lotus

previous page: 01 This faq (comp.security.unix and comp.security.misc)
  
page up: comp.security.unix and comp.security.misc FAQ
  
next page: 03 What do the "identd" lines in my syslog mean? Is this a security exposure? Can I turn off identd?

02 Can anyone here tell me how to exploit the [whatever] bug? or Can anyone here tell me how to break in to my ISP?




Description

This article is from the comp.security.unix and comp.security.misc FAQ, by Alan J Rosenthal flaps@dgp.toronto.edu with numerous contributions by others.

02 Can anyone here tell me how to exploit the [whatever] bug? or Can anyone here tell me how to break in to my ISP?

No. We're security professionals. We try to secure systems. We think that
securing systems and fixing bugs are more intellectual activities than running
a program which someone else wrote which you don't understand.

You should only attempt "penetration testing" of a system with the consent
of its administrators and/or owners. They will only be interested in your
services if you know something. You can start your education by learning
some general computer science and computer programming, and by reading
computer security textbooks and/or newsgroups.

 

Continue to:













TOP
previous page: 01 This faq (comp.security.unix and comp.security.misc)
  
page up: comp.security.unix and comp.security.misc FAQ
  
next page: 03 What do the "identd" lines in my syslog mean? Is this a security exposure? Can I turn off identd?