Generated Fri Oct 22 07:13:08 PDT 1999 by

  • [Reid83] B. Reid, Personal Correspondance, unpublished, Nov. 1983 [In university and business networks, attackers have exploited protection problems to penetrate hundreds of computers throughout the United States. The primary method was to guess a password and then extend attacks via the Unix remote execution capability and further password guessing.]