Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).

×

Comment: hacker behavior (Score 1) 37

by Vincy (#42487365) Attached to: Dutch Gov't Offers Guidance For Responsible Disclosure Practices

The article lists a number of actions that the hacker shall not do. Most are to be expected, such as not modifying the system, not bringing it down, not exposing private information. The first and last points in the list are strange though:

  • Not using social engineering to gain access
  • Not using brute forcing to gain access

Eh? Why are these not valid attack vectors?

You scratch my tape, and I'll scratch yours.

Working...