<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://swiki.fancruft.com/index.php?action=history&amp;feed=atom&amp;title=Cyberwarfare</id>
	<title>Cyberwarfare - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://swiki.fancruft.com/index.php?action=history&amp;feed=atom&amp;title=Cyberwarfare"/>
	<link rel="alternate" type="text/html" href="https://swiki.fancruft.com/index.php?title=Cyberwarfare&amp;action=history"/>
	<updated>2026-04-12T21:47:16Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.42.1</generator>
	<entry>
		<id>https://swiki.fancruft.com/index.php?title=Cyberwarfare&amp;diff=5111&amp;oldid=prev</id>
		<title>MJ12 Commando at 00:04, 23 July 2009</title>
		<link rel="alternate" type="text/html" href="https://swiki.fancruft.com/index.php?title=Cyberwarfare&amp;diff=5111&amp;oldid=prev"/>
		<updated>2009-07-23T00:04:30Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 17:04, 22 July 2009&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l16&quot;&gt;Line 16:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 16:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Weapons hacking: This is almost as bad. Sure the smartgun generally has wireless access to allow someone to use it, but that&amp;#039;s generally-and even then, the worst you can do is shut down the sights and force someone to use ironsights. One wielded by anyone wearing a mob suit or with the proper implants will have a skinlink and generally not have wireless transmission-which means that 99.9% of the smartguns you see will be unhackable. Worse yet? The links are generally low power, so if you want to hack someone&amp;#039;s gun, you&amp;#039;ll need to be next to them. This is generally not a good position to be in, when the other guy has a loaded gun.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Weapons hacking: This is almost as bad. Sure the smartgun generally has wireless access to allow someone to use it, but that&amp;#039;s generally-and even then, the worst you can do is shut down the sights and force someone to use ironsights. One wielded by anyone wearing a mob suit or with the proper implants will have a skinlink and generally not have wireless transmission-which means that 99.9% of the smartguns you see will be unhackable. Worse yet? The links are generally low power, so if you want to hack someone&amp;#039;s gun, you&amp;#039;ll need to be next to them. This is generally not a good position to be in, when the other guy has a loaded gun.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;AI: There is bad, and then there&#039;s stupid. Nonsentient AI is generally pretty well defended just by dint of having a good firewall, failsafes, and a lot of processing power backing it. Sentient AI writes its own security as if its life depended on it-which, of course, it does, and that security is very, very tight. In either case it&#039;s not a good idea.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;AI: There is bad, and then there&#039;s stupid. Nonsentient AI is generally pretty well defended just by dint of having a good firewall, failsafes, and a lot of processing power backing it. Sentient AI &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;generally &lt;/ins&gt;writes its own security as if its life depended on it-which, of course, it does, and that security is very, very tight&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;. If it doesn&#039;t, it&#039;ll almost certainly have bought the top of the line stuff, and probably a few other layers of network security just to be sure&lt;/ins&gt;. In either case it&#039;s not a good idea.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;...&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;...&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>MJ12 Commando</name></author>
	</entry>
	<entry>
		<id>https://swiki.fancruft.com/index.php?title=Cyberwarfare&amp;diff=5095&amp;oldid=prev</id>
		<title>MJ12 Commando at 20:54, 22 July 2009</title>
		<link rel="alternate" type="text/html" href="https://swiki.fancruft.com/index.php?title=Cyberwarfare&amp;diff=5095&amp;oldid=prev"/>
		<updated>2009-07-22T20:54:11Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 13:54, 22 July 2009&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l14&quot;&gt;Line 14:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 14:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Brainhacking: Yeah, it shows up in media, but in reality a cyborg is just about the worst target to hack. The cyborg is generally not networked, requires direct contact, and if you&amp;#039;re in direct contact with a cyborg you&amp;#039;re trying to hack something that&amp;#039;s almost certainly completely aware of your connection attempt and capable of ripping your face off. Even if you manage a connection, cyborgs don&amp;#039;t generally have killswitches. That&amp;#039;s fictional. You can screw around with his medical records and maybe some non-important programming but that&amp;#039;s it. Maybe if the &amp;#039;borg has active killswitches (generally always removed after rehabilitation therapy) you can shut him or her down, but that&amp;#039;s it-and the killswitch activation always sends a &amp;quot;phone-home&amp;quot; signal. This stuff&amp;#039;s Read-only, you can&amp;#039;t do much about it.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Brainhacking: Yeah, it shows up in media, but in reality a cyborg is just about the worst target to hack. The cyborg is generally not networked, requires direct contact, and if you&amp;#039;re in direct contact with a cyborg you&amp;#039;re trying to hack something that&amp;#039;s almost certainly completely aware of your connection attempt and capable of ripping your face off. Even if you manage a connection, cyborgs don&amp;#039;t generally have killswitches. That&amp;#039;s fictional. You can screw around with his medical records and maybe some non-important programming but that&amp;#039;s it. Maybe if the &amp;#039;borg has active killswitches (generally always removed after rehabilitation therapy) you can shut him or her down, but that&amp;#039;s it-and the killswitch activation always sends a &amp;quot;phone-home&amp;quot; signal. This stuff&amp;#039;s Read-only, you can&amp;#039;t do much about it.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Weapons hacking: This is almost as bad. Sure the smartgun generally has wireless access to allow someone to use it, but that&#039;s generally-and even then, the worst you can do is shut down the sights and force someone to use ironsights. One wielded by anyone wearing a mob suit or with the proper implants will have a skinlink and generally not have wireless transmission-which means that 99.9% of the smartguns you see will be unhackable.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Weapons hacking: This is almost as bad. Sure the smartgun generally has wireless access to allow someone to use it, but that&#039;s generally-and even then, the worst you can do is shut down the sights and force someone to use ironsights. One wielded by anyone wearing a mob suit or with the proper implants will have a skinlink and generally not have wireless transmission-which means that 99.9% of the smartguns you see will be unhackable&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;. Worse yet? The links are generally low power, so if you want to hack someone&#039;s gun, you&#039;ll need to be next to them. This is generally not a good position to be in, when the other guy has a loaded gun&lt;/ins&gt;.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;AI: There is bad, and then there&#039;s stupid. Nonsentient AI is generally pretty well defended just by dint of having a good firewall, failsafes, and a lot of processing power backing it. Sentient AI writes its own security as if its life depended on it, and that security is very, very tight.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;AI: There is bad, and then there&#039;s stupid. Nonsentient AI is generally pretty well defended just by dint of having a good firewall, failsafes, and a lot of processing power backing it. Sentient AI writes its own security as if its life depended on it&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;-which, of course, it does&lt;/ins&gt;, and that security is very, very tight&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;. In either case it&#039;s not a good idea&lt;/ins&gt;.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;...&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;...&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>MJ12 Commando</name></author>
	</entry>
	<entry>
		<id>https://swiki.fancruft.com/index.php?title=Cyberwarfare&amp;diff=5094&amp;oldid=prev</id>
		<title>MJ12 Commando: Created page with &#039;Life Feed: PACT/MilNet/USMC/MCCYWAR/RobertGuCyberwarfareSchool/Induction&lt;br&gt; Speaker: Maj. Kenneth Zaman&lt;br&gt;  =The Fiction=  You&#039;ve seen the representations in the shows of an ex…&#039;</title>
		<link rel="alternate" type="text/html" href="https://swiki.fancruft.com/index.php?title=Cyberwarfare&amp;diff=5094&amp;oldid=prev"/>
		<updated>2009-07-22T20:49:19Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;#039;Life Feed: PACT/MilNet/USMC/MCCYWAR/RobertGuCyberwarfareSchool/Induction&amp;lt;br&amp;gt; Speaker: Maj. Kenneth Zaman&amp;lt;br&amp;gt;  =The Fiction=  You&amp;#039;ve seen the representations in the shows of an ex…&amp;#039;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;Life Feed: PACT/MilNet/USMC/MCCYWAR/RobertGuCyberwarfareSchool/Induction&amp;lt;br&amp;gt;&lt;br /&gt;
Speaker: Maj. Kenneth Zaman&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=The Fiction=&lt;br /&gt;
&lt;br /&gt;
You&amp;#039;ve seen the representations in the shows of an expert runner hacking smartguns in real time, taking over AI vehicles, and other feats. You&amp;#039;ve heard of the gun ads by Winchester and Kalashnikov that exhort you to buy a completely mechanical weapon for home defense, to ensure that it doesn&amp;#039;t crash or get hacked. You&amp;#039;ve gotten ad after ad to update your network firewall against hacking, as well as your guns, your home environmental system, and anything that could be vaguely dangerous.&lt;br /&gt;
&lt;br /&gt;
That&amp;#039;s the media representation of computer hacking nowadays-some sort of pervasive, all-powerful force capable of turning men into gods. Like most things in the media it&amp;#039;s done that way because the reality is boring, down to earth, and not dramatic at all. You see...&lt;br /&gt;
&lt;br /&gt;
=The Reality=&lt;br /&gt;
&lt;br /&gt;
The reality of the matter is, 95% of all hacking requires social engineering and that its effects were incredibly minor. It&amp;#039;s a specialist tool that does very little. Let&amp;#039;s examine the myths:&lt;br /&gt;
&lt;br /&gt;
Brainhacking: Yeah, it shows up in media, but in reality a cyborg is just about the worst target to hack. The cyborg is generally not networked, requires direct contact, and if you&amp;#039;re in direct contact with a cyborg you&amp;#039;re trying to hack something that&amp;#039;s almost certainly completely aware of your connection attempt and capable of ripping your face off. Even if you manage a connection, cyborgs don&amp;#039;t generally have killswitches. That&amp;#039;s fictional. You can screw around with his medical records and maybe some non-important programming but that&amp;#039;s it. Maybe if the &amp;#039;borg has active killswitches (generally always removed after rehabilitation therapy) you can shut him or her down, but that&amp;#039;s it-and the killswitch activation always sends a &amp;quot;phone-home&amp;quot; signal. This stuff&amp;#039;s Read-only, you can&amp;#039;t do much about it.&lt;br /&gt;
&lt;br /&gt;
Weapons hacking: This is almost as bad. Sure the smartgun generally has wireless access to allow someone to use it, but that&amp;#039;s generally-and even then, the worst you can do is shut down the sights and force someone to use ironsights. One wielded by anyone wearing a mob suit or with the proper implants will have a skinlink and generally not have wireless transmission-which means that 99.9% of the smartguns you see will be unhackable.&lt;br /&gt;
&lt;br /&gt;
AI: There is bad, and then there&amp;#039;s stupid. Nonsentient AI is generally pretty well defended just by dint of having a good firewall, failsafes, and a lot of processing power backing it. Sentient AI writes its own security as if its life depended on it, and that security is very, very tight.&lt;br /&gt;
&lt;br /&gt;
...&lt;br /&gt;
&lt;br /&gt;
So let&amp;#039;s examine what it can do and how it&amp;#039;s done. Unlike the &amp;quot;randomly hit keys on a virtual keyboard&amp;quot; representation, or the &amp;quot;go into VR and laser defensive programs&amp;quot; representation, 95% of hacking is spy fieldwork. You give someone a load of BS that they end up believing, and they give you a password. Proper training and competent procedure virtually eliminate this line of hacking, but it is still an infinitely useful tool. You know how to schmooze people, you&amp;#039;ve probably used it dozens of times to get into the pants of someone you like. And that&amp;#039;s not what we&amp;#039;re covering in the next 15 weeks.&lt;br /&gt;
&lt;br /&gt;
What we&amp;#039;re going to cover in the next 15 weeks is the remaining 5%. Exploiting bugs and code wonkiness. We&amp;#039;re going to learn how to find the exploits in a system, use them to get in, and then do as much real damage as you can at that point. We&amp;#039;re going to teach you how to break a password, how to exploit biometric security, and the reality of this business.&lt;br /&gt;
&lt;br /&gt;
My job is to teach you all of this in 15 weeks when it takes years for a civilian hacker to get proficient. Your job is much simpler-just shut up and learn.&lt;/div&gt;</summary>
		<author><name>MJ12 Commando</name></author>
	</entry>
</feed>