On Thu, 24 May 2018 14:20:52 -0700 (PDT),
film...@gmail.com wrote:
>Why would you use a post of NM to validate any of your suspicions when you
>spend so much time here pointing out his intellectual shortcomings?
>
Lets be fair here. NM and I disagree mostly on things economic and the
degree to which Luck plays an important role in success. Many times I don't
think nm reads with much comprehension and doesn't seem to check his posts
before he posts them. However, if you have been reading the Google Groups
thread it is glaringly apparent that lack of reading comprehension runs
rampant here.
Here is what nm posted that I was referring to. We weren't arguing opinions
or interpretation of facts - nm posted a link which I read. Here is the link
nm posted.
<
https://arstechnica.com/information-technology/2018/05/hackers-infect-500000-consumer-routers-all-over-the-world-with-malware/>
Hackers are now starting to hack the IoT (Internet of things). Here is a
link to a Wiki <
https://en.wikipedia.org/wiki/Internet_of_things>.
>Maybe I'm just dumb? I am unaware of what "Root" means?
>
Not dumb, just uneducated in networks and networked systems...
And, here I suspect nm could explain it better than I can, however, here
goes it.
From Unix, and Unix like systems -- Root is the highest authority or
privilege given to a user working with an operating system or other control
program. A person with root level access is called an "administrator," "root
user" or "superuser."
Anyone who has Root privileges is a GOD of the system. When you log into
your Windows PC's operating system, as the owner, you probably log in as an
Administrator. You are God, you can do anything - including killing the
system very easily by futzing up the Registry among other ways. Whereas
logging on as "Guest" one is very limited - Windows has tried to make System
Administration easy for us.
Now consider a company network with 1500 terminals, or more. The Accounting
Dept has their files and programs as does the Personnel Dept., Shipping and
Receiving, etc. A shipping clerk is not allowed to poke around in the
Personnel Dept's files because his privileges are limited to areas that he
needs to do his job.
Just for shits and grins suppose we had sold the company a very
sophisticated CNC system.
(Computer numerical control (CNC) is the automation of machine tools by
means of computers executing pre-programmed sequences of machine controls.)
We would need access to our control software for diagnostics and
troubleshooting. However, we would not need access to a control code files
that milled out some very complicated pieces. The company writes and tests
that code. That code could represent thousands of dollars of coding time and
if a competitor obtained it for free???
The CNC crashes and generates an error file and writes it to disk - we need
access to those files, but we don't have the permission to do so. We
requested access...
What we needed was access to those files and just those files. What we were
given was ROOT privileges. Why? Perhaps because we were trusted, but more
likely the IT dept was lazy and poorly trained.
We could go anywhere in the system, read everyone's emails, check out your
personnel records, and - poke around in the Contracting Dept files - and
probably never lose another bid unless we wanted to.
And the very people hired to guard the system gave us access to the whole
system - we were Root, we were God. One can not compromise a system more
than that.
--
Jerry O.