Ví dụ về việc sử dụng Langner trong Tiếng anh và bản dịch của chúng sang Tiếng việt
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
LANGNER: Sure, in theory.
I have one question for you,” Langner said to him.
Langner has called Stuxnet a one-shot weapon.
There was silence all around us,” Langner later recalled.
Ralph Langner: Okay, you really want to hear that?
We thought, okay, now this is going to get interesting."-Ralph Langner.
Langner decided that he and his team would tackle Stuxnet themselves.
There are probably only a handful of Siemensemployees who know this stuff better than we do,” Langner said.
Langner went public with his discoveries in a series of blog posts.
I was expecting some dumbDoS type of attack against any Siemens PLC,” Langner later recalled.
According to analysis by Langner, the Stuxnet code deactivates regular updating of the process images.
Weiss hosts an annual closed-door securityconference for about 100 industrial control professionals, and Langner was scheduled to speak at the gathering in two weeks on another topic.
Ralph Langner and team helped crack the code that revealed this digital warhead's final target- and its covert origins.
At Bushehr, meanwhile, a second secret set of codes, which Langner called"digital warheads," targeted the Russian-built power plant's massive steam turbine.
Langner had little interest in Windows systems or internet viruses- he doesn't even have an internet connection at home.
The construction of the worm was so advanced, it was"like the arrival of an F-35 into aWorld War I battlefield," says Ralph Langner, the computer expert who was the first to sound the alarm about Stuxnet.
Stuxnet researcher Ralph Langner believes that this second target may have been a turbine at Iran's Bushehr nuclear reactor.
The attackers had to bet on the assumption that the victim had no clue about cybersecurity, and that no independent third party would successfully analyze the weapon and make results public early,thereby giving the victim a chance to defuse the weapon in time," Langner said.
Langner contacted Joe Weiss, an industrial-control-system expert in the United States, to discuss what his team had found.
As described by German computer expert Ralph Langner, the Stuxnet computer“Virus” was so advanced“it was like the arrival of an F-35 fighter plane into a World War I battlefield.”.
Langner knew that thousands of Siemens customers had a potentially silent killer on their system, and they were waiting for Symantec or Siemens to tell them what Stuxnet was doing to their industrial controllers.
According to control systems security firm Langner Communications, the worm is not just designed to interfere with specific, variable frequency, motor control systems- it also attempts to disrupt turbine control systems.
According to Langner, this would mean that, in addition to Iran's uranium enrichment plant at Natanz, the country's Bushehr nuclear power plant may have been a further target of the Stuxnet attack.
The evidence that Langner and Symantec uncovered about Stuxnet provided a compelling case that the malware had been aimed at Iran's nuclear program.
It was clear to Langner that Stuxnet was the product of a well-resourced government with precise inside knowledge of the target it was seeking.
German cyber security expert Ralph Langner told National Public Radio last year that the virus seemed like something out of science fiction, but added that,“Thinking about it for another minute, if it's not aliens, it's got to be the United States.”.
According to both Symantec and Langner, Stuxnet was designed to infiltrate Iran's nuclear enrichment program, hide in the Iranian SCADA(supervisory control and data acquisition) control systems that operate its plants, then force gas centrifuge motors to spin at unsafe speeds.