Search RFC: |                                     
Please support my efforts by advertising!
About | Sitemap | Homepage Archive
Serving a Pleasant Blend of Yesterday, Today, and Tomorrow™
Vintage Magazines
Electronics World
Popular Electronics
Radio & TV News
QST | Pop Science
Popular Mechanics
Radio-Craft
Radio-Electronics
Short Wave Craft
Electronics | OFA
Saturday Eve Post
Please Support My Advertisers!

Aegis Power | Centric RF | RFCT
Alliance Test | Empower RF
Isotec | Reactel | SF Circuits

Formulas & Data

Electronics | RF
Mathematics
Mechanics | Physics


Calvin & Phineas

Resources

Articles, Forums, Radar
Magazines, Museum
Radio Service Data
Software, Videos


Artificial Intelligence

Entertainment

Crosswords, Humor Cogitations, Podcast
Quotes, Quizzes

Parts & Services

1000s of Listings

        Software:

Please DONATE

RF Cascade Workbook | RF Symbols for Office
RF Symbols for Visio | RF Stencils for Visio
Espresso Engineering WorkbookCafe Press
Espresso Engineering Workbook

The Good Trojan
Kirt's Cogitations™ #72

RF Cafe University"Factoids," "Kirt's Cogitations," and "Tech Topics Smorgasbord" are all manifestations of my ranting on various subjects relevant (usually) to the overall RF Cafe theme. All may be accessed on these pages:

 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | 33 | 34 | 35 | 36 | 37

< Previous                      Next >

 

The Good Trojan

A security battle is ensuing between operating system proponents for Windows, Linux, Mac and others. Open Source code like Linux is coming under attack for being too vulnerable to subversive hackers that can slip in latent code for malicious exploitation at a later date. Like with any other panel of "experts," nobody agrees on who is right, but all agree that these systems being integrated into combat systems must be absolutely secure. Lest you be tempted to think nothing serious could ever happen, consider the famous "Farewell Dossier" report. During the 70s and 80s, Soviet spies were on a rampage stealing secrets from the U.S. and other Western countries. In 1982, the CIA slipped some Trojan horse code, known as "Line X," into some software known to be targeted by the spies. "Farewell" was the Soviet engineer assigned to analyze the stolen code. Line X operatives deployed the buggy software on a Siberian gas pipeline project. To make a long story short, the hidden code eventually caused a 3-kiloton blast still considered to be the most ferocious non-nuclear explosion and fire ever seen from space. QED.

Espresso Engineering Workbook