Quote:
Originally Posted by CSB
The malware was targeted toward an exact configuration.
Clever stuff. I hope it is one of ours, and a nuclear scramble in Iran would be fine with me.
|
After thinking about this for a couple minutes...
If you set aside the nuclear plausibilities,, and look at a different angle...
Suppose this was just some kid that wanted to be a hot-shot and prove his worth in the company???
You figure you can be a STAR IF you guarantee that your company receives the support contract for the project..
After you received said the contract and because of "problems" you discovered in the initial design,, you suggest a need for a re-design the product??
Of course this would be a very expensive re-write, but you COULD guarantee customer satisfaction,,
Because you have the fix in your pocket,, you designed it that way??
This could be a geek to geek thing..
Purpose built back-door coding is not new... A lot of 60t'ys & 70t's systems were built with hard wire back-doors that allowed designers access to de-bug and fix hex level coding.
One I remember well was the FF0F check point re-start for the S360 model 65 system. The dam thing locked up 2-3 times a night when running engineering designs. System looked like it was running fine but was actually in a redundant binary loop.
Early PC's had a set of jumper pins on the mobo that allowed a configuration reset..
Until someone can find the target, you will not know the intended results..
So The hunt is on Doctor..
Quote:
Inspector Lestrade: In another life, Mr. Holmes, you would have made a excellent criminal.
Sherlock Holmes: Yes, and you an excellent policeman.
|