| TIP: Click on subject to list as thread! | ANSI |
| echo: | |
|---|---|
| to: | |
| from: | |
| date: | |
| subject: | Re: where does a hack process begin |
From: "Rich"
This is a multi-part message in MIME format.
------=_NextPart_000_0131_01C2C579.C007B340
Content-Type: text/plain;
charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
If you care about issues that don't involve the user as an active =
participant you need to avoid using these as examples. In this thread =
you are replying to my reply to your example #2. Your example #2 was = one
which involved a user.
I'm not sure your concern is as clear cut as it might be with a =
corporate server. You mentioned in another thread today that you had a =
problem with a collocated server for which your customer has =
responsibility or shares responsibility for the server and you can = suffer
from your customers mistakes. This is not a technical issue and = there is
no technical solution.
Rich
"Geo." wrote in message =
news:3e34ac42$1{at}w3.nls.net...
I still see user and system security as separate issues. I deal mostly =
with
securing servers on the internet where users are customers so I don't =
have
the option of training or patching the user. I only get to deal with =
the
machines so perhaps this affects my pov.
Geo.
"Rich" wrote in message news:3e348e6e{at}w3.nls.net...
That is the root of many problems. You can't get people to do =
things
they should nor stop them from doing things that shouldn't.
As for where things start, it has nothing to do with user or =
computer
since the start, in the context in which you questioned it, would be =
with
the sending of that email since that is the first step involving the =
person
being attacked. If you want to look from the perspective of the =
attacker
then that could be any time prior and you get into the psychology of =
why
someone chooses to be malicious.
Rich
"Geo." wrote in message =
news:3e3486e7$1{at}w3.nls.net...
"Rich" wrote in message news:3e3438ec{at}w3.nls.net...
> In example #2, if someone sent to an email instructing you to go
against
your interest and open malicious web page, that would be the start =
as that
is the first step that involves the person being attacked.<
Yes but are you hacking the machine or the user? Trojans exploit the =
user
not a component of the computer. You can't patch a user.
Geo.
------=_NextPart_000_0131_01C2C579.C007B340
Content-Type: text/html;
charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
If you
care about issues =
that don't=20
involve the user as an active participant you need to avoid using these = as=20
examples. In this thread you are replying to my reply to your = example=20
#2. Your example #2 was one which involved a user.
I'm not
sure your concern =
is as clear=20
cut as it might be with a corporate server. You mentioned in = another=20
thread today that you had a problem with a collocated server for which = your=20
customer has responsibility or shares responsibility for the
server = and you=20
can suffer from your customers mistakes. This is not a technical
= issue and=20
there is no technical solution.
Rich
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/1.45)SEEN-BY: 633/267 270 @PATH: 379/1 633/267 |
|
| SOURCE: echomail via fidonet.ozzmosis.com | |
Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.