[iwar] [fc:The.Behaviors.and.Tools.of.Today's.Hackers]

From: Fred Cohen (fc@all.net)
Date: 2002-07-18 18:21:06


Return-Path: <sentto-279987-5008-1027041573-fc=all.net@returns.groups.yahoo.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Thu, 18 Jul 2002 18:22:08 -0700 (PDT)
Received: (qmail 9770 invoked by uid 510); 19 Jul 2002 01:18:51 -0000
Received: from n23.grp.scd.yahoo.com (66.218.66.79) by all.net with SMTP; 19 Jul 2002 01:18:51 -0000
X-eGroups-Return: sentto-279987-5008-1027041573-fc=all.net@returns.groups.yahoo.com
Received: from [66.218.67.201] by n23.grp.scd.yahoo.com with NNFMP; 19 Jul 2002 01:19:36 -0000
X-Sender: fc@red.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-8_0_7_4); 19 Jul 2002 01:19:33 -0000
Received: (qmail 70277 invoked from network); 19 Jul 2002 01:19:32 -0000
Received: from unknown (66.218.66.218) by m9.grp.scd.yahoo.com with QMQP; 19 Jul 2002 01:19:32 -0000
Received: from unknown (HELO red.all.net) (12.232.72.152) by mta3.grp.scd.yahoo.com with SMTP; 19 Jul 2002 01:19:35 -0000
Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id g6J1L6m11520 for iwar@onelist.com; Thu, 18 Jul 2002 18:21:06 -0700
Message-Id: <200207190121.g6J1L6m11520@red.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL3]
From: Fred Cohen <fc@all.net>
X-Yahoo-Profile: fcallnet
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Thu, 18 Jul 2002 18:21:06 -0700 (PDT)
Subject: [iwar] [fc:The.Behaviors.and.Tools.of.Today's.Hackers]
Reply-To: iwar@yahoogroups.com
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit
X-Spam-Status: No, hits=0.0 required=5.0 tests=DIFFERENT_REPLY_TO version=2.20
X-Spam-Level: 

The Behaviors and Tools of Today's Hackers

This article describes the means and types of attacks available to today's 
computer hackers. Definitions of attacks such as buffer overflows, denial 
of service attacks, and directed denial of service attacks are provided. 
The author explains that tools for exploiting systems are readily available 
through any of the more than 30,000 hacking sites. These sites provide 
tools and scripts for anyone with a malicious intent. The author also 
claims that there is no way to make an operating system (OS) 100 percent 
secure. The author goes on to state that even if that was possible to 
completely secure an OS, there would always be other platforms that are 
connected to the network that could be exploited. Diligence on the part of 
the user is needed to deter attacks on networks. &lt;snip

<a href="http://enterprisesecurity.symantec.com/article.cfm?articleid=1398&PID=12493901&EID=0">http://enterprisesecurity.symantec.com/article.cfm?articleid=1398&PID=12493901&EID=0>

------------------------ Yahoo! Groups Sponsor ---------------------~-->
Will You Find True Love?
Will You Meet the One?
Free Love Reading by phone!
http://us.click.yahoo.com/O3jeVD/R_ZEAA/Ey.GAA/kgFolB/TM
---------------------------------------------------------------------~->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2002-10-01 06:44:31 PDT