Hacking for profit

Hacking for profit

Vol 8. No 2. Page 15. This completes were : the series of articles on hacking... These articles The Basics of Hacking: Introduction The Basics...

92KB Sizes 7 Downloads 66 Views

Vol 8. No 2. Page 15. This completes were :

the

series

of

articles

on hacking...

These

articles

The Basics of Hacking: Introduction The Basics of Hacking I: DEC’s The Basics of Hacking II: VAX’s (UNIX) The Basics of Hacking III: DG’s ~+**++****+**+++++*******~**~**~****~**~*~****~**~*~**~~**~*~~****~ ++*+**+**+*++*+~*++*~*****~~*~~**~**~***~***~*~****~*~*~*~~~**~~~** This article by: The Knights of Shadow ~*+*****+*****+***~**~*~*~~*~~~*~*~~*~***~****~~******~~**~*~*****~ ~**+***+*+***Y*+**++***~*~*******~*~~*~**~~****~*~******~~~***~~**

HACKING

FOR

PROFIT

"We are not learning our lessons from the rash of computer break-ins over the past three years," warned Robert P. Campbell, President of Advanced Information Management, Incorporated (AIM) and one of our editorial advisors in remarks to the Armed Forces Communications and Electronics Association's Electronics and Physical Security Symposium in Philadelphia on 14 August, 1985. "Most organizations seriously believe the problem only concerns 'the other guy' and not them. When we report to a company that their name, the phone number of their computer, and that in some cases sensitive identifications and passwords have been circulated nationwide on electronic bulletin boards, they react with shock and There are serious financial losses being incurred. For dismay. example, during the address to the Information Industry Association's meeting in May of 1984, a Vice President of CompuServe Incorporated admitted that in one case hackers stole $1 million in CompuServe services in two days. "There are responsible persons trying to dismiss these incidents as isolated and purely a 'people problem' when, in fact, serious technical security integrity flaws exist. Repeated uncorrected break-ins of sensitive credit and government systems testify to The public perception of the threat of innocent these shortcomings. teenagers 'hacking around' in systems for fun is totally inaccurate. While the profusion of teenage hackers might be dealt with by serious prosecution (which seldom occurs), the greater danger is those who see the opportunity for profit or personal gain, particularly the trusted employee".

FROZEN

DATA

A new security system to protect confidential data stored in the computer has now been developed by a leading Poole, UK based electronics company for use in any situation where RS232 or other communication terminals are used in conjunction with host computers. The TS300 has been developed by Time and Data Systems Limited at their high tech plant and is considered to be one of the most advanced systems for enhancing computer protection now available. The high security factor is obtained by the use of infra-red coded cards, similar to credit cards, but using high integrity infra-red technology instead of the more conventional magnetic strip. 'Ihe