6.04.2008

Air Force aims for full control of 'any and all' computers

In general terms, vulnerabilities often come about as the result of ignorant managers implementing functionality against the advice of competent engineers, or, if a network has been built with budget constraints that wind up placing security somewhere down the list of priorities.

If the target network has been built properly, however, the Air Force’s fantasies become more interesting to contemplate.

Read full story