Skip to Main Content
Maximum Security, Third Edition
book

Maximum Security, Third Edition

by Anonymous
May 2001
Intermediate to advanced content levelIntermediate to advanced
896 pages
21h 11m
English
Que
Content preview from Maximum Security, Third Edition

Chapter 5. Hackers and Crackers

In This Chapter

The purpose of this chapter is to illustrate the methodology and steps a hacker or cracker employs when attacking a network. It also provides an overview of the System Administration Network Security (SANS) Top 10 vulnerabilities that crackers can exploit.

The Difference Between Hackers and Crackers

In order to understand the methodology of a hacker or cracker, one must understand what a hacker or a cracker is. Internet enthusiasts have argued the difference between hackers and crackers for many years. This chapter contains my contribution to that debate.

If I were forced to define the terms hacker and cracker,

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Maximum Security, Fourth Edition

Maximum Security, Fourth Edition

Anonymous

Publisher Resources

ISBN: 0672318717Purchase book