Editing 416: Zealous Autoconfig

Jump to: navigation, search

Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.
Latest revision Your text
Line 12: Line 12:
 
Instead of requesting a password, the program automatically begins a {{w|Dictionary attack|dictionary attack}}, entering in various commonly-used passwords in the hopes that Miss Lenhart has little regard for proper security measures (a flaw shared by many computer users). When this fails, the program attempts to exploit a {{w|Wired Equivalent Privacy|WEP}} vulnerability, which surprises Cueball. This also fails, possibly because Miss Lenhart used {{w|Wi-Fi Protected Access|WPA}} instead of WEP.
 
Instead of requesting a password, the program automatically begins a {{w|Dictionary attack|dictionary attack}}, entering in various commonly-used passwords in the hopes that Miss Lenhart has little regard for proper security measures (a flaw shared by many computer users). When this fails, the program attempts to exploit a {{w|Wired Equivalent Privacy|WEP}} vulnerability, which surprises Cueball. This also fails, possibly because Miss Lenhart used {{w|Wi-Fi Protected Access|WPA}} instead of WEP.
  
βˆ’
In the third panel, the autoconfig then connects to Cueball's Bluetooth phone and uses it to call a local school in order to locate the Lenhart children, who are attending there, and it reports that it has found them. It acts on this information in the fourth panel, notifying "field agents" to kidnap the Lenhart children for nonmonetary ransom, and then reports that the children are acquired (very fast it seems). With the children as hostages, the program begins negotiations with the parents, offering their safe return in exchange for the Wi-Fi password.  
+
In the third panel, the autoconfig then connects to Cueball's Bluetooth phone and uses it to call a local school in order to locate the Lenhart children, who are attending there, and it reports that it has found them. It acts on this information in the fourth panel, notifying "field agents" to kidnap the Lenhart children, and then reports that the children are acquired (very fast it seems). With the children as hostages, the program begins negotiations with the parents, offering their safe return in exchange for the Wi-Fi password.  
  
 
This puns on the computing sense of "negotiation": network protocols (such as HTTP) often specify routines whereby a server and a client computer can agree on the best format in which data can be transferred. This is called content negotiation or format negotiation (see for example [https://tools.ietf.org/html/rfc7231#section-3.4 section 3.4 of the specification for "semantics and content" in HTTP]).
 
This puns on the computing sense of "negotiation": network protocols (such as HTTP) often specify routines whereby a server and a client computer can agree on the best format in which data can be transferred. This is called content negotiation or format negotiation (see for example [https://tools.ietf.org/html/rfc7231#section-3.4 section 3.4 of the specification for "semantics and content" in HTTP]).

Please note that all contributions to explain xkcd may be edited, altered, or removed by other contributors. If you do not want your writing to be edited mercilessly, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource (see explain xkcd:Copyrights for details). Do not submit copyrighted work without permission!

To protect the wiki against automated edit spam, we kindly ask you to solve the following CAPTCHA:

Cancel | Editing help (opens in new window)