start page | rating of books | rating of authors | reviews | copyrights

Practical UNIX & Internet Security

Practical UNIX & Internet SecuritySearch this book
Previous: 11.2 Damage Chapter 11
Protecting Against Programmed Threats
Next: 11.4 Entry
 

11.3 Authors

Not much is known about the people who write and install programmed threats, largely because so few have been identified. Based on those authors who are known to authorities, they can probably be grouped into a few major categories.

No matter what their numbers or motives, authors of code that intentionally destroys other people's data are vandals. Their intent may not be criminal, but their acts certainly are. Portraying these people as heroes or simply as harmless "nerds" masks the dangers involved and may help protect authors who attack with more malicious intent.


Previous: 11.2 Damage Practical UNIX & Internet Security Next: 11.4 Entry
11.2 Damage Book Index 11.4 Entry