First page Back Continue Last page Summary Graphic
Risks Posed by Crackers (cont.)
And what are system crackers after? Aside from the previously-listed examples:
A jumping-off point for SPAM.
A safe haven for launching other attacks.
Specific files on the current machine.
The bottom line is this:
Crackers unauthorized users who, for whatever reason has taken an interest in your system, network or data. They do not belong there. Do not make it easy for them.
Notes: