tag:blogger.com,1999:blog-5300812013542782410.post5975045045943144545..comments2015-05-05T07:59:39.546-04:00Comments on Ethical Guidance for Pervasive Information and Communication Technologies (PICT): More on StuxnetKenneth D. Pimplehttp://www.blogger.com/profile/11506116115577376790noreply@blogger.comBlogger1125tag:blogger.com,1999:blog-5300812013542782410.post-86438692048241167782011-01-27T14:04:47.730-05:002011-01-27T14:04:47.730-05:00Interesting, thanks! The banality of hacking. I ...Interesting, thanks! The banality of hacking. I worked in a computer lab once where a student co-worker and I had a kind of digital arms race where we each tried to get around the security on each other's accounts -- password cracking programs, Trojan horses, etc. Turned out that early versions of Novell NetWare were laughably full of security holes. We learned a lot, but we never thought about taking what we had learned to all the corporate sites that were running NetWare. I guess it's nevertheless a case of play emulating battle.Colin Allenhttps://www.blogger.com/profile/06654741102989016317noreply@blogger.com