Enzo Michelangeli [EMAIL PROTECTED] writes:
Can someone explain me how the phishermen escape identification and
prosecution? Gaining online access to someone's account allows, at most, to
execute wire transfers to other bank accounts:
Some (a lot of?) large-scale phishing is done by or with the
Sean W. Smith [EMAIL PROTECTED] writes:
I would have thought that de facto standard approach is: the client
constructs the certificate request message, which contains things like the
public key and identifying info, and signs it. The CA then checks the
signature against the public key in the
http://www.washingtonpost.com/ac2/wp-dyn/A10205-2004Jul23?language=printer
The Washington Post
washingtonpost.com
Energy Dept. Shelves Removable Disks
Response to Security Breach at Lab
Associated Press
Saturday, July 24, 2004; Page A02
The Energy Department, in response to a security