FAA: Boeing?s New 787 May Be Vulnerable to Hacker Attack


 
Thread Tools Search this Thread
Special Forums News, Links, Events and Announcements Complex Event Processing RSS News FAA: Boeing?s New 787 May Be Vulnerable to Hacker Attack
# 1  
Old 01-06-2008
FAA: Boeing?s New 787 May Be Vulnerable to Hacker Attack

by Kim Zetter, WIRED Boeing’s new 787 Dreamliner passenger jet may have a serious security vulnerability in its onboard computer networks that could allow passengers to access the plane’s control systems, according to the U.S. Federal Aviation Administration. The computer network in the Dreamliner’s passenger compartment, designed to give passengers in-flight internet access, is connected to the [...]

More...
Login or Register to Ask a Question

Previous Thread | Next Thread

4 More Discussions You Might Find Interesting

1. Debian

Vulnerable to symlink attack notice while trying to upgrade lighttpd.

I got this while I tried to upgrade my server and have been unable to find any explanations for what I could do while I have searched after an solution. I were an bit uncertain about how to search for an answer and have tried with some searches that I think should have been good enough as well with... (2 Replies)
Discussion started by: Jonathan Sander
2 Replies

2. What is on Your Mind?

I want to be a white-hat hacker!

HI, i want to be a white hacker(those who use their skills in ethical hacking) for that what all languages do i need to know i am working in an IT company and its paying me well, i just want to learn it because it has always attracted me..i know c,c++,shell,little bit html what else do... (13 Replies)
Discussion started by: shekhar_4_u
13 Replies

3. AIX

Powerha on P595 and Blade HX5 Type 787

Hello Everyobdy! Is it poosible to implement PowerHa on Different Server like power 595 and Blade HX5 Type 787 Thanks in Advance (8 Replies)
Discussion started by: Vit0_Corleone
8 Replies

4. News, Links, Events and Announcements

Flaw leaves Linux computers vulnerable

NEWS: Flaw leaves Linux computers vulnerable http://news.com.com/2100-1001-857265.html A flaw in a software-compression library used in all versions of Linux could leave the lion's share of systems based on the open-source operating system open to attack, said sources in the security... (3 Replies)
Discussion started by: killerserv
3 Replies
Login or Register to Ask a Question
CRACK-ATTACK(6) 						  [FIXME: manual]						   CRACK-ATTACK(6)

NAME
crack-attack - multiplayer OpenGL puzzle game like "Tetris Attack" SYNOPSIS
crack-attack {{[--server PORT] | [-X] | [--wait]} {[SERVER] | [-X]} {[--solo] | [-X]}} [--name NAME] DESCRIPTION
Crack Attack is roughly based on the Super Nintendo game "Tetris Attack". Slowly, your stack of colored blocks grows from the bottom, and you've got to make sure it never reaches the top. If it does, you lose. To eliminate blocks from the stack, line up at least three of one color, horizontally or vertically. Once you do, those blocks disappear, and put off slightly your inevitable demise. Crack Attack essentially requires hardware acceleration. For Xorg users, this means you want DRI. COPYRIGHT
Copyright (C) 2000 Daniel Nelson This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. The GNU General Public License can be found online at http://www.gnu.org/copyleft/gpl.html. Additionally, a copy can be obtained by writing to the Free Software Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. DISCLAIMER
It is important to realize that the name of Crack Attack! X-treme play mode is meant to be humorous, and thus should not itself be the subject of derision. Thank you. AUTHOR
Direct comments, questions, praise, flames, and job offers to nelson@aluminumangel.org. Visit my homepage at aluminumangel.org. This manual page was written by Colin Walters walters@debian.org for the Debian GNU/Linux system (but may be used by others). Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.1 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts and no Back-Cover Texts. A copy of Version 1.2 of the Free Documentation License is included in the file debian/copyright in the crack-attack source package. This file is also available in the Debian package as /usr/share/doc/crack-attack/copyright. [FIXME: source] 11/17/2011 CRACK-ATTACK(6)