On Wed, Aug 29, 2018 at 02:00:39PM +0200, R.S. wrote:
[...]
> 
> Note: the effort paid for the attack depends on expected value. And
> attacker usually choose the weakest link in the chain, usually
> people.

Bingo.

-- 
Regards,
Tomasz Rola

--
** A C programmer asked whether computer had Buddha's nature.      **
** As the answer, master did "rm -rif" on the programmer's home    **
** directory. And then the C programmer became enlightened...      **
**                                                                 **
** Tomasz Rola          mailto:[email protected]             **

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to