{"id":8209,"date":"2011-01-01T08:00:45","date_gmt":"2011-01-01T07:00:45","guid":{"rendered":"http:\/\/funrecycler.com\/?p=8209"},"modified":"2011-01-01T08:00:45","modified_gmt":"2011-01-01T07:00:45","slug":"defcon-18-klaue-niemals-den-computer-eines-hackers","status":"publish","type":"post","link":"https:\/\/funrecycler.com\/index.php\/2011\/01\/01\/defcon-18-klaue-niemals-den-computer-eines-hackers\/","title":{"rendered":"Defcon 18: Klaue niemals den Computer eines Hackers"},"content":{"rendered":"<p>Was passiert, wenn man einem &#8222;Hacker&#8220; das Notebook klaut? Nach 2 Jahren meldet sich der Rechner \u00fcber einen DynDNS Dienst.<br \/>\nWenn man sich das genau ansieht, ist es mehr als Gl\u00fcck, dass er an die Kiste wieder\u00a0ran gekommen\u00a0ist.<br \/>\nDenn wer installiert einen Autoupdater (Dyndns) auf einer Client\u00a0Maschine? Wer hat SSH laufen? Und wer hat denn VNC ungetunnelt aktiv? Weiterhin sind die Nutzdaten nicht verschl\u00fcsselt. Also egal wie, als Hacker w\u00fcrde ich ihn nicht bezeichnen. Dennoch witzig dargestellt, wobei man doch von der \u00f6ffentlichen\u00a0Denunziation\u00a0des &#8222;T\u00e4ters&#8220; h\u00e4tte absehen k\u00f6nnen.<br \/>\n<object classid=\"clsid:d27cdb6e-ae6d-11cf-96b8-444553540000\" width=\"640\" height=\"385\" codebase=\"http:\/\/download.macromedia.com\/pub\/shockwave\/cabs\/flash\/swflash.cab#version=6,0,40,0\"><param name=\"allowFullScreen\" value=\"true\" \/><param name=\"allowscriptaccess\" value=\"always\" \/><param name=\"src\" value=\"http:\/\/www.youtube.com\/v\/U4oB28ksiIo?fs=1&amp;hl=de_DE\" \/><param name=\"allowfullscreen\" value=\"true\" \/><embed type=\"application\/x-shockwave-flash\" width=\"640\" height=\"385\" src=\"http:\/\/www.youtube.com\/v\/U4oB28ksiIo?fs=1&amp;hl=de_DE\" allowscriptaccess=\"always\" allowfullscreen=\"true\"><\/embed><\/object><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Was passiert, wenn man einem &#8222;Hacker&#8220; das Notebook klaut? Nach 2 Jahren meldet sich der Rechner \u00fcber einen<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[852,1236,1671,1884,2197,2459,2901],"class_list":["post-8209","post","type-post","status-publish","format-standard","hentry","category-computer-und-technik","tag-dyndns","tag-hacker","tag-mac","tag-notebook","tag-rechnerklau","tag-ssh","tag-vnc"],"_links":{"self":[{"href":"https:\/\/funrecycler.com\/index.php\/wp-json\/wp\/v2\/posts\/8209","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/funrecycler.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/funrecycler.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/funrecycler.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/funrecycler.com\/index.php\/wp-json\/wp\/v2\/comments?post=8209"}],"version-history":[{"count":0,"href":"https:\/\/funrecycler.com\/index.php\/wp-json\/wp\/v2\/posts\/8209\/revisions"}],"wp:attachment":[{"href":"https:\/\/funrecycler.com\/index.php\/wp-json\/wp\/v2\/media?parent=8209"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/funrecycler.com\/index.php\/wp-json\/wp\/v2\/categories?post=8209"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/funrecycler.com\/index.php\/wp-json\/wp\/v2\/tags?post=8209"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}