Home
Articles
Search
Status
Best of 2600
Keywords
Links
Mirrors
  Open Source
Overview
SQL
PHP
Data

Articles

    next

Summer1995 cover image
Volume 12
Number 2
60 pages
Summer1995 back cover image
Quote: "In a dramatic confirmation of how vulnerable Defense Department computers connected to the Internet actually are, the Defense Information Systems Agency revealed that it has conducted mock attacks on more then 8,000 DOD computers over the last two years. The DISA team successfully broke into more than 88 percent of the computers. Less than 5 percent even realized they had been attacked." - Federal Computer Week, February 6, 1995.
Notes: Page 17 contains a letter from AT&T, page 26 and 27 contain documents referencing the Bernie S. case that are not in the index.

Author
Nom de plume Helen Gone
Name
Email
Notes

Aritcle
Synopsis Discusses a couple of problems with ATM Diebold hardware and procedures that could result in free cash.
Notes
Code None
Page 13
Pages 3
In Best of 2600 book? Yes, page 335, Section 2 (The 1990s: The World Discovers Hackers), Chapter 10 (Learning to Hack Other Things)

Links

Addendum

Keywords
Exploit A piece of software, a chunk of data, or sequence of commands that take advantage of a bug, glitch or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software, hardware, or something electronic (usually computerized). This frequently includes such things as violently gaining control of a computer system or allowing privilege escalation or a denial of service attack.    (more..)