Consider a remote exploit that is able to compromise a remote system without sending any attack code to his victim. Consider an exploit which simply creates local file to compromise thousands of computers, and which does not involve any local resources in the attack. Welcome to the world of zero-effort exploit techniques. Welcome to the world of automation, welcome to the world of anonymous, dramatically difficult to stop attacks resulting from increasing Internet complexity.
http://www.phrack-dont-give-a-shit-about-dmca.org/phrack/57/p57-0x0a
Sunday, December 29, 2002
Popular Posts
-
... or, Decemberween. Whatever. http://www.homestarrunner.com/xmas04.html
-
"The fish was delish and it made quite a dish." http://www.homestarrunner.com/sbemail120.html
-
Very dry, dull book with some basic financial info like ROI and cash flow. Not a lot here.
-
After a year of hell, I've been given a reprieve. I've spent the last year dealing with contracts, negotiation, budgeting, and confl...
-
It's been almost exaclty three years since I've updated this blog. In that three years, I've achieved a lot -- I've gone aft...
-
Humanclock.com runs on a Radio Shack 2.4mhz TRS-80 Model 100 portable computer, using a stripped-down version of the Apache webserver softwa...
-
C reported on his recent talks in Washington. There was a perceptible shift in attitude. Military action was now seen as inevitable. Bush wa...
-
Robots are being let loose in a colony of machines in an attempt to find out whether they can learn from their experiences. The scientists b...
-
I had the pleasure to attend the IBM Think conference in wet and chilly San Fran from Feb 11-14th of this year. The event overall was ...
-
Not a bad audio book, but I expected more. Big ideas: Build a high performance, high-trust culture; Identify desired results and un...