| TIP: Click on subject to list as thread! | ANSI |
| echo: | |
|---|---|
| to: | |
| from: | |
| date: | |
| subject: | Re: where does a hack process begin |
From: "Geo."
"Rich" wrote in message news:3e3438ec{at}w3.nls.net...
> In example #2, if someone sent to an email instructing you to go against
your interest and open malicious web page, that would be the start as that
is the first step that involves the person being attacked.<
Yes but are you hacking the machine or the user? Trojans exploit the user
not a component of the computer. You can't patch a user.
Geo.
--- BBBS/NT v4.01 Flag-4
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/1.45)SEEN-BY: 633/267 270 @PATH: 379/1 633/267 |
|
| SOURCE: echomail via fidonet.ozzmosis.com | |
Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.