From: | Spike <u5a77@*****.CS.KEELE.AC.UK> |
---|---|
Subject: | Re: Hacking |
Date: | Sat, 12 Jul 1997 23:54:58 +0100 |
Sometimes, yes....
|For all the time needed and required to obtain knowledge of a mark
|system, just to infiltrate it, isn't there an easier way of obtaining
|the goods you are trying to 'borrow'?
Borrow? Implying you'll give it back some day???
LOL
|Is 'hacking' a viable means of theft?
Can be. Some systems today have howling security holes in them....
Unix for example.
Also, it's quite possibly to create a virus tagged to a peice of software
that auto-mails you the password of the poor idiot using the infected
stuff.....
--
______________________________________________________________________________
|u5a77@*****.cs.keele.ac.uk| "Are you pondering what I'm pondering Pinky?" |
|Andrew Halliwell | |
|Principal subjects in:- | "I think so brain, but this time, you control |
|Comp Sci & Electronics | the Encounter suit, and I'll do the voice..." |
------------------------------------------------------------------------------
|GCv3.1 GCS/EL>$ d---(dpu) s+/- a- C++ U N++ o+ K- w-- M+/++ PS+++ PE- Y t+ |
|5++ X+/++ R+ tv+ b+ D G e>PhD h/h+ !r! !y-|I can't say F**K either now! :( |
------------------------------------------------------------------------------