On Wed, Aug 29, 2018 at 02:00:39PM +0200, R.S. wrote: [...] > > Note: the effort paid for the attack depends on expected value. And > attacker usually choose the weakest link in the chain, usually > people.
Bingo. -- Regards, Tomasz Rola -- ** A C programmer asked whether computer had Buddha's nature. ** ** As the answer, master did "rm -rif" on the programmer's home ** ** directory. And then the C programmer became enlightened... ** ** ** ** Tomasz Rola mailto:[email protected] ** ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [email protected] with the message: INFO IBM-MAIN
