Tallahassee, Florida, USA, Onsite Service, Remote Service, Windows Servers, Linux Servers, Websites, Screen Repair, Phone Repair, Pad Repair, iPhone repair, iPad repair, data recovery, Laptop Repair, Programming, Database, Backups, SOHO, Home Service,

Welcome

Username or Email:

Password:




[ ]

Date / Time

 

Chatbox


Administrator
2 weeks ago
I am not worried about the Corona Virus.

I am prepared. :)T

Administrator
3 weeks ago
Hello Hacker "Anthony" or do you use a different handle?
Sorry there is nothing to steal here but if you want to play just email us, we will let you know when we have a competition or something going on.

Any of the other projects on the site are pretty much open source too so if you have an interest let us know. corprattx@gmail.com

Administrator
2 months ago
Building the "Gordo-48" and "fitting it all together."

A Gordo-48 replaces 40 standard Servers but uses less than 500 Watts in an hour.

A standard Server uses around 500 Watts, times 40 Servers = 20,000 Watts per hour. You do the math. - Todd W. Byars, Computer Dudes, Tallahassee, Florida

#computerdudes #toddwbyars #newlinemicroservers #projectgordo #gordo48 #unitedstatesofamerica

Administrator
2 months ago
Order for Pickup Home Depot, W Tallahassee. Jan 14th or after.
Order #W945174892
Order Total: $28.93 Charged to Dudes care Online

Administrator
2 months ago
"The existence of a polynomial-time quantum algorithm proves that one of the most widely used cryptographic protocols is vulnerable to an adversary who possesses a quantum computer. However, it is theoretically accepted that quantum computers could equally be used to counteract against adversarial actions of this kind with the laws of quantum mechanics applied in this cryptographic capacity (through use of quantum computers) paving the way to quantum cryptography."

Our "Gordo-24" is a "Quantum Computer" that can be configured for non-standard computing. ;)T

Administrator
2 months ago
Nice Try Iran. You hacked one level of passwords on one of our servers but got locked out due to the geographic location of your servers.
Next time, mask your IP number. Don't be too embarrassed, we busted China with the same trick over a year ago. ;)T

Administrator
5 months ago
This week we will be playing with replacing Microsoft Active Directory with the new SAMBA4 on several versions of Linux including Raspberian. :)T
https://wiki.samba.org/index.php/Setting_up_Samba_as_an_Active_Directory_Domain_Controller

Administrator
5 months ago
I do not consider other Tech Companies or their owners and employees as competition.

I think of them as my Brothers and Sisters. - Todd W. Byars, founder The Computer Dudes, Inc. Tallahassee, Florida.

Administrator
7 months ago
Cisco Command Line is still the best. ;)T

https://networking.ringofsaturn.com/Cisco/ciscocommandguide.php

Administrator
9 months ago
https://mycomputerdudes.com/product/3d-printed-rocket-from-guardians-of-the-galaxy/ Follow this link to purchase a 3-d printed plastic model of "Rocket" Racoon from Guardians of the Galaxy! Super detailed!! :)T

Recent Posts

Last Seen Menu

News Categories

Computer Dudes Focus

background02.jpg

The Computer Dudes, Inc's:  Focus and High Traffic Technology News

This section gives special Focus on current Technology Issues in homes and small businesses.  

Read more..

The "Skunk" and the moral implications of "Weaponizing" a mail-able WiFi testing system.


 Administrator    07 Jan 2020
 None    Security News

MVIMG_20191010_143750.jpg

Many of the products and softwares we produce could be converted to weapons for use in conflicts with other Nations. What are some of the moral implications of creating a weapon?

"WAR!   What is it good for?   Absolutely Nothing! " Norman Whitfield and Barrett Strong, Motown 1969. 

That is pretty much how I feel about it, but its not always something we can prevent or avoid as an adult or as a corporation.   This brief article looks at the moral implications of "weaponizing" products originally intended for peaceful commercial uses such as Ethical Hacking and Pentesting. 

For this discussion we will consider a mail-able computer security tool designed by my company, The Computer Dudes, Inc.  We named it "The Skunk" because it is small and looks like it has a tail.

The Skunk is a small computer run by a cell phone battery pack that has a high power WiFi antenna.    We designed it a year ago for a client to test their internal network at several sites.  To do so we configured it to do passive scanning and to "call home" when it found an open public WiFi access point .  It would record its data internally too for when it reached its final destination.   The Skunk, as designed, is "Passive" and Legal when used in Pentesting.

We could "weaponize" The Skunk by making it become ACTIVE to jam, disrupt, plant viruses on or monitor any network.   Legally such a device could be sold to Law Enforcement or the Military.

Sounds good, but is it moral?   Consider a couple of examples.

Play "Devils Advocate" and say the Skunk was developed by people who do not approve of illegal uses, uses in war, or any uses outside the original design.  To violate their contracts, trust, or values is clearly a conflict of interest.

The thing that sticks in my mind, is what if our weaponized system disrupted something or caused other problems that resulted in civilian deaths.   

Is it moral to take something peaceful and make it a weapon?   I don't really know.  It is something my companies, employees, and I will research to consider further.    If you have good answers to the moral questions,  or just want to discuss some of this, feel free to comment or email me at:  corprattx@gmail.com  

Thanks! - Todd W. Byars, Founder, The Computer Dudes, Inc. Tallahassee, Florida.    Since 1997 :) 

 





e107 CMS  |  e107 Plugins  |  e107 Themes  |  e107 Handbook  |  
© 2007 - 2020 The Computer Dudes, Inc    Proudly powered by e107 which is released under the terms of the GNU GPL License.    Back to top ↑
e107 Theme by veskoto