| TIP: Click on subject to list as thread! | ANSI |
| echo: | |
|---|---|
| to: | |
| from: | |
| date: | |
| subject: | Re: where does a hack process begin |
From: "Robert Comer"
>You can't patch a user.
I sure wish I could!!!!
- Bob Comer
"Geo." wrote in message
news:3e3486e7$1{at}w3.nls.net...
> "Rich" wrote in message news:3e3438ec{at}w3.nls.net...
>
> > In example #2, if someone sent to an email instructing you to go
against
> your interest and open malicious web page, that would be the start as that
> is the first step that involves the person being attacked.<
>
> Yes but are you hacking the machine or the user? Trojans exploit the user
> not a component of the computer. You can't patch a user.
>
> Geo.
>
>
--- BBBS/NT v4.01 Flag-4
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/1.45)SEEN-BY: 633/267 270 @PATH: 379/1 633/267 |
|
| SOURCE: echomail via fidonet.ozzmosis.com | |
Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.