• 0 Posts
  • 79 Comments
Joined 2 years ago
cake
Cake day: July 21st, 2023

help-circle





  • The standard (automated) attacker manipulates the ‘inside’ device first (for example, it executes a JavaScript) and makes it perform an attack on the WiFi router, to which the device is connected.

    If the inside device is a windows pc and the WiFi router has it’s inside port open for administrative actions, this is an easy game. Millions of WiFi routers have been turned into bots this way.

    In your case the WiFi router is windows. This is different from the usual plastic router, but still not really a safe situation.












  • A user types at a terminal (a physical teletype). This terminal is connected through a pair of wires to a UART (Universal Asynchronous Receiver and Transmitter) on the computer.

    Once I had the opportunity to sit at such a machine.

    A real typewriter with real paper. And no display! Only paper.

    I type my “command line” and it appears on my paper. Ok, where else…

    The computer responds by letting it’s response appear - what do you think? - on my paper, too. Not by magic, but by my machine typing it.

    I am typing to my paper. Then the computer is typing to my paper. And so on.

    Hardly ever have I had such a creepy feeling while doing computer work 😵‍💫