Eight tricks in the hacker’s bag

news
Aug 25, 20062 mins

Security: There are eight primary ways that attackers can slip into your network. And some of them, such as asking an assistant for the CEO’s password, work “100 percent of the time,” Roger Grimes explains in How malicious hackers attack. “Every professional penetration tester can easily, and laughingly, recount numerous stories about how easy it is to get unauthorized access from a normal corporate employee,” he writes.

Columnists’ corner: Never one to withhold tidbits of advice, Robert X. Cringely wonders if maybe, just maybe, Dell should start shipping its laptops with a fire extinguisher included. And ol’ Cringe dons his grammarian costume to predict how the word Google will evolve. “In the future, everything will be ‘googlized.’ As in, ‘I need to wipe my nose — anyone got a google?'” NSA takes the blame, Google protects its name.

Best of the blogs: Verizon is up to its old warranrty runaround tricks. But Ed Foster shares a lesson we can learn from the company in this Gripe Line post. “Whatever part of the company you may be dealing with, the deal you have with Verizon today may be taken away tomorrow. Or 90 days from tomorrow. That’s a pattern anyone who has a choice may want to consider before signing up with Verizon.”

From the analysts: David Margulius is probably not the only one addicted to YouTube, even if he is alone in fessing up to it with printed words. Withdrawal kicked in when he booted up to show his brother a video on the evolution of dance. “I’ve clearly morphed into a wuss who gets riled when my DSL gets flaky — or if YouTube goes down … I don’t envy the IT professionals of the future who’ll have to deal with an even more detached-from-reality version of me — but I wish you luck,” he confesses, and asks Can a day without DSL be too far off?