Ford & Mason Ltd
HOME
ABOUT
CONTACT
RESOURCES
ADVERTISING



donations support the development of
cronolog.org
and
refcards.com

next up previous contents index
Next: Defensive measures Up: Network security issues Previous: Network security issues


Common forms of attack

Malign interest may take the form of unauthorized attempts to log in to your system, perhaps by trying to guess passwords. If access is gained at a low level of privilege, the hacker may attempt to increase that level, in order to get at important system files. Unauthorized activity may include the updating or execution of files, or the accessing of confidential data. A hacker may impersonate a service originating from another Internet site, as mentioned in the introduction, by using the TELNET command. This is known as spoofing.


[ITCP]Spinning the Web by Andrew Ford
© 1995 International Thomson Publishing
© 2002 Andrew Ford and Ford & Mason Ltd
Note: this HTML document was generated in December 1994 directly from the LaTeX source files using LaTeX2HTML. It was formatted into our standard page layout using the Template Toolkit. The document is mainly of historical interest as obviously many of the sites mentioned have long since disappeared.

 
Copyright © 1996-2002 Ford & Mason Ltd