Adam Marsh

79%
Flag icon
1. How was the penetrator tracked? 2. What auditing features exist? 3. How to audit someone with system-level privilege? 4. Supply technical details on how to penetrate computers. 5. How were passwords obtained for the Livermore Crays? 6. How were super-user privileges obtained? 7. Did the penetrator guard against detection?
The Cuckoo's Egg
Rate this book
Clear rating
Open Preview