Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror

Comment hacker behavior (Score 1) 37

The article lists a number of actions that the hacker shall not do. Most are to be expected, such as not modifying the system, not bringing it down, not exposing private information. The first and last points in the list are strange though:

  • Not using social engineering to gain access
  • Not using brute forcing to gain access

Eh? Why are these not valid attack vectors?

Slashdot Top Deals

The F-15 Eagle: If it's up, we'll shoot it down. If it's down, we'll blow it up. -- A McDonnel-Douglas ad from a few years ago

Working...