![]() ![]() ![]() ![]() |
|
HTPC Intel Pentium G3258 cpu, Gigabyte H97n-wifi motherboard, , 8GB DDR3 ram, onboard graphics. Hauppuage HVR 5500 tuner, Silverstone LC16M case, Windows 10 pro 64 bit using Nextpvr and Kodi
sir1963:networkn:nate:jeffnz: so back to topic what is the legal standing on this, is it hacking or not
I don't think so.
Why aren't Labour jumping up and down at the staff member/contractor that didn't secure their web server correctly?
Well that's simple. Labours entire premise is based on no requirement for personal responsibility.
Yet another attempt to blame the victim.
You believe girls who get raped are at fault because of what they wear ?
I presume you also believe it is Slaters fault for his stuff being hacked, he too obviously did not employ enough security...
Please support Geekzone by subscribing, or using one of our referral links: Samsung | AliExpress | Wise | Sharesies | Hatch | GoodSync | Backblaze backup
Of course there are many definitions of "hacking". One is the skills people use to develop programs (as in "hacking code" and "hacktons). The other applies to people who deeply understand how a system work and are capable of using it to the max (legal or illegal, for example phreaking). And lastly the one that is the mainstream (even though I don't agree) is someone using tricks, social engineering, system exploits to illegal access data.
Under these definitions, yes it was a hack. But I wouldn't classify it as a high end hacking - no deep exploits required, no social engineering applied to steal someone's password, no keylogger installed, etc.
So, it can sway both ways here.
Please support Geekzone by subscribing, or using one of our referral links: Samsung | AliExpress | Wise | Sharesies | Hatch | GoodSync | Backblaze backup
networkn:sir1963:networkn:nate:jeffnz: so back to topic what is the legal standing on this, is it hacking or not
I don't think so.
Why aren't Labour jumping up and down at the staff member/contractor that didn't secure their web server correctly?
Well that's simple. Labours entire premise is based on no requirement for personal responsibility.
Yet another attempt to blame the victim.
You believe girls who get raped are at fault because of what they wear ?
I presume you also believe it is Slaters fault for his stuff being hacked, he too obviously did not employ enough security...
Heh, ok fella, calm yourself down. I never once mentioned rape and conclusions you have drawn to the same are incredibly offensive to me.
I think there is a difference between stuff being accessible by a rank amateur due to gross incompetence and requiring special tools and skills to obtain information.
sir1963:networkn:sir1963:networkn:nate:jeffnz: so back to topic what is the legal standing on this, is it hacking or not
I don't think so.
Why aren't Labour jumping up and down at the staff member/contractor that didn't secure their web server correctly?
Well that's simple. Labours entire premise is based on no requirement for personal responsibility.
Yet another attempt to blame the victim.
You believe girls who get raped are at fault because of what they wear ?
I presume you also believe it is Slaters fault for his stuff being hacked, he too obviously did not employ enough security...
Heh, ok fella, calm yourself down. I never once mentioned rape and conclusions you have drawn to the same are incredibly offensive to me.
I think there is a difference between stuff being accessible by a rank amateur due to gross incompetence and requiring special tools and skills to obtain information.
My point being as soon as you need to blame the victim to justify what has been done, you have automatically put yourself in the wrong.
There was no call for National or its supporters to be there, and even less for them to exploit a flaw in security. Honest people don't do this.
Equally I object to anyone getting at Cameron Slaters information.
I was bought up to know the difference between right and wrong
Please support Geekzone by subscribing, or using one of our referral links: Samsung | AliExpress | Wise | Sharesies | Hatch | GoodSync | Backblaze backup
sir1963:networkn:sir1963:networkn:nate:jeffnz: so back to topic what is the legal standing on this, is it hacking or not
I don't think so.
Why aren't Labour jumping up and down at the staff member/contractor that didn't secure their web server correctly?
Well that's simple. Labours entire premise is based on no requirement for personal responsibility.
Yet another attempt to blame the victim.
You believe girls who get raped are at fault because of what they wear ?
I presume you also believe it is Slaters fault for his stuff being hacked, he too obviously did not employ enough security...
Heh, ok fella, calm yourself down. I never once mentioned rape and conclusions you have drawn to the same are incredibly offensive to me.
I think there is a difference between stuff being accessible by a rank amateur due to gross incompetence and requiring special tools and skills to obtain information.
My point being as soon as you need to blame the victim to justify what has been done, you have automatically put yourself in the wrong.
There was no call for National or its supporters to be there, and even less for them to exploit a flaw in security. Honest people don't do this.
Equally I object to anyone getting at Cameron Slaters information.
I was bought up to know the difference between right and wrong
Galaxy S10
Garmin Fenix 5
freitasm: Bringing back some stuff from 2011?
Sure, there was no "hacking" (if you define hacking as using exploits, social engineering) back then as because of a badly configured web server some content was visible in plain sight. But was it ok to grab it?
If you leave your house unlocked and someone walks in, is it ok for your TV to be gone?
My comment is not specifically aimed at WhaleOil but it is a general question. If YOU go to a website and by chance it's not serving the pages but showing a directory would you grab credit card numbers if available and start using them?
Also perhaps this video would be better posted in the Dirty Politics book discussion going on now?
_____________________________________________________________________
I've been on Geekzone over 16 years..... Time flies....
freitasm:Of course there are many definitions of "hacking". One is the skills people use to develop programs (as in "hacking code" and "hacktons). The other applies to people who deeply understand how a system work and are capable of using it to the max (legal or illegal, for example phreaking). And lastly the one that is the mainstream (even though I don't agree) is someone using tricks, social engineering, system exploits to illegal access data.
Under these definitions, yes it was a hack. But I wouldn't classify it as a high end hacking - no deep exploits required, no social engineering applied to steal someone's password, no keylogger installed, etc.
So, it can sway both ways here.
JWR:freitasm: Of course there are many definitions of "hacking". One is the skills people use to develop programs (as in "hacking code" and "hacktons). The other applies to people who deeply understand how a system work and are capable of using it to the max (legal or illegal, for example phreaking). And lastly the one that is the mainstream (even though I don't agree) is someone using tricks, social engineering, system exploits to illegal access data.
Under these definitions, yes it was a hack. But I wouldn't classify it as a high end hacking - no deep exploits required, no social engineering applied to steal someone's password, no keylogger installed, etc.
So, it can sway both ways here.
I think the term 'Hacking' is meaningless now.
I would call it exploiting a security vulnerability.
The discovery of the vulnerability isn't the issue. It is what was done with the knowledge.
Also, too many analogies in this thread.
Analogy, is used to simplify something for easier understanding and not used to turn it into something else.
Too much something else.
|
![]() ![]() ![]() ![]() |