TIP: Click on subject to list as thread! ANSI
echo: nthelp
to: Geo.
from: Rich
date: 2003-01-26 17:50:10
subject: Re: where does a hack process begin

From: "Rich" 

This is a multi-part message in MIME format.

------=_NextPart_000_0080_01C2C563.5FAF3FB0
Content-Type: text/plain;
        charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

   That is the root of many problems.  You can't get people to do things =
they should nor stop them from doing things that shouldn't.

   As for where things start, it has nothing to do with user or computer =
since the start, in the context in which you questioned it, would be = with
the sending of that email since that is the first step involving = the
person being attacked.  If you want to look from the perspective of = the
attacker then that could be any time prior and you get into the =
psychology of why someone chooses to be malicious.

Rich

  "Geo."  wrote in message =
news:3e3486e7$1{at}w3.nls.net...
  "Rich"  wrote in message news:3e3438ec{at}w3.nls.net...

  >   In example #2, if someone sent to an email instructing you to go =
against
  your interest and open malicious web page, that would be the start as =
that
  is the first step that involves the person being attacked.<

  Yes but are you hacking the machine or the user? Trojans exploit the =
user
  not a component of the computer. You can't patch a user.

  Geo.


------=_NextPart_000_0080_01C2C563.5FAF3FB0
Content-Type: text/html;
        charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable








   That is
the root of many=20
problems.  You can't get people to do things they should nor stop
= them from=20
doing things that shouldn't.
 
   As for
where things start, =
it has=20
nothing to do with user or computer since the start, in the context in = which you=20
questioned it, would be with the sending of that email since that is the = first=20
step involving the person being attacked.  If you want to look from = the=20
perspective of the attacker then that could be any time prior and you = get into=20
the psychology of why someone chooses to be malicious.
 
Rich
 

  "Geo." <georger{at}nls.net>">mailto:georger{at}nls.net">georger{at}nls.net>
wrote=20
  in message news:3e3486e7$1{at}w3.nls.net..."Rich"=20
  <{at}> wrote in message news:3e3438ec{at}w3.nls.net...=
>  =20
  In example #2, if someone sent to an email instructing you to go=20
  againstyour interest and open malicious web page, that would be =
the start=20
  as thatis the first step that involves the person being=20
  attacked.<Yes but are you hacking the machine
or the user? =
Trojans=20
  exploit the usernot a component of the computer. You can't patch a =

 
user.Geo.

------=_NextPart_000_0080_01C2C563.5FAF3FB0--

--- BBBS/NT v4.01 Flag-4
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/1.45)
SEEN-BY: 633/267 270
@PATH: 379/1 633/267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.