Editing 1808: Hacking

Jump to: navigation, search

Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.
Latest revision Your text
Line 18: Line 18:
  
 
The title text lists three other undramatic (fictitious) hacking exploits which sound more interesting, but are still more or less useless, and certainly not dramatic news. They are:
 
The title text lists three other undramatic (fictitious) hacking exploits which sound more interesting, but are still more or less useless, and certainly not dramatic news. They are:
βˆ’
#Millions of {{w|prime factors}}: The security of the {{w|RSA (cryptosystem)|RSA cipher}} relies on the difficulty of finding prime factors for a large number. But just having those numbers without any other context means you only have millions of {{w|Prime number|prime numbers}}. This is as useless as having a list of millions of passwords without any further information.  
+
#Millions of {{w|prime factors}}: The security of the {{w|RSA (cryptosystem)|RSA cipher}} relies on the difficulty of finding prime factors for a large number. But just having those numbers without any other context means you only have millions of {{w|Prime number|prime numbers}}. This is useless like having a list of millions of passwords without any further information.  
 
#A {{w|0-day exploit}} for {{w|Tamagotchi}}: A 0-day exploit is an exploit of which the manufacturer is not (yet) aware. 0-days are very valuable to hackers since defenses against them have not yet been developed. However, an exploit for a Tamagotchi is likely useless because they are very low-end entertainment devices that do not contain microphones or cameras, and usually don't have access to any networks. This may also be a play on words, as Tamagotchi are notoriously difficult to keep alive for more than zero days.
 
#A {{w|0-day exploit}} for {{w|Tamagotchi}}: A 0-day exploit is an exploit of which the manufacturer is not (yet) aware. 0-days are very valuable to hackers since defenses against them have not yet been developed. However, an exploit for a Tamagotchi is likely useless because they are very low-end entertainment devices that do not contain microphones or cameras, and usually don't have access to any networks. This may also be a play on words, as Tamagotchi are notoriously difficult to keep alive for more than zero days.
 
#A way to get {{w|GNU_Compiler_Collection|gcc}} and {{w|Bash_(Unix_shell)|bash}} to execute arbitrary code: ''Unintentional'' execution of arbitrary code is serious vulnerability that allows attackers to do whatever they choose on a victim's computer. However the examples given here merely describe the ''intended'' purpose of the tools: gcc is a {{w|compiler}}, so preparing arbitrary code is its main purpose, and bash is a {{w|Shell script|Unix shell}}, so executing arbitrary code is also one of its primary functions.
 
#A way to get {{w|GNU_Compiler_Collection|gcc}} and {{w|Bash_(Unix_shell)|bash}} to execute arbitrary code: ''Unintentional'' execution of arbitrary code is serious vulnerability that allows attackers to do whatever they choose on a victim's computer. However the examples given here merely describe the ''intended'' purpose of the tools: gcc is a {{w|compiler}}, so preparing arbitrary code is its main purpose, and bash is a {{w|Shell script|Unix shell}}, so executing arbitrary code is also one of its primary functions.

Please note that all contributions to explain xkcd may be edited, altered, or removed by other contributors. If you do not want your writing to be edited mercilessly, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource (see explain xkcd:Copyrights for details). Do not submit copyrighted work without permission!

To protect the wiki against automated edit spam, we kindly ask you to solve the following CAPTCHA:

Cancel | Editing help (opens in new window)