LWN: Comments on "FC: More on terrorists using open source software to wreak havoc" https://lwn.net/Articles/1864/ This is a special feed containing comments posted to the individual LWN article titled "FC: More on terrorists using open source software to wreak havoc". en-us Mon, 20 Oct 2025 15:38:36 +0000 Mon, 20 Oct 2025 15:38:36 +0000 https://www.rssboard.org/rss-specification lwn@lwn.net FC: More on terrorists using open source software to wreak havoc https://lwn.net/Articles/1870/ https://lwn.net/Articles/1870/ gerdts The connection that I keep seeing people miss is this one: <p><a href="http://www.zdnet.com/anchordesk/stories/story/0,10738,2648128,00.html" >http://www.zdnet.com/anchordesk/stories/story/0,10738,2648128,00.html</a> <blockquote> Here's the way the break-in likely happened: <ul> <li>A hacker sends the QAZ Trojan to a Microsoft employee's home computer. <li>The employee connects to the Microsoft corporate network from home. <li>The QAZ software steals the employee's password files and emails them to the hacker, allowing him later to log on to Microsoft's computers posing as the authorized employee. <li>From there, the hacker begins creating new MS accounts with higher security clearances and is free to wander around the network. </ul></blockquote> Was it Al Quaeda or some other terrorist organization that read <i>or modified</i> the source? How many other times has this already happened? With <a href="http://old.lwn.net/2002/0523/">this glowing endorsement</a> by a senior MS executive, I see no reason why any MS code would be allowed in any networked computer that contains sensitive information. Thu, 06 Jun 2002 17:30:24 +0000