|
|||||||||
|
Common forms of attackMalign interest may take the form of unauthorized attempts to log in to your system, perhaps by trying to guess passwords. If access is gained at a low level of privilege, the hacker may attempt to increase that level, in order to get at important system files. Unauthorized activity may include the updating or execution of files, or the accessing of confidential data. A hacker may impersonate a service originating from another Internet site, as mentioned in the introduction, by using the TELNET command. This is known as spoofing.
Spinning the Web by Andrew Ford |
||||||
Copyright © 1996-2002 Ford & Mason Ltd |