hi list
suresh, underwritten (actually by the 'satan' authors ) could be the
motivation for srinivas , may be he wants to crack a few systems to get
a feel , how it is done.
_______________________________
Our motivation for writing this paper is that system administrators are
often unaware of the dangers presented by anything beyond the most
trivial
attacks. While it is widely known that the proper level of protection
depends on what has to be protected, many sites appear to lack the
resources to assess what level of host and network security is adequate.
By
showing what intruders can do to gain access to a remote site, we are
trying to help system administrators to make _informed_ decisions on how
to
secure their site -- or not. We will limit the discussion to techniques
___________________________________
--
In a world without fences, who needs Gates ? not I ..
------------------------------------------------------------------
Email: [EMAIL PROTECTED] Office :
MBT(Sharda centre), off karve road
Pune , India
Tring Tring : +91(20)5424301 Xtn: 1126
Web-Site : http://www.rajeevjha.com
-------------------------------------------------------------------
-----------------------------------------------------------------------
Check out the 'What to do before posting to the list' site
for a list of things to try before posting. The site is
at http://botsie.tripod.com/beforeposting/