Menu
News
All News
Dungeons & Dragons
Level Up: Advanced 5th Edition
Pathfinder
Starfinder
Warhammer
2d20 System
Year Zero Engine
Industry News
Reviews
Dragon Reflections
White Dwarf Reflections
Columns
Weekly Digests
Weekly News Digest
Freebies, Sales & Bundles
RPG Print News
RPG Crowdfunding News
Game Content
ENterplanetary DimENsions
Mythological Figures
Opinion
Worlds of Design
Peregrine's Nest
RPG Evolution
Other Columns
From the Freelancing Frontline
Monster ENcyclopedia
WotC/TSR Alumni Look Back
4 Hours w/RSD (Ryan Dancey)
The Road to 3E (Jonathan Tweet)
Greenwood's Realms (Ed Greenwood)
Drawmij's TSR (Jim Ward)
Community
Forums & Topics
Forum List
Latest Posts
Forum list
*Dungeons & Dragons
Level Up: Advanced 5th Edition
D&D Older Editions
*TTRPGs General
*Pathfinder & Starfinder
EN Publishing
*Geek Talk & Media
Search forums
Chat/Discord
Resources
Wiki
Pages
Latest activity
Media
New media
New comments
Search media
Downloads
Latest reviews
Search resources
EN Publishing
Store
EN5ider
Adventures in ZEITGEIST
Awfully Cheerful Engine
What's OLD is NEW
Judge Dredd & The Worlds Of 2000AD
War of the Burning Sky
Level Up: Advanced 5E
Events & Releases
Upcoming Events
Private Events
Featured Events
Socials!
EN Publishing
Twitter
BlueSky
Facebook
Instagram
EN World
BlueSky
YouTube
Facebook
Twitter
Twitch
Podcast
Features
Top 5 RPGs Compiled Charts 2004-Present
Adventure Game Industry Market Research Summary (RPGs) V1.0
Ryan Dancey: Acquiring TSR
Q&A With Gary Gygax
D&D Rules FAQs
TSR, WotC, & Paizo: A Comparative History
D&D Pronunciation Guide
Million Dollar TTRPG Kickstarters
Tabletop RPG Podcast Hall of Fame
Eric Noah's Unofficial D&D 3rd Edition News
D&D in the Mainstream
D&D & RPG History
About Morrus
Log in
Register
What's new
Search
Search
Search titles only
By:
Forums & Topics
Forum List
Latest Posts
Forum list
*Dungeons & Dragons
Level Up: Advanced 5th Edition
D&D Older Editions
*TTRPGs General
*Pathfinder & Starfinder
EN Publishing
*Geek Talk & Media
Search forums
Chat/Discord
Menu
Log in
Register
Install the app
Install
Community
General Tabletop Discussion
*Geek Talk & Media
[OT] Did you know....
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Reply to thread
Message
<blockquote data-quote="MarauderX" data-source="post: 896905" data-attributes="member: 9990"><p>that the National Institute of Science and Technology (NIST) was hacked last week? Do you know who really was behind it? </p><p></p><p>Two NIST employees were downloading music using a peer-to-peer service on NIST machines, while at work. They were also burning CDs of the music they downloaded. Ok, so they were bad. </p><p></p><p>The Recording Industry of America (RIA) hired computer consultants (basically hackers) to track large volumes of music downloads, find out who the individuals were, and report what they found back to the RIA. Then the RIA would send the individuals a tersely worded letter stating that if they did not cease sharing the illegal downloads they could and would press charges. </p><p></p><p>So what happened? The consultants illegally broke through the various NIST firewalls to find the two employees who had that large volume of shared files, then discovered where they worked and who they were. NIST found out that they had been hacked and fired the two employees for the abuse of their computers as well as creating a breach in security before the RIA could figure out how to handle this touchy situation. NIST has not filed charges against the hackers or the RIA, and it doesn't look like the RIA is planning to change their tactics of hiring hackers.</p><p></p><p>"Ok, dude, what's your point?"</p><p></p><p>The point is what the RIA is doing is wrong, nothing is being done about it, and watch your back as well as your firewall. They are promoting consultants to illegally infiltrate corporate and private machines to stop file sharing. The RIA is not going after the file sharing services, as these programs will probably keep multiplying and morphing into something new that is hard to keep up with. Instead they will go after a firmly established network, like, say, kazaa, and track your downloads and activities for a while before sending you a strongly worded letter. </p><p></p><p>Just thought you should know.</p></blockquote><p></p>
[QUOTE="MarauderX, post: 896905, member: 9990"] that the National Institute of Science and Technology (NIST) was hacked last week? Do you know who really was behind it? Two NIST employees were downloading music using a peer-to-peer service on NIST machines, while at work. They were also burning CDs of the music they downloaded. Ok, so they were bad. The Recording Industry of America (RIA) hired computer consultants (basically hackers) to track large volumes of music downloads, find out who the individuals were, and report what they found back to the RIA. Then the RIA would send the individuals a tersely worded letter stating that if they did not cease sharing the illegal downloads they could and would press charges. So what happened? The consultants illegally broke through the various NIST firewalls to find the two employees who had that large volume of shared files, then discovered where they worked and who they were. NIST found out that they had been hacked and fired the two employees for the abuse of their computers as well as creating a breach in security before the RIA could figure out how to handle this touchy situation. NIST has not filed charges against the hackers or the RIA, and it doesn't look like the RIA is planning to change their tactics of hiring hackers. "Ok, dude, what's your point?" The point is what the RIA is doing is wrong, nothing is being done about it, and watch your back as well as your firewall. They are promoting consultants to illegally infiltrate corporate and private machines to stop file sharing. The RIA is not going after the file sharing services, as these programs will probably keep multiplying and morphing into something new that is hard to keep up with. Instead they will go after a firmly established network, like, say, kazaa, and track your downloads and activities for a while before sending you a strongly worded letter. Just thought you should know. [/QUOTE]
Insert quotes…
Verification
Post reply
Community
General Tabletop Discussion
*Geek Talk & Media
[OT] Did you know....
Top