First page Back Continue Last page Summary Graphic

Security Myths

  • Before continuing, we need to dispel a few myths:
  • "I don't have anything a cracker would want." This is just plain wrong. You have a system on the Internet. You have a system that is unexplored territory. Many times, a cracker is after the experience. They may be practicing for larger targets, or even merely for bragging rights. Some- times, they are merely curious or break in simply because the host is vulnerable. Some even have an agenda, like breaking Windows machines because they run Windows. In addition, do you have your Quicken database on the computer? It goes online each time you do.

    Notes: