Miyamori
Lt. Commander
- Registriert
- Sep. 2012
- Beiträge
- 1.195
Die "Commission on the Theft of American Intellectual Property" hat einen Bericht herausgebracht.
tl;dr:
Lasst uns BKA-Trojaner Style Malware installieren und den Rechner Geisel nehmen bis sich der Betroffene selbst bei der Polizei meldet.
Quelle
tl;dr:
Lasst uns BKA-Trojaner Style Malware installieren und den Rechner Geisel nehmen bis sich der Betroffene selbst bei der Polizei meldet.
Additionally, software can be written that will allow only authorized users to open files containing valuable information. If an unauthorized person accesses the information, a range of actions might then occur. For example, the file could be rendered inaccessible and the unauthorized user’s computer could be locked down, with instructions on how to contact law enforcement to get the password needed to unlock the account.
Additional measures go further, including photographing the hacker using his own system’s camera, implanting malware in the hacker’s network, or even physically disabling or destroying the hacker’s own computer or network.
Quelle