IT: Anatomy of a Hack
Security | Posted by Zonk on 05.07.2005 6:27
from the illegal-dissection dept.

Tiberius_Fel writes "Informit.com is running an extensive 
article about the anatomy of a hack against a sample network.
It's an excerpt from a book titled Protect Your Windows 
Network: From Perimeter to Data. Even though it makes 
references to Windows, the techniques can be applied to 
other operating systems fairly easily." From the article: 
"Although attacking networks can be fun and informative--not
to mention illegal if you do not have all the proper 
permissions--the fact remains that the vast majority of us 
do not need to know how to do so. Frankly, becoming a good 
penetration tester (pen tester) takes more than a week-long 
class. It takes commitment, dedication, intuition, and 
technical savvy, not to mention a blatant disregard for the 
rules and the right way to do things."

http://www.informit.com/articles/article.asp?p=397660&rl=1

--
Berhenti langganan: [EMAIL PROTECTED]
Arsip dan info: http://linux.or.id/milis

Kirim email ke