"David H. Lipman" <DLipman~nospam~@Verizon.Net> wrote in message
news:mbidnV_lk8S7d5HUnZ2dnUVZ_rDinZ2d@giganews.com ...
> From: "FromTheRafters" <erratic@nomail.afraid.org>
>
>
> | Replies in this thread seem to back and forth between two of the
> hackers'
> | motivations. One where he is after the data at rest, and one where he
> goes
> | after subverting the system (and maybe gets the data after decryption).
> The
> | subject line asks about a keylogger that may have been added during the
> | time the laptop was left unattended in a hotel room - and how to detect
> it.
>
> | I assume of course a so-called "rootkit" was involved. Any hacker worthy
> | of the title would want to use stealthing techniques. So the question
> | becomes
> | how can I tell if my computer has been rootkitted?
>
> | What is interesting is the shift from outright theft of a laptop to the
> | perhaps
> | more lucrative compromise of the laptop. Steal someone's personal data
> | and open a credit card account - then buy a truckload of laptops. Modern
> | banking makes it all possible - and they charge you for "protection"
> against
> | such happenings.
>
> | ...what a racket!
>
> Since we are talking about China, we would be dealing with the PLA. The
> Chinese
> government has a "relationship" with the Chinese hacher community. The
> purpose of which
> woul be espiniage. Either industrial or military. They would NOT steal
> the notebook.
> There intent woul be a stealthy install of malware.
Yes, it would be naive to think such things don't happen.
It's funny how "paranoid" one seems once he knows such things do happen.
I could tell you stories ... but I value my freedom.)


)
Reply With Quote