Barney's Blog

Blog archive

Laying Into the Lama

We all know that hackers are after government and corporate computers. But someone must have been mighty curious about the Dalai Lama. Twelfth son of the Lama. The flowing robes, the grace, bald... striking.

A group of hackers managed to purloin a whole year's set of e-mail. Perhaps the hackers were looking for a little something, you know, for the effort, you know. Perhaps on their deathbed, they'd like to receive total consciousness. But that's asking a lot from a group of two-bit hackers.

I guess if a man whom many believe is the physical manifestation of the Tibetan God of Compassion isn't safe, then I guess none of us are.

Is corporate espionage for real? Have you come across real-life examples? If so, shoot me a non-secret message at [email protected] And if you can spot the items I plagiarized, tell me from whom those lines were stolen.

Posted by Doug Barney on April 19, 2010 at 11:53 AM


Featured

  • The 2022 Microsoft Product Roadmap

    Microsoft has a lot in the docket for 2022, including new products like SQL Server 2022, Exchange Subscription Edition and Visual Studio 2022 for Mac.

  • Microsoft Releases Entra Verified ID Service

    Microsoft announced on Monday the "general availability" of Microsoft Entra Verified ID, a new service that promises a more deliberate way for individuals and organizations to share identity information.

  • 2022 Microsoft Conference Calendar: For Partners, IT Pros and Developers

    Here's your guide to all the IT training sessions, partner meet-ups and annual Microsoft conferences you won't want to miss.

  • Microsoft Muddies Water with Microsoft 365 Services and Office Connection

    Microsoft has gone out of its way to making the Office 2016 and Office 2019 connections to Microsoft 365 services unclear and confusing.