social
> engineering
> is for.
Or simply guess that it is something common like "mail", "intranet" or
"exchange". Since the attacker has the ability to access the resource
programmatically, testing a set of plausible names until the correct one is
found is poss
hine. The critical function of the server, which is its ability to
protect and process sensitive or valuable information, has already been
compromised.
Tim Hollebeek
Reliable Software Technologies
security expert at ATT Labs, pointed out, in this
case Netscape needs to run out and get a bar so they can raise it.
Tim Hollebeek
Reliable Software Technologies