TIP: Click on subject to list as thread! ANSI
echo: nthelp
to: Rich
from: Geo.
date: 2003-01-26 22:58:10
subject: Re: where does a hack process begin

From: "Geo." 

I still see user and system security as separate issues. I deal mostly with
securing servers on the internet where users are customers so I don't have
the option of training or patching the user. I only get to deal with the
machines so perhaps this affects my pov.

Geo.

"Rich"  wrote in message news:3e348e6e{at}w3.nls.net...
   That is the root of many problems.  You can't get people to do things
they should nor stop them from doing things that shouldn't.

   As for where things start, it has nothing to do with user or computer
since the start, in the context in which you questioned it, would be with
the sending of that email since that is the first step involving the person
being attacked.  If you want to look from the perspective of the attacker
then that could be any time prior and you get into the psychology of why
someone chooses to be malicious.

Rich

  "Geo."  wrote in message
news:3e3486e7$1{at}w3.nls.net...
  "Rich"  wrote in message news:3e3438ec{at}w3.nls.net...

  >   In example #2, if someone sent to an email instructing you to go
against
  your interest and open malicious web page, that would be the start as that
  is the first step that involves the person being attacked.<

  Yes but are you hacking the machine or the user? Trojans exploit the user
  not a component of the computer. You can't patch a user.

  Geo.

--- BBBS/NT v4.01 Flag-4
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/1.45)
SEEN-BY: 633/267 270
@PATH: 379/1 633/267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.