If you've ever wondered exactly how the bad guys go about breaking into computers,
here's
an interesting overview of methodologies.
- jim 5-25-2001 4:42 pm
back to Jim Bassett's Weblog
add a comment to this page:
Your post will be captioned "posted by anonymous,"
or you may enter a guest username below:
Line breaks work. HTML tags will be stripped.
[
home
] [
subscribe
] [
login
]
- jim 5-25-2001 4:42 pm