Lemon law
Lifer
- Nov 6, 2005
- 20,984
- 3
- 0
Where does this notion come from that we can effortlessly trace the hacker and then punish them. Any hacker able to mount an attack that sophisticated will hack into some other computer network and then all we bomb is some ignorant smuck who unknowingly let their computer get owned.
Wireless networks with insufficient protections are easy targets, if a hacker owns a number of them, they need not use any such network twice in such an attack.
Wireless networks with insufficient protections are easy targets, if a hacker owns a number of them, they need not use any such network twice in such an attack.
