Home
Articles
Search
Status
Best of 2600
Keywords
Links
Mirrors
  Open Source
Overview
SQL
PHP
Data

Articles

    prev next

Spring2002 cover image
Volume 19
Number 1
60 pages
Spring2002 back cover image
Quote: "I realize that this bill basically says you can tap someone's phone for jaywalking, and normally I would say, 'No way.' But after what happened on September 11th, I say screw 'em." - Dana Lee Dembrow, Democratic member of the Maryland House of Delegates explaining her approval of a new bill that would greatly expand the ability of authorities to monitor e-mail and telephone traffic. Jaywalkers beware.

Author
Nom de plume Acidus
Name
Email acidus@msblabs.org
Acidus@resnet.gatech.edu
Notes Most Significant Bit Labs

Aritcle
Synopsis Discusses the CampusWide card access system for colleges (now owned by Blackboard) including software, hardware, infrastructure and a potential exploit.
Notes
Code None
Page 22
Pages 4 and two thirds
In Best of 2600 book? Yes, page 604, Section 3 (2000 and Beyond: A Changing Landscape), Chapter 15 (Still More Hacker Stories)

Links

Addendum

Keywords
Access Control The ability to permit or deny the use of a particular resource by a particular entity.    (more..)
Exploit A piece of software, a chunk of data, or sequence of commands that take advantage of a bug, glitch or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software, hardware, or something electronic (usually computerized). This frequently includes such things as violently gaining control of a computer system or allowing privilege escalation or a denial of service attack.    (more..)