Google, properly leveraged, has more intrusion potential than any hacking tool," said hacker Adrian Lamo, who recently sounded the alarm. The hacks are made possible by Web-enabled databases. Because database-management tools use canned templates to present data on the Web, typing specific phrases into Internet search tools often leads a user directly to those templated pages. For example, typing the phrase "Select a database to view" -- a common phrase in the FileMaker Pro database interface -- into Google recently yielded about 200 links, almost all of which lead to FileMaker databases accessible online.
http://www.wired.com/news/infostructure/0,1377,57897,00.html
Monday, March 3, 2003
Popular Posts
-
The concept of dragons was probably brought to Japan around 2,000 years ago, along with the technology for paddy agriculture. Their images h...
-
Very dry, dull book with some basic financial info like ROI and cash flow. Not a lot here.
-
Not a bad audio book, but I expected more. Big ideas: Build a high performance, high-trust culture; Identify desired results and un...
-
Someone that gets it. Service-oriented software, when done correctly in a platform-agnostic way can be flexible, cheap, and can motivate m...
-
...why was this given the file name of skyfall?... Certain information, while not specific as to target, gives the government reason to beli...
-
Peruvian archeologists have discovered the first full Inca burial site at Machu Picchu since the famous mountaintop citadel was discovered 9...
-
http://www.homestarrunner.com/sbemail94.html
-
http://esamultimedia.esa.int/images/marsexpress/377-260208-2149-6-co-01-HebesChasma_H1.jpg
-
From the bygone debates over DDR vs. RDRAM to the current controversy over Apples DDR implementations, one issue is commonly misunderstood i...
-
... or, Decemberween. Whatever. http://www.homestarrunner.com/xmas04.html