Home
Articles
Search
Status
Best of 2600
Keywords
Links
Mirrors
  Open Source
Overview
SQL
PHP
Data

Articles

    prev

January1987 cover image
Volume 4
Number 1
24 pages
January1987 back cover image
Notes: Page 2 (and part of 21) has info from 2600, Page 17 has a picture of a British Telecom card-reader phone, that are not in the index.

Author
Nom de plume The Mole
Name
Email
Notes

Aritcle
Page Title Stumbling Into Control on a VMS
Synopsis Discusses some tips on taking over a VMS system, including two routes to take and tips for breaking onto a VAX.
Notes
Code None
Page 6
Pages 2
In Best of 2600 book? Yes, page 129, Section 1 (The 1980s: In the Beginning), Chapter 4 (The Early Days of the Net)

Links

Addendum

Keywords
Exploit A piece of software, a chunk of data, or sequence of commands that take advantage of a bug, glitch or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software, hardware, or something electronic (usually computerized). This frequently includes such things as violently gaining control of a computer system or allowing privilege escalation or a denial of service attack.    (more..)
Software specific Refers to a specific version or versions of software.