Consider a remote exploit that is able to compromise a remote system without sending any attack code to his victim. Consider an exploit which simply creates local file to compromise thousands of computers, and which does not involve any local resources in the attack. Welcome to the world of zero-effort exploit techniques. Welcome to the world of automation, welcome to the world of anonymous, dramatically difficult to stop attacks resulting from increasing Internet complexity.
http://www.phrack-dont-give-a-shit-about-dmca.org/phrack/57/p57-0x0a
Sunday, December 29, 2002
Popular Posts
-
Brad Dalton is the first to admit his theory is far-fetched: that bacteria could account for odd light emissions, as well as the reddish hue...
-
Very dry, dull book with some basic financial info like ROI and cash flow. Not a lot here.
-
It's been almost exaclty three years since I've updated this blog. In that three years, I've achieved a lot -- I've gone aft...
-
Some good stuff from a Canadian futurist: - The rising power of the knowledge worker - Continuous training replaces job security; respect is...
-
I had the pleasure to attend the IBM Think conference in wet and chilly San Fran from Feb 11-14th of this year. The event overall was ...
-
The probes findings have provided a few salient new notions about the nature of cosmic reality. For starters, the universe is 13.7 billion y...
-
Not a bad audio book, but I expected more. Big ideas: Build a high performance, high-trust culture; Identify desired results and un...
-
Someone that gets it. Service-oriented software, when done correctly in a platform-agnostic way can be flexible, cheap, and can motivate m...
-
Nother confirmation Of einstein... the first images of light escaping a black hole show that they lose energy. In this case, it was a superm...
-
Here's my (edited) journal entry for this event dated 12/01/98: Wow. I just sessioned and started reading "The Tao of Physics...