Generated Fri Oct 22 07:13:08 PDT 1999 by fc@red.all.net


Reid83
  • [Reid83] B. Reid, Personal Correspondance, unpublished, Nov. 1983 [In university and business networks, attackers have exploited protection problems to penetrate hundreds of computers throughout the United States. The primary method was to guess a password and then extend attacks via the Unix remote execution capability and further password guessing.]


    fc@red.all.net