home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Hacker 2
/
HACKER2.mdf
/
cud
/
cud435f.txt
< prev
next >
Wrap
Text File
|
1995-01-03
|
1KB
|
28 lines
Date: 28 Jul 92 16:54:14 EDT
From: Gordon Meyer <72307.1502@COMPUSERVE.COM>
Subject: File 6--'Pirate' is PC?
"Texas and the Pirates"
With all the publicity computer pirates have been getting lately -
what with teenagers nonchalantly tapping into credit-card databases
from their bedrooms and bands of foreign technophiles looking for
vulnerable spots in computer networks that require high-level
clearance to access - security firms are going all out to market
their expertise to the nervous masses.
{ info about the June Computer Security Institute conference deleted.}
The two-day conference includes seminars on topics such as "Securing
the Simple Network Management Protocol" and "Protecting Against LAN
Viruses." To the astute security observer, however, the title of
one session - "Hackers and Your Network" - would certainly cause
a gasp. As all politically correct technophiles know, hackers are
legitimate computer enthusiasts; "computer pirates," by contrast,
are those involved in technothievery.
Excerpted from the June 1, 1992 issue of
INFORMATION WEEK, who should know better.
Downloaded From P-80 International Information Systems 304-744-2253