Return-Path: <sentto-279987-5008-1027041573-fc=all.net@returns.groups.yahoo.com> Delivered-To: fc@all.net Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Thu, 18 Jul 2002 18:22:08 -0700 (PDT) Received: (qmail 9770 invoked by uid 510); 19 Jul 2002 01:18:51 -0000 Received: from n23.grp.scd.yahoo.com (66.218.66.79) by all.net with SMTP; 19 Jul 2002 01:18:51 -0000 X-eGroups-Return: sentto-279987-5008-1027041573-fc=all.net@returns.groups.yahoo.com Received: from [66.218.67.201] by n23.grp.scd.yahoo.com with NNFMP; 19 Jul 2002 01:19:36 -0000 X-Sender: fc@red.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-8_0_7_4); 19 Jul 2002 01:19:33 -0000 Received: (qmail 70277 invoked from network); 19 Jul 2002 01:19:32 -0000 Received: from unknown (66.218.66.218) by m9.grp.scd.yahoo.com with QMQP; 19 Jul 2002 01:19:32 -0000 Received: from unknown (HELO red.all.net) (12.232.72.152) by mta3.grp.scd.yahoo.com with SMTP; 19 Jul 2002 01:19:35 -0000 Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id g6J1L6m11520 for iwar@onelist.com; Thu, 18 Jul 2002 18:21:06 -0700 Message-Id: <200207190121.g6J1L6m11520@red.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL3] From: Fred Cohen <fc@all.net> X-Yahoo-Profile: fcallnet Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Thu, 18 Jul 2002 18:21:06 -0700 (PDT) Subject: [iwar] [fc:The.Behaviors.and.Tools.of.Today's.Hackers] Reply-To: iwar@yahoogroups.com Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-Spam-Status: No, hits=0.0 required=5.0 tests=DIFFERENT_REPLY_TO version=2.20 X-Spam-Level: The Behaviors and Tools of Today's Hackers This article describes the means and types of attacks available to today's computer hackers. Definitions of attacks such as buffer overflows, denial of service attacks, and directed denial of service attacks are provided. The author explains that tools for exploiting systems are readily available through any of the more than 30,000 hacking sites. These sites provide tools and scripts for anyone with a malicious intent. The author also claims that there is no way to make an operating system (OS) 100 percent secure. The author goes on to state that even if that was possible to completely secure an OS, there would always be other platforms that are connected to the network that could be exploited. Diligence on the part of the user is needed to deter attacks on networks. <snip <a href="http://enterprisesecurity.symantec.com/article.cfm?articleid=1398&PID=12493901&EID=0">http://enterprisesecurity.symantec.com/article.cfm?articleid=1398&PID=12493901&EID=0> ------------------------ Yahoo! Groups Sponsor ---------------------~--> Will You Find True Love? Will You Meet the One? Free Love Reading by phone! http://us.click.yahoo.com/O3jeVD/R_ZEAA/Ey.GAA/kgFolB/TM ---------------------------------------------------------------------~-> ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2002-10-01 06:44:31 PDT