zekrahminator
McLovin
- Joined
- Jan 29, 2006
- Messages
- 9,066 (1.31/day)
- Location
- My house.
Processor | AMD Athlon 64 X2 4800+ Brisbane @ 2.8GHz (224x12.5, 1.425V) |
---|---|
Motherboard | Gigabyte sumthin-or-another, it's got an nForce 430 |
Cooling | Dual 120mm case fans front/rear, Arctic Cooling Freezer 64 Pro, Zalman VF-900 on GPU |
Memory | 2GB G.Skill DDR2 800 |
Video Card(s) | Sapphire X850XT @ 580/600 |
Storage | WD 160 GB SATA hard drive. |
Display(s) | Hanns G 19" widescreen, 5ms response time, 1440x900 |
Case | Thermaltake Soprano (black with side window). |
Audio Device(s) | Soundblaster Live! 24 bit (paired with X-530 speakers). |
Power Supply | ThermalTake 430W TR2 |
Software | XP Home SP2, can't wait for Vista SP1. |
In the fight against terror, Germany is trying to gain the upper hand by spying on potential terrorists. They can already tap phone lines and use most forms of electronic surveillance. However, the German government wants to go even further by watching all internet activity on a suspect's computer. While a direct installation was recently prohibited by German courts, a "sneak attack" has not yet been forbidden. German officials are proposing a bill that would allow police agencies to send E-mails loaded with trojan horses, in an attempt to bug a suspect's computer. If a terror suspect was foolish enough to download attachments from the "Finance Ministry" or "Youth Services Office", a government official could read the contents of his hard drive or spy on his internet activities at any time. However, this idea is under much scrutiny. The likeliness that such a practice would become legal is very unlikely. And even if it did become legal, most terror suspects are smart enough not to install simple virus protection, and are probably running Mac OS X/Linux anyways to avoid such a problem.
View at TechPowerUp Main Site
View at TechPowerUp Main Site