|
I remember reading that Kevin Mitnick (for a while one of the most-wanted hackers) said that the easiest way to gain entry to a system is simply to call up and ask for it (pretending, of course, to be someone who has a genuine need for it). Once he was in, he used his considerable computer skills to play around, but IIRC he claimed that he rarely had to use them to get in in the first place. . . . . midrange-l@midrange.com writes: >We get phone calls from people trying to spoof our security. >MIS errs on the side of caution ... WHO THE HELL ARE YOU & WHY DO YOU >NEED TO >BYPASS OUR SECURITY? > >A receptionist type person is likely to err on the side of letting HACKERS >GET IN. >"I am manager at X site & I need security access for my new employees." >and >the receptionist person has no idea that the caller is in fact a person >with >no such authority. > >MacWheel99@aol.com (Alister Wm Macintyre) (Al Mac) Mike Naughton Senior Programmer/Analyst Judd Wire, Inc. 124 Turnpike Road Turners Falls, MA 01376 413-863-4357 x444 mnaughton@juddwire.com
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.