1. How was the penetrator tracked? 2. What auditing features exist? 3. How to audit someone with system-level privilege? 4. Supply technical details on how to penetrate computers. 5. How were passwords obtained for the Livermore Crays? 6. How were super-user privileges obtained? 7. Did the penetrator guard against detection?

