
Mailing List Archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [tlug] Re: Security question with grep/e...
Quoth Stephen J. Turnbull:
> It's supposed to be, but in security the question is not "what does
> Jim want it to do?", but rather "What does Kevin Mitnick[1] want it to
> do?"
[...]
> Footnotes:
> [1] Famous cracker, figures in "The Cuckoo's Egg" and in The
> Firewalls Book*. May have misspelled the name.
You got his name right. Other books involving him:
_Takedown_, Tsutomu Shimomura
_CYBERPUNK_, Katie Hafner
_The Art of Deception: Controlling the Human Element of Security_, Kevin Mitnick
_The Fugitive Game_, Jonathan Littman
_The Cyberthief and the Samurai: The True Story of Kevin Mitnick-And the Man
Who Hunted Him Down_, Jeff Goodell
--
Josh Glover
GPG keyID 0xDE8A3103 (C3E4 FA9E 1E07 BBDB 6D8B 07AB 2BF1 67A1 DE8A 3103)
gpg --keyserver pgp.mit.edu --recv-keys DE8A3103
Home |
Main Index |
Thread Index