Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Clinton: Hackers Targeted State Dept. ‘Every Hour of Every Day’
Washington Free Beacon ^

Posted on 11/03/2016 7:47:11 AM PDT by bryan999

click here to read article


Navigation: use the links below to view more comments.
first previous 1-2021-4041-53 last
To: bryan999

Ohhhhh... I get it... THAT’S why she had to have the NON-SECURE server installed in her basement...

What a doofuss.


41 posted on 11/03/2016 8:37:18 AM PDT by joethedrummer
[ Post Reply | Private Reply | To 1 | View Replies]

To: bryan999

But she didn’t know!


42 posted on 11/03/2016 8:43:51 AM PDT by ballplayer (hvexx NKK c bmytit II iyijjhihhiyyiyiyi it iyiiy II i hi jiihi ty yhiiyihiijhijjyjiyjiiijyuiiijihyii)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Pietro

Think enigma, think magic and the JN 25 and purple codes and how we won WW II

We learned that AF was midway and the target of the whole Japanese Fleet. We done good. We read all or most all their mail

Hillary gave it all away

BTW...... unmentioned in all this is how much foreign mail we are currently reading


43 posted on 11/03/2016 8:43:53 AM PDT by bert ((K.E.; N.P.; GOPc;WASP .... Hilary is an Ameriphobe)
[ Post Reply | Private Reply | To 8 | View Replies]

To: thoughtomator

I used to have some AV program that would alert you when you were pinged. I had to turn that part off because it was unrelenting.


44 posted on 11/03/2016 8:45:29 AM PDT by PLMerite (Lord, let me die fighting lions. Amen.)
[ Post Reply | Private Reply | To 3 | View Replies]

To: publius911
I make backups every Friday. Those are of the programs of on-line files which then become catalogued in my off-line files. Those are of the program data and configurations. The actual proprietary processor systems programs are Rockwell, Siemens, Robox, Mitsubishi, Danfus, etc......

I cannot run compare scans of file A to file B other than the data. The structure is not available to me. I would have to dump the entire on-line program, replace the processor to be safe, download the OEM software program with my set of keys, then download my saved off-line files, and then re-tweak every machine adjustment.

Alias tagging has become so common now that one corrupted machine file can stop an entire facility. New installations don't even have a run local option anymore!

45 posted on 11/03/2016 8:47:41 AM PDT by blackdog
[ Post Reply | Private Reply | To 40 | View Replies]

To: bryan999

“...but also through individual, personal accounts, just really fishing for anything they could get...”

And yet she conducted business over an exposed, unsecured server, with HER NAME ON IT, just to make it easier.


46 posted on 11/03/2016 8:48:16 AM PDT by PLMerite (Lord, let me die fighting lions. Amen.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Nailbiter
Not prison - adorning a tree on Penn Ave in DC as warning to others

I have a soft spot for the original...

Not prison - adorning a tree on Penn Ave in DC...
pour encourager les autres!

One of the many British idiosyncrasies that I admire as an adult, having come down to us via the French.*

* "Punishment inflicted to encourage the others, as a deterrent, usually used ironically, and derived from Voltaire's reference in Candide, to the execution of Admiral Byng in 1757: 'The English shoot an admiral now and then to encourage the others.'

47 posted on 11/03/2016 9:06:38 AM PDT by publius911 (IMPEACH HIM NOW evil, stupid, insane ignorant or just clueless, doesn't matter!)
[ Post Reply | Private Reply | To 19 | View Replies]

To: blackdog

blackdog is smartdoggie.


48 posted on 11/03/2016 9:14:37 AM PDT by Beautiful_Gracious_Skies (LOCK HER UP!)
[ Post Reply | Private Reply | To 15 | View Replies]

To: publius911
My brother in law works as an independent contractor for banks. He runs algorithms to find deposit and debit errors when their daily books don't reconcile. He is always very, very busy. One of the really nifty tricks bi corporations use is to apply all the bad checks they have received to an account where they "accidentally" goof up the account number. Some poor slob has no idea his account is overdrawan to the tune of $130,987.62 for a week. They eventually get it where it belongs but not until p&l bonuses are paid.
49 posted on 11/03/2016 9:26:14 AM PDT by blackdog
[ Post Reply | Private Reply | To 40 | View Replies]

To: Cboldt
Didn’t even run the e-mail side under TLS.
Bwahahahahaha.

OK I admit it.
I had to go learn something new, even if I can't understand most of it.

Who Supports TLS?

50 posted on 11/03/2016 9:28:02 AM PDT by publius911 (IMPEACH HIM NOW evil, stupid, insane ignorant or just clueless, doesn't matter!)
[ Post Reply | Private Reply | To 25 | View Replies]

To: publius911
TLS is just encrypting one leg of transport of information, like e-mail. I aggregate my e-mail on one of my own computers, and serve the aggregation up for my own use. The serving up of the e-mail collection is under TLS, and as much as possible, fetching the e-mail from sources is under TLS. But as the article points out, the ONLY legs I can control are the fetching and serving from that one machine. Most e-mail that I get passes through three or more machines before it gets to my computer.

At any rate, Crooked was sending and receiving her stuff "in the clear," so any entity, including those that intercept the packets "in the middle," can easily read the contents.

51 posted on 11/03/2016 9:33:39 AM PDT by Cboldt
[ Post Reply | Private Reply | To 50 | View Replies]

To: bryan999
Hillary Clinton privately told a major Wall Street bank that her State Department was subject to cyber-attacks “every hour of every day,” and that those attacks targeted employees’ personal email accounts . . . “We were attacked every hour of every day and not only through the State Department system, but also through individual, personal accounts . . ."

Hillary is not stupid enough that she could not put this together with her email scheme. To keep a private server and use it for Top Secret codeword materials under these conditions could only be described as pure evil - treason. Note to FBI Director Comey, that means she had intent to commit treason.

52 posted on 11/03/2016 10:09:57 AM PDT by Pollster1 (Somebody who agrees with me 80% of the time is a friend and ally, not a 20% traitor. - Ronald Reagan)
[ Post Reply | Private Reply | To 1 | View Replies]

To: publius911

pour encourager les autres!

I could not think of that phrase, my French being somewhat rusty.

Thanks


53 posted on 11/03/2016 7:45:17 PM PDT by Nailbiter
[ Post Reply | Private Reply | To 47 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-53 last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson