First page Back Continue Last page Summary Graphic

Risks Posed by Crackers (cont.)

  • And what are system crackers after? Aside from the previously-listed examples:
  • A jumping-off point for SPAM.
  • A safe haven for launching other attacks.
  • Specific files on the current machine.
  • The bottom line is this:
  • Crackers unauthorized users who, for whatever reason has taken an interest in your system, network or data. They do not belong there. Do not make it easy for them.

    Notes: