Home
Articles
Search
Status
Best of 2600
Keywords
Links
Mirrors
  Open Source
Overview
SQL
PHP
Data

Articles

    prev next

Spring2002 cover image
Volume 19
Number 1
60 pages
Spring2002 back cover image
Quote: "I realize that this bill basically says you can tap someone's phone for jaywalking, and normally I would say, 'No way.' But after what happened on September 11th, I say screw 'em." - Dana Lee Dembrow, Democratic member of the Maryland House of Delegates explaining her approval of a new bill that would greatly expand the ability of authorities to monitor e-mail and telephone traffic. Jaywalkers beware.

Author
Nom de plume dual_parallel
Name
Email dual_parallel@hotmail.com
Notes

Aritcle
Synopsis Discusses a the compromise of an in store computer at Kmart.
Notes
Code None
Page 54
Pages 1
In Best of 2600 book? Yes, page 714, Section 3 (2000 and Beyond: A Changing Landscape), Chapter 17 (Retail Hacking)

Links

Addendum

Keywords
Exploit A piece of software, a chunk of data, or sequence of commands that take advantage of a bug, glitch or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software, hardware, or something electronic (usually computerized). This frequently includes such things as violently gaining control of a computer system or allowing privilege escalation or a denial of service attack.    (more..)