× The internal search function is temporarily non-functional. The current search engine is no longer viable and we are researching alternatives.
As a stop gap measure, we are using Google's custom search engine service.
If you know of an easy to use, open source, search engine ... please contact support@midrange.com.



I remember reading that Kevin Mitnick (for a while one of the most-wanted
hackers) said that the easiest way to gain entry to a system is simply to
call up and ask for it (pretending, of course, to be someone who has a
genuine need for it). Once he was in, he used his considerable computer
skills to play around, but IIRC he claimed that he rarely had to use them
to get in  in the first place. . . . .

midrange-l@midrange.com writes:
>We get phone calls from people trying to spoof our security.
>MIS errs on the side of caution ... WHO THE HELL ARE YOU & WHY DO YOU
>NEED TO
>BYPASS OUR SECURITY?
>
>A receptionist type person is likely to err on the side of letting HACKERS
>GET IN.
>"I am manager at X site & I need security access for my new employees."
>and
>the receptionist person has no idea that the caller is in fact a person
>with
>no such authority.
>
>MacWheel99@aol.com (Alister Wm Macintyre) (Al Mac)


Mike Naughton
Senior Programmer/Analyst
Judd Wire, Inc.
124 Turnpike Road
Turners Falls, MA  01376
413-863-4357 x444
mnaughton@juddwire.com



As an Amazon Associate we earn from qualifying purchases.

This thread ...

Follow-Ups:
Replies:

Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.