Jump to content

Talk:Intrusion Countermeasures Electronics

Page contents not supported in other languages.
From Wikipedia, the free encyclopedia

This is an old revision of this page, as edited by 2601:600:8100:ea09:7433:ef3a:efeb:1cda (talk) at 20:16, 16 September 2015 (SoftICE clarification). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

WikiProject iconComputing Stub‑class Low‑importance
WikiProject iconThis article is within the scope of WikiProject Computing, a collaborative effort to improve the coverage of computers, computing, and information technology on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
StubThis article has been rated as Stub-class on Wikipedia's content assessment scale.
LowThis article has been rated as Low-importance on the project's importance scale.
WikiProject iconScience Fiction Start‑class Low‑importance
WikiProject iconThis article is within the scope of WikiProject Science Fiction, a collaborative effort to improve the coverage of science fiction on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
StartThis article has been rated as Start-class on Wikipedia's content assessment scale.
LowThis article has been rated as Low-importance on the project's importance scale.

Origin

The line The term was popularized by William Gibson in his novel Neuromancer and, according to the New Hacker's Dictionary, originally coined by Tom Maddox. seems needlessly convoluted. William Gibson states this in his book Neuromancer:

My thanks to Bruce Sterling, to Lewis Shiner, to John Shirley, Helden, and to Tom Maddox, the incentor of Intrusion Countermeasures Electronics. And to the others, who know why.

I propose rewriting the explanation in the article. Moreover the term was not just popularised, that is where it was published, since Tom Maddox does not seem to have publised that originating story yet. --09:53, 24 April 2006 (UTC)

—Preceding unsigned comment added by 85.164.94.15 (talkcontribs) 04:53, 24 April 2006

Black ice

Black ICE btw is ICE created by AI's. 18:48, 23 August 2007 (UTC)

—Preceding unsigned comment added by 88.159.74.100 (talkcontribs) 13:48, 23 August 2007

No, it isn't. In most cyberpunk, "black ICE" is ice that will physically harm hackers. —Lowellian (reply) 05:01, 8 November 2008 (UTC)[reply]

Fair use rationale for Image:Dys silo0008.jpg

Image:Dys silo0008.jpg is being used on this article. I notice the image page specifies that the image is being used under fair use but there is no explanation or rationale as to why its use in this Wikipedia article constitutes fair use. In addition to the boilerplate fair use template, you must also write out on the image description page a specific explanation or rationale for why using this image in each article is consistent with fair use.

Please go to the image description page and edit it to include a fair use rationale. Using one of the templates at Wikipedia:Fair use rationale guideline is an easy way to insure that your image is in compliance with Wikipedia policy, but remember that you must complete the template. Do not simply insert a blank template on an image page.

If there is other fair use media, consider checking that you have specified the fair use rationale on the other images used on this page. Note that any fair use images uploaded after 4 May, 2006, and lacking such an explanation will be deleted one week after they have been uploaded, as described on criteria for speedy deletion. If you have any questions please ask them at the Media copyright questions page. Thank you.

BetacommandBot 05:02, 26 October 2007 (UTC)[reply]

Hackers or crackers?

shouldn't 'accessed by hackers' be changed to 'accessed by crackers'?

according to definitions on wiki itself, hacker and cracker are 'dynamic' applied terms, just like one can be either proffesional theft, or theft because he just stole something.

--83.12.255.234 (talk) 11:21, 15 January 2008 (UTC)[reply]

Babylon 5

I recall the term was used in one episode of Babylon 5, the episode where Ivonova's father was dying. Dread Lord CyberSkull ✎☠ 00:05, 22 March 2008 (UTC)[reply]

Dystopia

"ICE walls" are also used as a security program in Dystopia. --38.100.221.66 (talk) 00:23, 12 April 2008 (UTC)[reply]

SoftICE

SoftICE is a debugger and the name is an abbreviation of "software in-circuit emulator" (as opposed to a very expensive hardware one). Different ICE - nothing to do with hacking countermeasures.2601:600:8100:EA09:7433:EF3A:EFEB:1CDA (talk) 20:16, 16 September 2015 (UTC)[reply]

Real world usage

The following is in the main article:

Though real-life firewalls and similar programs fall under this classification, the term has little real world significance and remains primarily a science fiction concept. This can be attributed to the fact that using the term "electronics" to describe software products (such as firewalls) is somewhat of a misnomer.

This is not true at all. There are dedicated actual physical hardware devices (ubiquitous in most medium to large organisations, regardless of industry) that contain implementations of IDS/IPSes, Firewalls and the like. A physical electronic device that has the sole purpose to thwarting/detecting intruders would definitely qualify as an ICE. I wanted to get a consensus with some of the other wikipedia editors prior to amending the article.

115.70.220.178 (talk) 22:37, 12 January 2012 (UTC)[reply]