TIP: Click on subject to list as thread! ANSI
echo: nthelp
to: Rich
from: Geo.
date: 2003-01-26 20:17:44
subject: Re: where does a hack process begin

From: "Geo." 

"Rich"  wrote in message news:3e3438ec{at}w3.nls.net...

>   In example #2, if someone sent to an email instructing you to go against
your interest and open malicious web page, that would be the start as that
is the first step that involves the person being attacked.<

Yes but are you hacking the machine or the user? Trojans exploit the user
not a component of the computer. You can't patch a user.

Geo.

--- BBBS/NT v4.01 Flag-4
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/1.45)
SEEN-BY: 633/267 270
@PATH: 379/1 633/267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.