Formulas & Data:
- Electronics
- Mathematics
- Physics
- RF & Microwaves

Parts Vendors:
- all hand-selected

- Amateur Radio
- Vintage Articles:
- Electronics World
- Popular Electronics
- QST
- Radio & TV News
- Radio Craft
- Short Wave Craft
- Wireless World

- Events Calendar
RF Cafe Homepage
Copyright 1999-2015   •−•  ••−•    −•−•  •−  ••−•  •   "RF Cafe" in Morse Code  >> Listen to It <<
- EW & Radar Handbook
- Quizzes       - Software
- App Notes
- Calculators
- Advertise on RF Cafe
- About RF Cafe™
- RF Cafe Shirts & Mugs
- RF Cafe Archives
RF Cafe Book Contest
- RF Cafe on Visit RF Cafe on Facebook Visit RF Cafe on Twitter Visit RF Cafe on LinkedIn
- Tech Humor
- Forums Archive
- Job Board
- Donate to RF Cafe
- Kirt's Cogitations
Custom Search
More than 10,000 searchable pages indexed.
Greetings: There is so much good stuff on RF Cafe that there is no way to list or link to all of it here. Please use the Search box or the Site Map to find what you want - there is a good chance I have it here. Thanks!

The Good Trojan
Kirt's Cogitations™ #72

These original Kirt's Cogitations™ may be reproduced (no more than 5, please) provided proper credit is given to me, Kirt Blattenberger.

Please click here to return to the Table of Contents.

   Cog·i·ta·tion [koj-i-tey'-shun] – noun: Concerted thought or
                                        reflection; meditation; contemplation.
   Kirt [kert] – proper noun: RF Cafe webmaster.


< Previous                      Next >


The Good Trojan

A security battle is ensuing between operating system proponents for Windows, Linux, Mac and others. Open Source code like Linux is coming under attack for being too vulnerable to subversive hackers that can slip in latent code for malicious exploitation at a later date. Like with any other panel of "experts," nobody agrees on who is right, but all agree that these systems being integrated into combat systems must be absolutely secure. Lest you be tempted to think nothing serious could ever happen, consider the famous "Farewell Dossier" report. During the 70s and 80s, Soviet spies were on a rampage stealing secrets from the U.S. and other Western countries. In 1982, the CIA slipped some Trojan horse code, known as "Line X," into some software known to be targeted by the spies. "Farewell" was the Soviet engineer assigned to analyze the stolen code. Line X operatives deployed the buggy software on a Siberian gas pipeline project. To make a long story short, the hidden code eventually caused a 3-kiloton blast still considered to be the most ferocious non-nuclear explosion and fire ever seen from space. QED.

Your RF Cafe
Progenitor & Webmaster

Click here to read about RF CafeKirt Blattenberger… single-handedly redefining what an engineering website should be.

View the YouTube RF Cafe Intro Video Carpe Diem!
(Seize the Day!)

5th MOB: My USAF radar shop

Airplanes and Rockets: My personal hobby website

Equine Kingdom: My daughter Sally's horse riding website