"The forensic challenge"
A fascinating forensic case study - that's what you'll find in this
Network Magazine article, which examines the aftermath of a Linux
system which was deliberately set up as hacker bait, discovered by
hackers, and compromised by hackers -- specifically to give the
analysts an opportunity to track hacker behavior.  Read the piece and
you'll find their analysis, an examination of the hacker's tools of
trade, and some discussion of the underlying implications.  (May 7,
2001)

SOURCE: Network Magazine
http://networkmagazine.com/article/NMG20010413S0002


JSiva

_______________________________________________
linux-india-help mailing list
[EMAIL PROTECTED]
http://lists.sourceforge.net/lists/listinfo/linux-india-help

Reply via email to