Access "Hacking in 2003: Examining this year's hacking techniques"
This article is part of the February 2003 issue of Trustworthy yet? An inside look at what's changed after a year of Microsoft Trustworthy Computing
Hacking into a Woman's Heart On a recent Saturday night, my girlfriend and I were perched at the bar waiting for our table when we overheard a "hacker" trying to impress his date. He was a man in his early 40s, wearing a faded purple oxford shirt with a paisley lining over a maroon turtleneck. With each drag of his Marlboro, he exposed his gapped and rotting smile. The object of his attention was a moderately attractive woman who looked as bored as George Bush at a physics lecture. Despite his nerdy confidence, he probably sensed that things weren't going well. To jumpstart the conversation, he launched into a story about his hacking prowess. This immediately caught my attention. Over the din, I caught a few gems from his boasts. "I've hacked a high school just to see if I could do it without leaving any tracks. And I've hacked a few friends' Web pages just for fun. I was just messing around with them." "Hardly anyone knows you can hack Microsoft," he said, raising the tempo of his bragging. "I could make a lot of money hacking. I could steal $80 million, ... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
Microsoft security improving, while Trustworthy security lacks effort
by Lawrence M. Walsh
Microsoft is making significant strides to clean up its security mess, but Trustworthy Computing still has a long way to go.
-
Microsoft's internal auditor discusses the company's IT security outlook
Scott Charney is Microsoft's internal auditor, see what he and his team control.
-
NetIQ's five-point security architecture
Even with expanded support and agents, NetIQ's SIM product remains a Windows-centric solution.
-
Microsoft security improving, while Trustworthy security lacks effort
by Lawrence M. Walsh
-
-
Microsoft Security Response Center revamps its patch processes
Microsoft Security Response Center revamps its advisory and patch processes.
-
Profile: Symantec CEO John Thompson
Symantec's CEO breaks business and cultural barriers in his drive to build a security superpower.
-
How to address enterprise IT security concerns with executives
Five tips to win friends and influence C-level execs in your organization.
-
Microsoft Security Response Center revamps its patch processes
-
Columns
-
Next-generation security awareness training
by Andrew Briney
Put your posters and buttons away. A more effective solution is at your fingertips.
-
Hacking in 2003: Examining this year's hacking techniques
A look at the foibles, follies and felons of infosec in 2003.
-
Using HoneyD configurations to build honeypot systems
by Marcus J. Ranum, Contributor
Spoofing, diversion and obfuscation are all part of honeyd's powerful arsenal.
-
Detecting a Linux server hack
by Jay Beale, Contributor
Learn how to detect if your Linux server have been hacked or compromised.
-
Tips and tricks for IDS deployment best practices
by Jack Danahy, Contributor
Intrusion detection remains an over-hyped technology because most companies have no idea what to do with it.
-
Next-generation security awareness training
by Andrew Briney
More Premium Content Accessible For Free
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Emerging threat detection techniques and products
E-Handbook
Advanced persistent threat (APT) has been a used and abused term in the security industry, but security experts say targeted attacks are a growing ...
The rapid evolution of MDM solutions
E-Zine
Mobile device management (MDM) continues to grow at a feverish pace, both in terms of adoption and mobile security features. BYOD policies, and the ...
Security Management Strategies for the CIO