Charmonium
Diamond Member
- May 15, 2015
- 9,586
- 2,951
- 136
Yeah, I thought so too but you have to figure there's no security on the system. It's not like network software had been invented yet. So I'm guessing it probably work like code injection would work today on a web site.I'm not a C++ programmer, but can someone explain to me how a network mapping program can accidently wipe the drives of the system it's connected to? My BS meter went off on that one.
I'm interested in what Joe will be doing with the spare computer time. I'm pretty sure that IBM had TSO (time sharing option) by the mid 80's. So he could make a small fortune by renting out the time between 5pm and 9am.