Practical UNIX & Internet Security

Practical UNIX & Internet SecuritySearch this book
Previous: 11.2 DamageChapter 11
Protecting Against Programmed Threats
Next: 11.4 Entry

11.3 Authors

Not much is known about the people who write and install programmed threats, largely because so few have been identified. Based on those authors who are known to authorities, they can probably be grouped into a few major categories.

No matter what their numbers or motives, authors of code that intentionally destroys other people's data are vandals. Their intent may not be criminal, but their acts certainly are. Portraying these people as heroes or simply as harmless "nerds" masks the dangers involved and may help protect authors who attack with more malicious intent.

Previous: 11.2 DamagePractical UNIX & Internet SecurityNext: 11.4 Entry
11.2 DamageBook Index11.4 Entry