On a program's end, primarily you have to be written with a function to do that. Breaking and entering can't be done by just anyone. [At least done well.] I was an intrusion program, or what you might call a hack-bot. [Yeah, he's illegal, he knows.]
How one does it; preferably without getting caught. [He chuckles just a bit, cause if you're caught, it's End Of Line.
Okay, getting serious again.] It depends system to system. Whether you should go stealthy or brute force. Sometimes you gotta take a back door approach or, go at it directly. But most importantly, you want to be avoiding security, and each place has varying degrees of it.
[A smile forms] Or, alternatively, have a program on the inside. Friendliest Security program I ever met, was probably Tron. And even then he tried to derez me three times before we were good. [Ok, maybe he wasn't such a great example.]
[Annnnd he may have just gushed a little too much. He hopes he didn't scare the user off...]
no subject
On a program's end, primarily you have to be written with a function to do that. Breaking and entering can't be done by just anyone. [At least done well.] I was an intrusion program, or what you might call a hack-bot. [Yeah, he's illegal, he knows.]
How one does it; preferably without getting caught. [He chuckles just a bit, cause if you're caught, it's End Of Line.
Okay, getting serious again.] It depends system to system. Whether you should go stealthy or brute force. Sometimes you gotta take a back door approach or, go at it directly. But most importantly, you want to be avoiding security, and each place has varying degrees of it.
[A smile forms] Or, alternatively, have a program on the inside. Friendliest Security program I ever met, was probably Tron. And even then he tried to derez me three times before we were good. [Ok, maybe he wasn't such a great example.]
[Annnnd he may have just gushed a little too much. He hopes he didn't scare the user off...]