Basic HTML version of Foils prepared
May 19 99
Foil 8 Typical Scenario - research
From
Computer Crimes: Examples of Network Security attacks Tango Group Internal Technology Seminars --
April 23 99
.
by
Roman Markowski
1
Information about vulnerabilities
http://www.cert.org/
http://www.dejanews.com/
http://www.geek-girl.com/bugtraq/
http://www.zdnet.com/
http://wwwrootshell.connectnet.com/
http://www.hackersclub.com/
http://www.ntsecurity.com/
vendors: Microsoft, Sun, SGI, Netscape, IBM, HP, ..
Newsgroups: alt.hacker*
2
Attack
in Table To:
©
Northeast Parallel Architectures Center, Syracuse University, npac@npac.syr.edu
If you have any comments about this server, send e-mail to
webmaster@npac.syr.edu
.
Page produced by
wwwfoil
on Mon Aug 16 1999