrelenting.
44
posted on
11/03/2016 8:45:29 AM PDT
by
PLMerite
(Lord, let me die fighting lions. Amen.)
To: publius911
I make backups every Friday. Those are of the programs of on-line files which then become catalogued in my off-line files. Those are of the program data and configurations. The actual proprietary processor systems programs are Rockwell, Siemens, Robox, Mitsubishi, Danfus, etc......
I cannot run compare scans of file A to file B other than the data. The structure is not available to me. I would have to dump the entire on-line program, replace the processor to be safe, download the OEM software program with my set of keys, then download my saved off-line files, and then re-tweak every machine adjustment.
Alias tagging has become so common now that one corrupted machine file can stop an entire facility. New installations don't even have a run local option anymore!
45
posted on
11/03/2016 8:47:41 AM PDT
by
blackdog
To: bryan999
“...but also through individual, personal accounts, just really fishing for anything they could get...”
And yet she conducted business over an exposed, unsecured server, with HER NAME ON IT, just to make it easier.
46
posted on
11/03/2016 8:48:16 AM PDT
by
PLMerite
(Lord, let me die fighting lions. Amen.)
To: Nailbiter
Not prison - adorning a tree on Penn Ave in DC as warning to others I have a soft spot for the original...
Not prison - adorning a tree on Penn Ave in DC...
pour encourager les autres!
One of the many British idiosyncrasies that I admire as an adult, having come down to us via the French.*
* "Punishment inflicted to encourage the others, as a deterrent, usually used ironically, and derived from Voltaire's reference in Candide, to the execution of Admiral Byng in 1757: 'The English shoot an admiral now and then to encourage the others.'
47
posted on
11/03/2016 9:06:38 AM PDT
by
publius911
(IMPEACH HIM NOW evil, stupid, insane ignorant or just clueless, doesn't matter!)
To: blackdog
To: publius911
My brother in law works as an independent contractor for banks. He runs algorithms to find deposit and debit errors when their daily books don't reconcile. He is always very, very busy. One of the really nifty tricks bi corporations use is to apply all the bad checks they have received to an account where they "accidentally" goof up the account number. Some poor slob has no idea his account is overdrawan to the tune of $130,987.62 for a week. They eventually get it where it belongs but not until p&l bonuses are paid.
49
posted on
11/03/2016 9:26:14 AM PDT
by
blackdog
To: Cboldt
Didnt even run the e-mail side under TLS.
Bwahahahahaha. OK I admit it.
I had to go learn something new, even if I can't understand most of it.
Who Supports TLS?
50
posted on
11/03/2016 9:28:02 AM PDT
by
publius911
(IMPEACH HIM NOW evil, stupid, insane ignorant or just clueless, doesn't matter!)
To: publius911
TLS is just encrypting one leg of transport of information, like e-mail. I aggregate my e-mail on one of my own computers, and serve the aggregation up for my own use. The serving up of the e-mail collection is under TLS, and as much as possible, fetching the e-mail from sources is under TLS. But as the article points out, the ONLY legs I can control are the fetching and serving from that one machine. Most e-mail that I get passes through three or more machines before it gets to my computer.
At any rate, Crooked was sending and receiving her stuff "in the clear," so any entity, including those that intercept the packets "in the middle," can easily read the contents.
51
posted on
11/03/2016 9:33:39 AM PDT
by
Cboldt
To: bryan999
Hillary Clinton privately told a major Wall Street bank that her State Department was subject to cyber-attacks every hour of every day, and that those attacks targeted employees personal email accounts . . . We were attacked every hour of every day and not only through the State Department system, but also through individual, personal accounts . . ." Hillary is not stupid enough that she could not put this together with her email scheme. To keep a private server and use it for Top Secret codeword materials under these conditions could only be described as pure evil - treason. Note to FBI Director Comey, that means she had intent to commit treason.
52
posted on
11/03/2016 10:09:57 AM PDT
by
Pollster1
(Somebody who agrees with me 80% of the time is a friend and ally, not a 20% traitor. - Ronald Reagan)
To: publius911
pour encourager les autres!
I could not think of that phrase, my French being somewhat rusty.
Thanks
Navigation: use the links below to view more comments.
first previous 1-20, 21-40, 41-53 last
Disclaimer:
Opinions posted on Free Republic are those of the individual
posters and do not necessarily represent the opinion of Free Republic or its
management. All materials posted herein are protected by copyright law and the
exemption for fair use of copyrighted works.
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson