I'm not a pipeline expert, but I've been doing computers sense the early 90s. You have a pipe. It has pumps and valves. You have a computer that controls it all. The computer gets hacked. UNPLUG THE DAM COMPUTER... and plug in another one. Then restart the pumps. If they are too incompetent to figure out a workaround then get the hell out of the way and let someone else try.
If there is one thing I've learned with computers its that the guy at the console is god. There is no such thing as taking over from a remote location. Anyone that tells you differently has been watching too many movies. Send real actual human beings out the the pumps, unplug the dam computer and just turn the pump on manually. Yeah, a person might have to watch the pressure and flow rates etc rather than the computer. So the hell what. Get the dam gas flowing again morons.
This is categorically false, and really sheds light on what you know vs what you think you know. There are certainly fewer exploits to take advantage of in *nix systems, but you don't need an exploit, whether hardware, software, or operator, to wreak havoc on a system or network of systems.
Please... do link to a "virus" that works on FreeBSD. I'll wait.
You can install things like root kits if you get root access, but as a person who has spent DECADES on the console of unix machines all you have to do to fix that is unplug the network cable and fix it. Sure it can take 24-48 hours to fix depending on how long they've had root, how good your backups are, etc, but the idea that it couldn't be fixed quickly is just silly.
Winblows on the other hand... LOL... SMH... Its like it was designed to be compromised. The most hilarious part is windows recently has started using pieces and parts of unix to increase its security.
I just reread what you said... I don't need an exploit? So if they aren't attacking the routers, which are hard as hell to attack in the first place... What you said makes no sense. There has to be some gap in their security that was exploited. Otherwise everything would be fine.
Look I ran a company that provided unix shells to hackers. I never got rooted. I know how this shit works. There is a right way and a wrong way to secure computers.
Whatever....
Read my post below. Updoot for you.
I have three 25 plus year IT experts here at work. I'm not a techie but I showed them both Comments and they agree with Darwyn. And they stood there for 20 minutes and came up with 3 ways to make this shit all work.
You guys fight about it. Computers are so awesome they stole.an entire globes worth of nations with them.
Also they called you an idiot for saying it was categorically false... just passing it on.
Kek...