A.J. McMahon

1%
Flag icon
eventually find one of the back-end computer servers that process customer transactions but discover the credit card numbers are encrypted. Not a problem: I find the key used to encrypt the card numbers is conveniently hidden in a stored procedure within the database on a computer known as the “SQL server,” accessible to any database administrator.
Ghost in the Wires: My Adventures as the World's Most Wanted Hacker
Rate this book
Clear rating