Occupation: Consultant Birth: August 6, 1963
A company can spend hundreds of thousands of dollars on firewalls, intrusion detection systems and encryption and other security technologies, but if….
My argument is not that I shouldn't have been punished, but that the punishment didn't fit the crime..
No way, no how did I break into NORAD. That's a complete myth. And I never attempted to access anything considered to be classified government system….
A hacker doesnt deliberately destroy data or profit from his activities..
Back in my day, I would probe by hand. Now you can get commercial software that does the job for you..