Google, properly leveraged, has more intrusion potential than any hacking tool," said hacker Adrian Lamo, who recently sounded the alarm. The hacks are made possible by Web-enabled databases. Because database-management tools use canned templates to present data on the Web, typing specific phrases into Internet search tools often leads a user directly to those templated pages. For example, typing the phrase "Select a database to view" -- a common phrase in the FileMaker Pro database interface -- into Google recently yielded about 200 links, almost all of which lead to FileMaker databases accessible online.
http://www.wired.com/news/infostructure/0,1377,57897,00.html
Monday, March 3, 2003
Popular Posts
-
I've learned a great many things over the past month... "friends" at work are not neccessarily friends, people you thought wer...
-
Lots of funny stuff today. Tim, check this one. http://www.penny-arcade.com/view.php3
-
Brad Dalton is the first to admit his theory is far-fetched: that bacteria could account for odd light emissions, as well as the reddish hue...
-
In a mine in California, scientists found the smallest bacteria so far discovered -- living in conditions as acidic as battery acid. Why thi...
-
Some good stuff from a Canadian futurist: - The rising power of the knowledge worker - Continuous training replaces job security; respect is...
-
The probes findings have provided a few salient new notions about the nature of cosmic reality. For starters, the universe is 13.7 billion y...
-
Very dry, dull book with some basic financial info like ROI and cash flow. Not a lot here.
-
I had the pleasure to attend the IBM Think conference in wet and chilly San Fran from Feb 11-14th of this year. The event overall was ...
-
This game rocks, at least so far. The upgrade interface within the game is a little difficult to understand, but the game just looks so damn...
-
Good acting, great writing, but ultimately falls flat due to it's inner pretentiousness and consequence-free portrayal of teen pregnancy...