{"id":5483,"date":"2014-04-12T10:58:30","date_gmt":"2014-04-12T17:58:30","guid":{"rendered":"http:\/\/www.bigjimindustries.com\/wordpress\/?p=5483"},"modified":"2014-04-22T11:01:51","modified_gmt":"2014-04-22T18:01:51","slug":"heartbleed-galactica","status":"publish","type":"post","link":"https:\/\/bigjimindustries.com\/wordpress\/2014\/04\/12\/heartbleed-galactica\/","title":{"rendered":"Heartbleed Galactica"},"content":{"rendered":"<p><a href=\"http:\/\/www.washingtonpost.com\/blogs\/the-switch\/wp\/2014\/04\/11\/how-battlestar-galactica-explains-heartbleed\" target=\"_blank\"><em>from The Washington Post<\/em><\/a><\/p>\n<h1>How \u2018Battlestar Galactica\u2019 explains Heartbleed<\/h1>\n<p><strong>BY\u00a0<a title=\"Visit Brian Fung\u2019s website\" href=\"http:\/\/www.washingtonpost.com\/brian-fung\/2013\/07\/22\/a6298bda-f2de-11e2-ae43-b31dc363c3bf_page.html\" target=\"_blank\" rel=\"external\">BRIAN FUNG<\/a><\/strong><\/p>\n<p><img decoding=\"async\" alt=\"(SyFy)\" src=\"http:\/\/www.washingtonpost.com\/blogs\/the-switch\/files\/2014\/04\/Screen-Shot-2014-04-11-at-14.38.03.jpg\" width=\"480\" height=\"auto\" \/> (SyFy)<\/p>\n<p>Here&#8217;s the latest on Heartbleed: The critical Internet vulnerability doesn&#8217;t just affect Web services, but also extends to\u00a0<a href=\"http:\/\/www.washingtonpost.com\/blogs\/the-switch\/wp\/2014\/04\/10\/bad-news-heartbleed-now-also-affects-routers-and-networking-equipment\/\" target=\"_blank\">routers and networking hardware<\/a>. Yes, that means that a hacker who gains access to a vulnerable router might be able to grab information from said router and use it against you \u2014 that is, unless your equipment is too old to be affected by the bug.<\/p>\n<p>For anyone who&#8217;s watched Battlestar Galactica, this might sound familiar. In the opening hours of the Second Cylon War, the Galactica was among the humans&#8217; few surviving warships after a crippling surprise attack by invading robots. Many of the fleet&#8217;s other battlestars were caught in a Pearl Harbor-like situation: disabled in spacedock, then mercilessly destroyed.<\/p>\n<p>The ships were crippled by\u00a0<a href=\"http:\/\/en.wikipedia.org\/wiki\/The_Destruction_of_the_Twelve_Colonies#The_Reimagined_Series_.282003.29\" target=\"_blank\">a devastating electronic attack<\/a>\u00a0that took advantage of a flaw in the Command Navigation Program, the operating system on which the fleet relied. The fleet&#8217;s networked computers allowed the hack to spread, shutting down systems everywhere. With their vessels offline, the Colonial fleet proved helpless against the onslaught. Their over-dependence on technology led to their defeat.\u00a0But Galactica, being a much older battlestar, escaped. The CNP was never installed on its computers, nor were its computers ever networked. Galactica&#8217;s second-generation fighter craft were similarly behind the times \u2014 but in a head-to-head fight with the Cylons, this proved to be an advantage. Electronic warfare techniques didn&#8217;t work against them.<\/p>\n<p>[ <a href=\"http:\/\/www.washingtonpost.com\/blogs\/the-switch\/wp\/2014\/04\/11\/how-battlestar-galactica-explains-heartbleed\" target=\"_blank\">click to continue reading at WaPo<\/a> ]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>from The Washington Post How \u2018Battlestar Galactica\u2019 explains Heartbleed BY\u00a0BRIAN FUNG (SyFy) Here&#8217;s the latest on Heartbleed: The critical Internet vulnerability doesn&#8217;t just affect Web services, but also extends to\u00a0routers and networking hardware. Yes, that means that a hacker who gains access to a vulnerable router might be able to grab information from said router [&hellip;]<\/p>\n","protected":false},"author":26,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[8],"tags":[],"class_list":["post-5483","post","type-post","status-publish","format-standard","hentry","category-weirdness"],"_links":{"self":[{"href":"https:\/\/bigjimindustries.com\/wordpress\/wp-json\/wp\/v2\/posts\/5483","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bigjimindustries.com\/wordpress\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bigjimindustries.com\/wordpress\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bigjimindustries.com\/wordpress\/wp-json\/wp\/v2\/users\/26"}],"replies":[{"embeddable":true,"href":"https:\/\/bigjimindustries.com\/wordpress\/wp-json\/wp\/v2\/comments?post=5483"}],"version-history":[{"count":0,"href":"https:\/\/bigjimindustries.com\/wordpress\/wp-json\/wp\/v2\/posts\/5483\/revisions"}],"wp:attachment":[{"href":"https:\/\/bigjimindustries.com\/wordpress\/wp-json\/wp\/v2\/media?parent=5483"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bigjimindustries.com\/wordpress\/wp-json\/wp\/v2\/categories?post=5483"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bigjimindustries.com\/wordpress\/wp-json\/wp\/v2\/tags?post=5483"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}