TIP: Click on subject to list as thread! ANSI
echo: nthelp
to: Geo.
from: Robert Comer
date: 2003-01-26 20:58:38
subject: Re: where does a hack process begin

From: "Robert Comer" 

>You can't patch a user.

I sure wish I could!!!!

- Bob Comer


"Geo."  wrote in message
news:3e3486e7$1{at}w3.nls.net...
> "Rich"  wrote in message news:3e3438ec{at}w3.nls.net...
>
> >   In example #2, if someone sent to an email instructing you to go
against
> your interest and open malicious web page, that would be the start as that
> is the first step that involves the person being attacked.<
>
> Yes but are you hacking the machine or the user? Trojans exploit the user
> not a component of the computer. You can't patch a user.
>
> Geo.
>
>

--- BBBS/NT v4.01 Flag-4
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/1.45)
SEEN-BY: 633/267 270
@PATH: 379/1 633/267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.