Home
Articles
Search
Status
Best of 2600
Keywords
Links
Mirrors
  Open Source
Overview
SQL
PHP
Data

Articles

    prev next

Winter2001 cover image
Volume 18
Number 4
60 pages
Winter2001 back cover image
Quote: "Publication that is deemed to be a threat to legitimate penological objectives." - State of Washington Department of Corrections, 2001.

Author
Nom de plume Screamer Chaotix
Name
Email screamer@hackermind.net
Notes

Aritcle
Synopsis Discusses a university "email station" that allows unfettered access to information in the student database.
Notes
Code None
Page 54
Pages 1 and a half
In Best of 2600 book? Yes, page 602, Section 3 (2000 and Beyond: A Changing Landscape), Chapter 15 (Still More Hacker Stories)

Links

Addendum

Keywords
Exploit A piece of software, a chunk of data, or sequence of commands that take advantage of a bug, glitch or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software, hardware, or something electronic (usually computerized). This frequently includes such things as violently gaining control of a computer system or allowing privilege escalation or a denial of service attack.    (more..)