I remember reading that Kevin Mitnick (for a while one of the most-wanted hackers) said that the easiest way to gain entry to a system is simply to call up and ask for it (pretending, of course, to be someone who has a genuine need for it). Once he was in, he used his considerable computer skills to play around, but IIRC he claimed that he rarely had to use them to get in in the first place. . . . . firstname.lastname@example.org writes: >We get phone calls from people trying to spoof our security. >MIS errs on the side of caution ... WHO THE HELL ARE YOU & WHY DO YOU >NEED TO >BYPASS OUR SECURITY? > >A receptionist type person is likely to err on the side of letting HACKERS >GET IN. >"I am manager at X site & I need security access for my new employees." >and >the receptionist person has no idea that the caller is in fact a person >with >no such authority. > >MacWheel99@aol.com (Alister Wm Macintyre) (Al Mac) Mike Naughton Senior Programmer/Analyst Judd Wire, Inc. 124 Turnpike Road Turners Falls, MA 01376 413-863-4357 x444 email@example.com
As an Amazon Associate we earn from qualifying purchases.
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.