IT: Anatomy of a Hack Security | Posted by Zonk on 05.07.2005 6:27 from the illegal-dissection dept.
Tiberius_Fel writes "Informit.com is running an extensive article about the anatomy of a hack against a sample network. It's an excerpt from a book titled Protect Your Windows Network: From Perimeter to Data. Even though it makes references to Windows, the techniques can be applied to other operating systems fairly easily." From the article: "Although attacking networks can be fun and informative--not to mention illegal if you do not have all the proper permissions--the fact remains that the vast majority of us do not need to know how to do so. Frankly, becoming a good penetration tester (pen tester) takes more than a week-long class. It takes commitment, dedication, intuition, and technical savvy, not to mention a blatant disregard for the rules and the right way to do things." http://www.informit.com/articles/article.asp?p=397660&rl=1 -- Berhenti langganan: [EMAIL PROTECTED] Arsip dan info: http://linux.or.id/milis

