![]() |
![]() |
#51 |
Join Date: Sep 2004
Location: Canada
|
![]()
Obligatory: Often it's simpler to get passwords from people, from the little scraps of paper around their desks or recycle, or via surveillance - anything from snooping over shoulders to secret cameras to key logging hardware[1] or software.
This is a great (and realistic) way to keep the rest of the group involved in something the hacker is up to. [1] not used very much any more because it costs money for each computer attacked, and it's relatively easy to look at the back of a computer and see if the keyboard is plugged into an extra thingy before the computer... Which means people stopped looking for it. That, in turn, means it's now seeing use again because people stopped looking for it. One of the local universities found hardware keyloggers sprouting all over campus; they think a student messing around was responsible.
__________________
All about Size Modifier; Unified Hit Location Table A Wiki for my F2F Group A neglected GURPS blog |
![]() |
![]() |
![]() |
#52 |
Join Date: Oct 2007
Location: Kentucky, USA
|
![]()
I'd love a full Pyramid article on software, Thinking Machines style or RAW or both.
__________________
GURPS Fanzine The Path of Cunning is worth a read. |
![]() |
![]() |
![]() |
#53 | |
Join Date: Aug 2004
Location: Seattle, WA
|
![]()
I'm glad! I kind of wish now that I'd gone with 10x per Complexity rather than 1,000x, but that would have broken compliance with Basic Set, which I wasn't really prepared to do at the time.
Quote:
Me too :-)
__________________
seasong |
|
![]() |
![]() |
![]() |
Tags |
pyramid 3/37, pyramid issues, ultra-tech, ultratech |
Thread Tools | |
Display Modes | |
|
|