Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article

To: nw_arizona_granny

The social engineering approach to ID theft is the only one that is currently effective. Only 3-5% of current system compromise comes from historical vectors; most current exploitation is of the “invite the vampire into your home” type.

University networks are extremely valuable to spammers and terrorists. They don’t care where they get the bandwidth from, and universities have fat pipes.


356 posted on 03/22/2010 3:06:20 PM PDT by HipShot ("Remember the first rule of gunfighting... have a gun." --Colonel Jeff Cooper)
[ Post Reply | Private Reply | To 352 | View Replies ]


To: HipShot

University networks are extremely valuable to spammers and terrorists. They don’t care where they get the bandwidth from, and universities have fat pipes.<<<

Thanks, as I had not thought of your solution, that it was a fishing post of that I was not in doubt.

Reminds me of when Laura caught the jehadi sites on the Arkansas [?] motor department website a few years ago.

They teach each other their evil tricks of the trade, if only we could teach goodness as quickly.


358 posted on 03/22/2010 3:45:23 PM PDT by nw_arizona_granny ( garden/survival/cooking/storage- http://www.freerepublic.com/focus/chat/2299939/posts?page=5555)
[ Post Reply | Private Reply | To 356 | View Replies ]

Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson