VX Heaven

Library Collection Sources Engines Constructors Simulators Utilities Links Forum

What do you Feed a Trojan Horse?

Cliff Stoll
Proceedings of the 10th National Computer Security Conference

[Back to index] [Comments]


Computer security is sometimes best served by corking up known holes in a system, and sometimes by tracking an intruder to the source. Techniques used to pursue the latter course include high speed network traces, operating system alarms, off-line monitoring, and traffic analysis. But technical methods are not enough. It's just as important to coordinate efforts with law enforcement agencies and other professional organizations, and to understand the constraints set on each organization. Persistent sleuthing can ultimately locate the source, but it may require considerable time and effort.

[Read the article]

By accessing, viewing, downloading or otherwise using this content you agree to be bound by the Terms of Use! aka