Geschrieben 11. August 2010 - 14:56
Geschrieben 11. August 2010 - 15:08
Geschrieben 11. August 2010 - 19:52
Hackers have three options when faced with a slaved node. First, they can hack in directly to the slave with an additional threshold modifier of +2, though this requires a physical (wired) connection to the device. Second, they can hack the master node (thus gaining access to the slaved nodeand any other slavesas well), though this node is usually more secure. Third, they can spoof the access ID of the master node and then spoof commands to the slave.
Besucher die dieses Thema lesen: 0
Mitglieder: 0, Gäste: 0, unsichtbare Mitglieder: 0