Google, properly leveraged, has more intrusion potential than any hacking tool," said hacker Adrian Lamo, who recently sounded the alarm. The hacks are made possible by Web-enabled databases. Because database-management tools use canned templates to present data on the Web, typing specific phrases into Internet search tools often leads a user directly to those templated pages. For example, typing the phrase "Select a database to view" -- a common phrase in the FileMaker Pro database interface -- into Google recently yielded about 200 links, almost all of which lead to FileMaker databases accessible online.
http://www.wired.com/news/infostructure/0,1377,57897,00.html
Monday, March 3, 2003
Popular Posts
-
Not a bad audio book, but I expected more. Big ideas: Build a high performance, high-trust culture; Identify desired results and un...
-
Very dry, dull book with some basic financial info like ROI and cash flow. Not a lot here.
-
... or, Decemberween. Whatever. http://www.homestarrunner.com/xmas04.html
-
Some good stuff from a Canadian futurist: - The rising power of the knowledge worker - Continuous training replaces job security; respect is...
-
Peruvian archeologists have discovered the first full Inca burial site at Machu Picchu since the famous mountaintop citadel was discovered 9...
-
Here's my (edited) journal entry for this event dated 12/01/98: Wow. I just sessioned and started reading "The Tao of Physics...
-
http://esamultimedia.esa.int/images/marsexpress/377-260208-2149-6-co-01-HebesChasma_H1.jpg
-
Increasingly, the overstretched and overburdened have a new answer to work lives of gunning harder for what seems like less and less: Dont j...
-
http://www.homestarrunner.com/sbemail94.html
-
U.S. President George Bush is a big winner in this year's World Stupidity Awards, joining the likes of the entire petroleum industry and...