|
|
libcats.org
Hacking Linux exposedBrian HatchIf you have a vulnerable computer attached to the BIG BAD INTERNET, sooner or later your box will be compromised. Notice I prefer the term compromised to hacked. Hacking is a benign activity. You hack out of curiosity and [hopefully] with prior permission. Can this be done? Can I get into this box? How is he trying to keep me out? What stone has he left unturned? Woops: He has a bulletproof firewall but he left this one vulnerable cgi script in his httpd directory: HA! I'M IN! At that point the correct thing to do is to stop and notify the hackee. But once a hacker gets in, (especially if he is there without permission) the temptation to quietly mess around and cover his guilty tracks is usually overwhelming. Then it has gone from hacking to compromising someone else's box.
Популярные книги за неделю:
Система упражнений по развитию способностей человека (Практическое пособие)Автор: Петров Аркадий НаумовичКатегория: Путь к себе
Размер книги: 818 Kb
Сотворение мира (3-х томник)Автор: Петров Аркадий НаумовичКатегория: Путь к себе
Размер книги: 817 Kb
Introduction to Functional Programming (Prentice Hall International Series in Computing Science)Автор: Richard Bird, Автор: Philip WadlerКатегория: Математика, Прикладная математика
Размер книги: 4.73 Mb
The Clean Coder: A Code of Conduct for Professional Programmers (Robert C. Martin Series)Автор: Robert C. Martin
Размер книги: 6.06 Mb
Только что пользователи скачали эти книги:
LabVIEW для радиоинженера. От виртуальной модели до реального прибораАвтор: Евдокимов Ю.К. и др.
Размер книги: 7.46 Mb
Complete Digital Photography, Fourth Edition (Graphics Series)Автор: Ben LongКатегория: Математика, Прикладная математика
Размер книги: 57.36 Mb
The Films of Federico Fellini (Cambridge Film Classics)Автор: Peter Bondanella
Размер книги: 3.15 Mb
Buddhist Philosophy: A Historical Analysis (National Foreign Language Center Technical Reports)Автор: David J. Kalupahana
Размер книги: 1.13 Mb
|
|
|