hackers

Tue
15
Oct
Dennis Faas's picture

Windows Security Threat -- NTFS Alternate Data Streams, Part 2

This issue of the Gazette is dedicated to "tying up a few loose knots" from our ongoing discussions about Hackers and Security threats . First, I'll give you all an update to Gazette issue dated October 10, 2002 (Windows Security Threat -- NTFS ... Alternate Data Streams ). To recap: an anonymous reader (John Doe) sent in an email that discussed a potential security risk in Windows which might allow a hacker to take a screen capture of a computer with the NTFS file system installed. I realize that this article was a bit on the "technical side", but I did my best to clear up ... (view more)

Wed
09
Oct
Dennis Faas's picture

Can I track down a hacker?, Part 2

Yesterday's Visitor Feedback asked, " Can I track down a hacker ?" My answer to that question was a passive one -- mainly based on the fact it would take an inconceivable amount of time to prosecute each and every hacker who tries to wallow his way ... into your computer system. An algorithm for a typical Hacker might look something like this: Randomly select a computer to hack; Attempt to gain access to randomly selected computer; If access is granted, deliver a payload (send virus/trojan, delete files); If access is not granted, disconnect from this computer; Repeat process. With the ... (view more)

Pages

Subscribe to RSS - hackers