| Author |
Thread Statistics | Show CCP posts - 0 post(s) |

evistin
Multiverse Corporation
|
Posted - 2006.10.18 14:39:00 -
[1]
I have heard stories from people about the usally logoffski, lag jamming, node crashing tactics, but recently I have heard a darker side, those technically we are not allowed to do.
TS/Vent SeverHacking Website Hacking/Attacks Denial of Serivce attacks Stealing of passwords to read other peoples mail, etc etc.
I was wondering have you guys heard of such stories and how far have you guys taken your seucrity measures to defend yourself?
-----------
Management and Leadership û The Eve-online Guide |

evistin
Multiverse Corporation
|
Posted - 2006.10.19 23:29:00 -
[2]
Guys do not say Alliance X did Attack Y to Alliance Z. It will turn into personal attacks sooner or later.
Also while some alliances are a little more famous than others of doing such tactics. They may have being the independent action of the player and the leaders are not able to do anything, because the person does not own up or they themsevles are unable to track it.
This will go on with and without the apporoval and knowledge of the respective leadership. No one alliance is 100% clean, in this respect. Right or wrong it will happen, you must defend yourself against such things thats all. -----------
Management and Leadership û The Eve-online Guide |

evistin
Multiverse Corporation
|
Posted - 2006.10.20 07:42:00 -
[3]
Originally by: Vladimir Yuchenko
Of course if one were truly brilliant and could simulate atleast basic functions of Eve a man in the middle attack could be truly brutal. Now this requires a good deal of planning, timing, and programming skill, but would likely be able to fool an opponent for long enough so that they would incur great losses if say this were done in the middle of a fleet battle. But now that is getting into the realm of "fantasy" hacking where the time preperation and context become so dependent that is becomes impractical to plan for.
This is somewhat too easy, IRC client, a packet sniffer and a few packets of the command to transfer ISK to target player. The whole program would be well under 500k. U torrent is an example of a small program without lots of abilities.
I am currently studying Network security and its scary at the easy of attack. An IRC client with dos prompt access = DDOS system.
I would be very defensive if I claim that any alliance conducted such activities. Its like saying person X is dealing violated someone when he did not. -----------
Management and Leadership û The Eve-online Guide |

evistin
Multiverse Corporation
|
Posted - 2006.10.21 00:24:00 -
[4]
If you guys really hate BOB for their spies, go read the "Art of War" by Sun Tzu. Now come back and tell me you don't intend to use them yourselves now.
We all agree that these attacks happen, and must be defended against.
-----------
Management and Leadership û The Eve-online Guide |

evistin
Multiverse Corporation
|
Posted - 2006.10.23 05:29:00 -
[5]
Half-Life 2 was a hacker who wanted to prove how much value was lying about a production ready code. But yes it does prove the lenghts people go to prove it. -----------
Management and Leadership û The Eve-online Guide |
| |
|