Beefy Boxes and Bandwidth Generously Provided by pair Networks Joe
laziness, impatience, and hubris
 
PerlMonks  

Re: Security: Technology vs Social Engineering

by barrachois (Pilgrim)
on Jul 28, 2003 at 18:19 UTC ( [id://278642]=note: print w/replies, xml ) Need Help??

This is an archived low-energy page for bots and other anonmyous visitors. Please sign up if you are a human and want to interact.


in reply to Security: Technology vs Social Engineering

Ed Skoudis has a reasonable discussion of some of these issues in his Counter Hack book in a section titled Low-Technology Reconnaissance: Social Engineering, Physical Break-in, and Dumpster Diving.

  • Comment on Re: Security: Technology vs Social Engineering

Log In?
Username:
Password:

What's my password?
Create A New User
Domain Nodelet?
Node Status?
node history
Node Type: note [id://278642]
help
Sections?
Information?
Find Nodes?
Leftovers?
    Notices?
    hippoepoptai's answer Re: how do I set a cookie and redirect was blessed by hippo!
    erzuuliAnonymous Monks are no longer allowed to use Super Search, due to an excessive use of this resource by robots.