Barney's Blog

Blog archive

Laying Into the Lama

We all know that hackers are after government and corporate computers. But someone must have been mighty curious about the Dalai Lama. Twelfth son of the Lama. The flowing robes, the grace, bald... striking.

A group of hackers managed to purloin a whole year's set of e-mail. Perhaps the hackers were looking for a little something, you know, for the effort, you know. Perhaps on their deathbed, they'd like to receive total consciousness. But that's asking a lot from a group of two-bit hackers.

I guess if a man whom many believe is the physical manifestation of the Tibetan God of Compassion isn't safe, then I guess none of us are.

Is corporate espionage for real? Have you come across real-life examples? If so, shoot me a non-secret message at [email protected] And if you can spot the items I plagiarized, tell me from whom those lines were stolen.

Posted by Doug Barney on 04/19/2010 at 1:17 PM


Featured

  • Microsoft Starting To Roll Out New Excel Connected Data Types

    Microsoft on Thursday announced some Excel and Power BI enhancements that add "connected data types" on top of the standard strings and numbers options.

  • Windows 10 Users Getting New Process for Finding Optional Driver Updates

    Accessing Windows 10 drivers classified as "optional updates" will be more of a manual seek-and-install type of experience, starting on Nov. 5, 2020, Microsoft explained in a Wednesday announcement.

  • Microsoft Changes Privacy Platform Name to SmartNoise

    Microsoft Research has changed the name of its "differential privacy" platform from "WhiteNoise" to "SmartNoise," according to a Wednesday announcement.

  • Why Restarting a Failed SCVMM Job Might Be a Bad Idea

    Occasionally, restarting a failed System Center Virtual Machine Manager job can leave your virtualization infrastructure in an unknown state. Here's how to avoid that.

comments powered by Disqus