IPB

Welcome Guest ( Log In | Register )

2 Pages V  < 1 2  
Reply to this topicStart new topic
> Questions on Drones, Autosoft and OS
kigmatzomat
post Sep 28 2005, 09:49 PM
Post #26


Moving Target
**

Group: Members
Posts: 916
Joined: 26-August 05
From: The land between the north , the south and the midwest.
Member No.: 7,626



Response and Signal are hardware, equating to CPUs and transmitters.

System and Firewall are software. System is your OS and firewall has antivirus/intrusion detection/traffic monitoring applications.
Go to the top of the page
 
+Quote Post
Rotbart van Dain...
post Sep 28 2005, 09:54 PM
Post #27


Hoppelhäschen 5000
*********

Group: Members
Posts: 5,807
Joined: 3-January 04
Member No.: 5,951



QUOTE (Wasabi)
After all, when something is subscribed the two access IDs are 'trusting' each other but the firewall makes sure the traffic between them is legit kinda like a VPN IRL.

Just Spoofing commands is approximatly a Man in the Middle Attack.

RaW, it does not need to infiltrate your PAN.
Go to the top of the page
 
+Quote Post
Vector
post Sep 29 2005, 02:08 AM
Post #28


Moving Target
**

Group: Members
Posts: 112
Joined: 26-February 02
Member No.: 1,896



QUOTE (kigmatzomat)
Response and Signal are hardware, equating to CPUs and transmitters.

System and Firewall are software. System is your OS and firewall has antivirus/intrusion detection/traffic monitoring applications.

Meaning if you have a cracked version of Firewall, there's nothing stopping you from putting it on every device you own.
Go to the top of the page
 
+Quote Post
kigmatzomat
post Sep 29 2005, 02:50 PM
Post #29


Moving Target
**

Group: Members
Posts: 916
Joined: 26-August 05
From: The land between the north , the south and the midwest.
Member No.: 7,626



Arrr, ye be speaking true, matey! Raise that pirate flag and salute the Jolly Roger!
Go to the top of the page
 
+Quote Post
counterveil
post Sep 29 2005, 06:51 PM
Post #30


Target
*

Group: Members
Posts: 85
Joined: 12-June 03
Member No.: 4,720



QUOTE (Rotbart van Dainig @ Sep 28 2005, 09:54 PM)
Just Spoofing commands is approximatly a Man in the Middle Attack.

RaW, it does not need to infiltrate your PAN.

Yuppers. Just like hitting any node responding on an open signal.

Now...maybe you could wire the drone to your body with long cables and disable the wireless portion so that physically they would have to infiltrate *your* pan to get to the hardware... :D
Go to the top of the page
 
+Quote Post
Rotbart van Dain...
post Sep 29 2005, 07:44 PM
Post #31


Hoppelhäschen 5000
*********

Group: Members
Posts: 5,807
Joined: 3-January 04
Member No.: 5,951



Given Microwire, this may be an interisting possibility, especially when using those Spider Drones to infiltrate.
Go to the top of the page
 
+Quote Post

2 Pages V  < 1 2
Reply to this topicStart new topic

 



RSS Lo-Fi Version Time is now: 14th May 2026 - 07:19 AM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.