Home
Articles
Search
Status
Best of 2600
Keywords
Links
Mirrors
  Open Source
Overview
SQL
PHP
Data

Articles

    prev next

Summer2005 cover image
Volume 22
Number 2
64 pages
Summer2005 back cover image
Quote: "No government can be long secure without a formidable opposition." - Benjamin Disraeli

Author
Nom de plume Pyscho
Name
Email
Notes

Aritcle
Synopsis Discusses the T-Mobile computer system employees use called Watson, describes several vulnerabilities.
Notes
Code None
Page 50
Pages 2
In Best of 2600 book? Yes, page 675, Section 3 (2000 and Beyond: A Changing Landscape), Chapter 16 (A New Era of Telephony)

Links
Ok on 03/02/2009 T-Mobile intranet. Original link
Original article Local copy on 08/07/2009 No archive.org

Addendum

Keywords
Exploit A piece of software, a chunk of data, or sequence of commands that take advantage of a bug, glitch or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software, hardware, or something electronic (usually computerized). This frequently includes such things as violently gaining control of a computer system or allowing privilege escalation or a denial of service attack.    (more..)