| Originally published: Tuesday, 9 May 2000 | Author: Derrick H. Lewis |
| Published to: news_enhance_security/Security News | Page: 1/1 [Printable] |
Hacker's toolchest[SW] There are hackers capable of penetrating almost any system. The good ones get paid for it. The bad ones pay for it. What is a hacker's approach to penetration testing? What tools do they use? In this column, Carole Fennelly asks noted security specialists Brian Martin, Mark Abene, and Rain Forest Puppy for their perspective.
|
|
| Page 1 of 1 | |
|
(this article had no body text) | |