• 0 Posts
  • 273 Comments
Joined 1 year ago
cake
Cake day: April 13th, 2024

help-circle







  • I’d start with the following, and refine if necessary:

    “Gaining unauthorized access to a protected computer resource by technical means.”

    • Port scanning --> Not hacking because there isn’t any access to resources gained*
    • Using default passwords that weren’t changed --> Not hacking because the resource wasn’t protected*
    • Sending spam --> Not hacking because there isn’t any access to resources gained
    • Beating the admin with a wrench until he tells you the key --> Not hacking because it’s not by technical means.
    • Accessing teacher SSN’s published on the state website in the HTML --> Not hacking because the resource wasn’t protected, and on the contrary was actively published**
    • Distributed denial of service attack --> Not hacking because there isn’t any access to resources gained

    * Those first two actually happened in 2001 here in Switzerland when the WEF visitors list was on a database server with default password, they had to let a guy (David S.) go free
    ** The governor and his idiot troupe eventually stopped their grandstanding and didn’t file charges against Josh Renaud of the St. Louis Post-Dispatch reporter, luckily












  • In my experience that’s usually the case for XG-PON and XGS-PON networks. Because you’re sharing one port on the OLT with up to 63 neighbours. Though I think most build outs aim for 16 or 32 splits.

    Anyway they don’t want to risk you sending when it’s not your turn or disturbing your neighbours connection in any other way, they make you use their ONU. Basically the same old story like with the coax cable modems. Just because some idiot (or rather industry group of idiots) had to go and turn fiber back into a shared medium to save on cable and ports a bit.