home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!charon.amdahl.com!pacbell.com!sgiblab!zaphod.mps.ohio-state.edu!cs.utexas.edu!qt.cs.utexas.edu!yale.edu!ira.uka.de!gmd.de!Germany.EU.net!mcsun!sun4nl!tuegate.tue.nl!svin09!wzv!rob
- From: rob@wzv.win.tue.nl (Rob J. Nauta)
- Newsgroups: comp.security.misc
- Subject: Re: Forging E-mail from root to get users to change passwords
- Message-ID: <4073@wzv.win.tue.nl>
- Date: 6 Nov 92 15:39:20 GMT
- References: <82930@ut-emx.uucp>
- Organization: None
- Lines: 21
-
- ifbb657@ccwf.cc.utexas.edu (Douglas Floyd) writes:
-
- >How common is this attack?
-
- [attack deleted]
-
- Quite common among novice crackers/troublemakers. It is however almost
- never succesfull, very obvious and also quite annoying.
-
- >What is the best way to prevent/slow down this form of attack?
-
- Educate your users to pick good passwords, tell them not to tell
- them to anyone, especially not to people claiming to be the
- admin and needing their passwords 'for system maintenance'.
-
- Rob
- --
- /-----------------------------------------------\ Never ,==.
- | Rob J. Nauta, UNIX computer security expert. | Apologize, /@ |
- | rob@wzv.win.tue.nl, Phone: +31-40-837549 | Never /_ <
- | Feel free to email me for free advice | Explain. =" `g'
-