Quote: "If tyranny and oppression come to this land, it will be in the guise of fighting a foreign enemy." - James Madison
Nom de plume
Discusses the vulnerabilities of the employment application computers used by JC Penney, Best Buy and Circuit City.
In Best of 2600 book?
Yes, page 720, Section 3 (2000 and Beyond: A Changing Landscape), Chapter 17 (Retail Hacking)
A piece of software, a chunk of data, or sequence of commands that take advantage of a bug, glitch or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software, hardware, or something electronic (usually computerized). This frequently includes such things as violently gaining control of a computer system or allowing privilege escalation or a denial of service attack. (more..)
Copyleft 2008-2019 William R. Epp, banner by Max Nardi.