Details of the attack method will be given at a lecture at the Information Security Conference in Brazil, later this year, and paper on the attack method is available now at the Counterpane site. The ...
Networked computing is a double-edged sword. Connectivity makes transparent sharing of data through e-mail, Web sites, and ftp archives possible, but it also invites unwanted access to your data.