Money back on your Visa from HP & CDW Click for Wired News.


Search:  
 for 
[spacer] [spacer] [spacer] [spacer] [spacer] [spacer] [spacer] [spacer]
back to synapse page 5 of 11
 


Critical host attacks

A small number of computers on the Internet are accessed by a tremendous number of people. Attacking these machines can make the Internet unusable for millions of users.

18. Find the administrators of key machines and personally threaten them so they don't come to work. Alternatively, shoot them.

19. Call the phone company and tell them the leased lines connecting key computers are no longer needed. "We're having a new T3 installed from UUNET." Once leased lines are disconnected - even by accident - it can take weeks to get them re-established.

20. Steal the VeriSign master key and issue fraudulent certificates.

21. Flood VeriSign's certificate revocation server with requests. Result: ActiveX applets won't load.

22. Instead of actually breaking into one of these machines, just make it appear that way. Frenzied sysadmins are sure to make catastrophic mistakes.

 
[previous]   [next]


 

Printing? Get the text-only version.