Google, properly leveraged, has more intrusion potential than any hacking tool," said hacker Adrian Lamo, who recently sounded the alarm. The hacks are made possible by Web-enabled databases. Because database-management tools use canned templates to present data on the Web, typing specific phrases into Internet search tools often leads a user directly to those templated pages. For example, typing the phrase "Select a database to view" -- a common phrase in the FileMaker Pro database interface -- into Google recently yielded about 200 links, almost all of which lead to FileMaker databases accessible online.
http://www.wired.com/news/infostructure/0,1377,57897,00.html
Monday, March 3, 2003
Popular Posts
-
... or, Decemberween. Whatever. http://www.homestarrunner.com/xmas04.html
-
It's been almost exaclty three years since I've updated this blog. In that three years, I've achieved a lot -- I've gone aft...
-
Here's my (edited) journal entry for this event dated 12/01/98: Wow. I just sessioned and started reading "The Tao of Physics...
-
Very dry, dull book with some basic financial info like ROI and cash flow. Not a lot here.
-
"The fish was delish and it made quite a dish." http://www.homestarrunner.com/sbemail120.html
-
After a year of hell, I've been given a reprieve. I've spent the last year dealing with contracts, negotiation, budgeting, and confl...
-
Not a bad audio book, but I expected more. Big ideas: Build a high performance, high-trust culture; Identify desired results and un...
-
Kids sick. Hiyat sick. Me sick. Everybody sick. No fun. Seriously. Zack just gets over having baby measels and everybody in the house co...
-
I'm sure someone else has written the rules of business out in terms of the Bushido, but here's my take: Truthfulness You must speak...
-
Somewhere along the way I learned about this magic trick. It was probably from one of those “Owl” magazines you used to get for free or an e...