Tech at Night

On a multi-user computer system, different user accounts have different permissions. In most Unix-based systems, there is a special account besides. Account zero, the ‘root’ user, bypasses all permissions checks. The Chinese attackers had root access to Office of Personnel Management servers.

But NSA was the real threat ah, Rand Paul?

Continue reading »

Tagged with:
 

Nima Jooyandeh facts.