Back to the main page

Mailing List Logs for ShadowRN

From: Marek Telgarsky <mtelgars@**.NMSU.EDU>
Subject: Re: Matrix
Date: Fri, 21 Apr 1995 18:55:16 -0600
>>>>> " " == Mark D Fender <mfender@******.SGCL.LIB.MO.US>
writes:
> Once again, correct, but how do you find a hole into the system without a
> password? Catch-22. If you happen to know a hole through good
> role-playing then go for it. If not, back to square one.

check out satan, the system security tool. that will give you a clue
as far as what types of remote detection can occur. And its not a
catch-22. But I am out of my league. I have never hacked a machine,
and I will probably never hack one that does not belong to me. If
someone else wants to elaborate, then please do.

-- Alazar@#linux.linuxnet.IRC #include <std_disclaimer.h>
-- SCF Admin marek@***.nmsu.edu
-- CS Computer Operations Group mtelgars@**.nmsu.edu

Disclaimer

These messages were posted a long time ago on a mailing list far, far away. The copyright to their contents probably lies with the original authors of the individual messages, but since they were published in an electronic forum that anyone could subscribe to, and the logs were available to subscribers and most likely non-subscribers as well, it's felt that re-publishing them here is a kind of public service.