|
Even better, with legitimate user access he now has access to the line of business applications, like creditor maintenance, accounts payable....
Because, eventually someone will notice the "malware" program and/or his actions and stop him. They may even deny his account access to the system and/or terminate his employment, but not always. If he has other people's passwords, he can still log on after this happens. He is also harder to trace, because it looks like a normal user using the system. On Thu, 24 Oct 2002, Booth Martin wrote: > > I am feeling really stupid here. If an unaudited user is on the system with > a malware program going anywhere and doing anything why would he bother > hijacking passwords? > _______________________________________________ This is the Midrange Systems Technical Discussion (MIDRANGE-L) mailing list To post a message email: MIDRANGE-L@midrange.com To subscribe, unsubscribe, or change list options, visit: http://lists.midrange.com/cgi-bin/listinfo/midrange-l or email: MIDRANGE-L-request@midrange.com Before posting, please take a moment to review the archives at http://archive.midrange.com/midrange-l.
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.