what i’m sure is that nothing is impossible with computers,
all people that were so sure of their network security, how many were fooled by some exploit, facing for real that u will always meet one day someone that knows way more than u about computers,network and coding, and their big ego of network security experts get hurt so they came back to earth and stopped thinkin they knew all and were so strong that no one would be able to break into their high securised local aeras.
when u shutdown, what can really happens in fact when the machine terminated all your apps and the GUI but you’re still waiting for the OS to shutdown, sometimes it can be long on some systems, what is possible during the time the system seems to wait for something then shutdown after a time that seems so long…
i don’t know what is possible but everyday u read new articles about some new exploit often minimized, but the reality must be way different.
some exemple : MS released in nov 2008 some patch to fix some attack known as SMBRelay.
the first time we heard about it was in 1996 by Dominique Brezinski that published “A Weakness in CIFS Authentication”, as i’m not a pro of network security, u’ll find more infos with google, but it’s about the “man-in-the-middle” exploit so the first time someone wrote something about that was in 1996 and MS finally fixed the problem (finally, who can tell it’s finally in fact, no one, it’s some fix but it doesnt fully fix any possibility) in 2008 !!!
so, when u read that kind of article, is some attack corrupting the system in the shutdown sequency is trully impossible ? how many bugs are not fixed or partially or unknown and used for years ?
now i will not ever bet on anything about security and computers, the situation is so complicated, and i know a so small part about computers but when u surf on high level people blogs in security and not just bla-bla-bla, they don’t speak in the wind, they got sources linked, u can check all sources, they know what’s ■■■■ info and what’s real and incredible like this 12 years known exploit, a record !,
so, if there’s a possibility to use any failure, it will be done for sure if not allready.
was thinkin about wep with wifi, go to some place where there are lot of people linving and check networks, see how many networks using wep encryption, the half often … know how long it takes with some kind of special linux based live cd to get the wep key ?
as they’re talkin about WPA cracked that is ■■■■■■■■, but they argue about the fact tkip used (what is certainly true as it’s wep encryption based) instead of aes encryption is a way to break into wpa,
but they use some failure and are not able to break wpa cause the only way is brute force so they said nvidia gpus were able to calculate so faster than cpu that the time to use brute force was reduced by 10 (i don’t know if it’s 10 or 100 or 10 000 but way faster) but they didnt say they tried on a 5 characters key as u can put 63 characters for your key,
anyway as it’s exponential, if they needed less than 1 hour to find a 5 longer key, a 6 one would be 13 hours, then 7 would need maybe one week or more and 8 1 year (i don’t know really) but so u got infos that are totally ■■■■ and real ones that are a real failure so how to not lose yourself into all that and what is something impossible and what not ?
if u know, u can help me, will be appreciated.