Barney's Blog

Blog archive

Laying Into the Lama

We all know that hackers are after government and corporate computers. But someone must have been mighty curious about the Dalai Lama. Twelfth son of the Lama. The flowing robes, the grace, bald... striking.

A group of hackers managed to purloin a whole year's set of e-mail. Perhaps the hackers were looking for a little something, you know, for the effort, you know. Perhaps on their deathbed, they'd like to receive total consciousness. But that's asking a lot from a group of two-bit hackers.

I guess if a man whom many believe is the physical manifestation of the Tibetan God of Compassion isn't safe, then I guess none of us are.

Is corporate espionage for real? Have you come across real-life examples? If so, shoot me a non-secret message at dbarney@redmondmag.com. And if you can spot the items I plagiarized, tell me from whom those lines were stolen.

Posted by Doug Barney on April 19, 2010 at 11:53 AM


Featured

  • 2019 Microsoft Conference Calendar: For Partners, IT Pros and Developers

    Here's your guide to all the IT training sessions, partner meet-ups and annual Microsoft conferences you won't want to miss this year.

  • Microsoft Rolls Out SQL Server 2019 RC1

    The first release candidate of the forthcoming SQL Server 2019 product can now be downloaded from Microsoft's Evaluation Center page.

  • The 2019 Microsoft Product Roadmap

    From the next major update to Windows 10 to the next generation of HoloLens, here's what's on tap from Microsoft this year.

  • Microsoft, Tech Leaders Back Confidential Computing Consortium

    The Linux Foundation on Wednesday announced the formation of a new group that aims to ensure the security of processed data.

RCP Update

Sign up for our newsletter.

Terms and Privacy Policy consent

I agree to this site's Privacy Policy.