What's new

USA Threatens China with Military Blows in Response to Cyber Attacks

There are some things, Which cannot be opened up in public, Your Cyber space is safe, and That I can assure you.... No one plays with India when We have such booming IT power, And from when has the Govt formed organization for chappal Chor's?

well,i agree to the part that not all ino are opened for the public............ but saying no one plays with India when we have booming IT power is wrong....The chinese have even be attacking US who is technologically much advanced than us.
 
Never going to happen.

This is really discouraging to hear that the US can't even defend against the attacks, knowing fully well that thousands of attacks are going on?

Sensitive data should not be kept on public servers.

I did a course on computer forensics a few years ago, the instructor started off with:

What is the most secure computer?

1. Totally disconnected from any network
2. No peripheral devices
3. Switched off
4. Dismantled
5. Locked up in a box
6. Buried 10 ft under the ground
7. Armed detail guarding it.

This will be the most secure computer, but its also useless.

So you always have to make a trade off between what you can secure and at what cost.
 
well,i agree to the part that not all ino are opened for the public............ but saying no one plays with India when we have booming IT power is wrong....The chinese have even be attacking US who is technologically much advanced than us.

So what? They couldnt get away, Could they?? That even a small child with basic Hacking knowledge can do, But the Main part is getting away with Info...
 
Never going to happen.

This is really discouraging to hear that the US can't even defend against the attacks, knowing fully well that thousands of attacks are going on?

Sensitive data should not be kept on public servers.

I did a course on computer forensics a few years ago, the instructor started off with:

What is the most secure computer?

1. Totally disconnected from any network
2. No peripheral devices
3. Switched off
4. Dismantled
5. Locked up in a box
6. Buried 10 ft under the ground
7. Armed detail guarding it.

This will be the most secure computer, but its also useless.

So you always have to make a trade off between what you can secure and at what cost.

Asim not everything can be disconnected from the net. there are institutions of government which are for use of the public which needs to be running all the time. if they get hacked at any point of time the loss is very high within few couple of minutes.
 
So what? They couldnt get away, Could they?? That even a small child with basic Hacking knowledge can do, But the Main part is getting away with Info...

well, I would not say that they got away with it..but I can tell you that we have been attacked several times and sensitive data has been hacked ..infact to the surprise , Indian authorities were not even aware of it when once the indian military data were stolen by them....they were informed about the theft only after the data were stolen and that too from the outside sources like Canada when they came across these incident while their own research...its true..believe me...as far as damage is concerned..I dont think there were any damage is expected out of that hacking incident.
 
Never going to happen.

This is really discouraging to hear that the US can't even defend against the attacks, knowing fully well that thousands of attacks are going on?

Sensitive data should not be kept on public servers.

I did a course on computer forensics a few years ago, the instructor started off with:

What is the most secure computer?

1. Totally disconnected from any network
2. No peripheral devices
3. Switched off
4. Dismantled
5. Locked up in a box
6. Buried 10 ft under the ground
7. Armed detail guarding it.
This will be the most secure computer, but its also useless.

BLAH BLAH..ever herrd of firewalls & VPN ?
 
BLAH BLAH..ever herrd of firewalls & VPN ?
Are you commenting about the SECURE computer example? I thought it was obvious but it was just a common joke between IS Security professionals - meaning nothing can ever be secured 100%

Firewalls all get broken. Some FWs of the yesteryears (and to some extent of todays too), would reset to factory settings whenever faced with a DDoS attack. Many OS's (including the software on the FW) would still deal with a buffer overflow with a restart command.

VPN's is just encrypted traffic flowing over a public network (like the internet) discernible to just the two points. Now the data can be intercepted over the public network but it won't be readable without the encryption keys. Breaking encryption is usually just time consuming, not impossible, not hard.

Given super computers of today with grid computing capabilities even the time is reduced.
 
Asim not everything can be disconnected from the net. there are institutions of government which are for use of the public which needs to be running all the time. if they get hacked at any point of time the loss is very high within few couple of minutes.
Fine then you lose public privacy and things like that. But issues of national security should be protected from all public view.

Why do companies with multiple locations invest in server clusters of lets say MS Exchange for email? Google offers 7 GB accounts, with the best spam filters and the use of your own domain and everything

However the data on Gmail is on a public server and open to review by the US authorities. By comparison MS Exchange is hosted on a closed internal network of the company.

What you expose to the public is always a matter of concern. There is always a security trade off whenever you expose something to a public network.
 
Are you commenting about the SECURE computer example? I thought it was obvious but it was just a common joke between IS Security professionals - meaning nothing can ever be secured 100%

Firewalls all get broken. Some FWs of the yesteryears (and to some extent of todays too), would reset to factory settings whenever faced with a DDoS attack. Many OS's (including the software on the FW) would still deal with a buffer overflow with a restart command.

VPN's is just encrypted traffic flowing over a public network (like the internet) discernible to just the two points. Now the data can be intercepted over the public network but it won't be readable without the encryption keys. Breaking encryption is usually just time consuming, not impossible, not hard.

Given super computers of today with grid computing capabilities even the time is reduced.

these things happen becoze of poor browsing habits of techies....their personal systems gets infects with a trogen / virus..they bring the same systems and plug into office networks or use thumb drives to transfer data between personnal & official systems..once the official system are infected their IP address stolen it becomes easy to hack then...
 
Stick to topic, don't drag Pakistan in.

Pakistan will support its chief ally in times of war and other calamities as Pakistan previously has even at a loss of lives. Now stick to topic.
 
Do you know why on the earth Chinese do these? We compare hackers with coward thieves. When a thief steal something whom do you blame? :lol::lol:


Its a crime.

Lol, so you can keep calling them thieves while they steal all your sensitive and high valued info:lol:
 
these things happen becoze of poor browsing habits of techies....their personal systems gets infects with a trogen / virus..they bring the same systems and plug into office networks or use thumb drives to transfer data between personnal & official systems..once the official system are infected their IP address stolen it becomes easy to hack then...
You can't pin it to just one thing. I would imagine governmental level cyber espionage is often mixed with regular spy work.

Dunno where I read one of the theories how Google got hacked could be because somebody found a Google logo USB drive in Google parking lot (it was planted there). It had an autorun program that installed some rootkit onto the person's PC which gave access to someone sitting on the outside. From there it was game on.

In Pakistan a common problem for girls is that while they are using public internet facilities (internet cafes, college facilities), they often run the risk of having all their keystrokes recorded by a keylogger. After they leave, the person who installed it, simply comes back retrieves the log and can see what she typed after lets say http://www.hotmail.com. One of the first things would be the password.
 
If Pakistan can stand on its feet w/o any US help..then the answer is YES !!!
But the reality is otherwise...So stop accepting US aid and ask US to mind buissness elsewhere..ask them to get off Drone attacks..Do u have GUTS ? or will u wilt under a mere phone call from a president !!

Indian living in his dream world, we stood on our own feet in the 90's and countless other times. You do not think we have a back up plan that we can utilize.

As for the US aid, we have only got £7.5 billion so far and spent £35 billion on a war that does not concern us and we were dragged into it through funding of terrorist elements from other third parties (you know em).

Listen, if our people pay our taxes we can become self sustaining (only 15%), our gold reserves, our ports, our industries and burgeoning educated class speaks for itself.

We have the guts when we fought the USSR who also bombed us but we won, we also have achieved the only victory against a militant group in WOT by gaining their territory.

Also those drone attacks are in non sovereign territory over which Pak government does not have control but we will take it as we took the other agencies.

Perhaps you should grow a pair and fight the maoists who are sitting in the middle of your country.

As for wilting under pressure, isn't that what your country does for e.g. do not deal with Iran, Yes Sir is the response, give some money to Afghan, Yes Sir is the response.

Read these and learn about real guts.

US-Pakistan bickering gets ugly as ISI fingers American diplomats - US - World - The Times of India

June 1989: Pakistan Disappointed at End of US Aid over Nuclear Weapons Program
Pakistan is disappointed when Prime Minister Benazir Bhutto is told during a visit to Washington that the US will cut off foreign aid to her nation, because of its nuclear weapons program (see June 1989). This new US policy comes about shortly after the withdrawal of the Soviet military from neighboring Afghanistan (see February 15, 1989). A US official will later say: “The Paks understood us better than we understood ourselves… They knew that once the Soviets were whipped in Afghanistan we wouldn’t need them anymore. Would we unilaterally defend Pakistan? Never. Our relationship with Pakistan was to counter the Soviet-Indian relationship. The Pakistanis knew that time was limited. And that’s why they went balls out on the nuclear program.” [NEW YORKER, 3/29/1993]
Entity Tags: Benazir Bhutto, Pakistan
Timeline Tags: Complete 911 Timeline, A. Q. Khan's Nuclear Network

We know what we are and what we are capable of. But with so many adversaries we have to be really careful.

We will support China.
 
Last edited:
Do you know why on the earth Chinese do these? We compare hackers with coward thieves. When a thief steal something whom do you blame? :lol::lol:


Its a crime.
Depends what you're doing while hacking. If you're doing something for national interest then its patriotism. If you want to read your neighbors personal affairs then thats another thing.

However I'm against people who deface websites. We always condemn Pakistani hackers who regularly deface Indian government sites (and vice versa) , because that only affects the poor Web administration chap and he ends up looking like an idiot in front of the boss. No benefit for Pakistan other than some laughs.
 

Latest posts

Back
Top Bottom