D
[^DD^]Hellboy
Guest
I've read through the first 10 or 12 pages of comments on this, and I didn't see what I think needs to be said (sorry of someone else already did).
While I think this is despicable, and unfortunately ruins the game that we have all been waiting for (at least temporarily), we need to look at what happened here. Here is the blame breakdown as I see it:
1. The Cracker. Way to go fella, you have not only runed the game for us, but you have given the talented group of people called hackers a bad name, again.
2. Microsoft. Yet another case of poorly designed software, that has cost the people you claim to serve. And ....
3. Valve. This incident is begging some serious questions as to how you treat your IP, and essentially your company's lifeblood.
As a person who oversees IT projects, protection is unbelievably important. A fact that has apparently been overlooked at Valve. Why was this code not better protcted? Why does anyone on your Corporate Data Network have any access at all to your development machines? This code should have been placed in a "clean room", and it's access by human hands severely limited. This is not a case of hindsight being 20/20, these are best practices that are not being observed.
I hope that all have learned a lesson from this.
While I think this is despicable, and unfortunately ruins the game that we have all been waiting for (at least temporarily), we need to look at what happened here. Here is the blame breakdown as I see it:
1. The Cracker. Way to go fella, you have not only runed the game for us, but you have given the talented group of people called hackers a bad name, again.
2. Microsoft. Yet another case of poorly designed software, that has cost the people you claim to serve. And ....
3. Valve. This incident is begging some serious questions as to how you treat your IP, and essentially your company's lifeblood.
As a person who oversees IT projects, protection is unbelievably important. A fact that has apparently been overlooked at Valve. Why was this code not better protcted? Why does anyone on your Corporate Data Network have any access at all to your development machines? This code should have been placed in a "clean room", and it's access by human hands severely limited. This is not a case of hindsight being 20/20, these are best practices that are not being observed.
I hope that all have learned a lesson from this.