Data Security: It's Not Just for Secret Agents Anymore
The secret agent quietly enters the generic-looking office complex. The agent's assault team has the building surrounded and is standing by in case the operation goes bad. The mission: to find a computer containing information that will save the country from an enemy attack.
The agent moves from the warehouse area to the offices in search of the target's computer. He finds it in the last office. The machine is on, and after gaining access to the computer, the agent starts scanning through files only to find them encrypted.
The agent calls the computer expert at base. The expert "remote controls" the machine and tries some generic passwords - they do not work. The expert runs a password-cracking program, and in seconds, the files are accessible.
The bad guys are caught, the country's security is maintained and the world is saved, all in the course of an hour - excluding commercials, of course!
|
|
Full Story |
This topic does not have any threads posted yet!
You cannot post until you login.