|
BugTraq
Vulnerabilites in new laws on computer hacking Feb 11 2006 04:35PM self-destruction itsbest com (4 replies) Re: Vulnerabilites in new laws on computer hacking Feb 16 2006 01:54PM Jon Gucinski (Jgucinski midwestbank com) (1 replies) Re: Vulnerabilites in new laws on computer hacking Feb 16 2006 09:34AM Radoslav DejanoviÄ? (radoslav dejanovic opsus hr) Re: Vulnerabilites in new laws on computer hacking Feb 15 2006 06:22PM Paul Schmehl (pauls utdallas edu) (3 replies) Re: Vulnerabilites in new laws on computer hacking Feb 17 2006 01:23PM Ansgar -59cobalt- Wiechers (bugtraq planetcobalt net) (2 replies) Re: Vulnerabilites in new laws on computer hacking Feb 21 2006 11:48AM Crispin Cowan (crispin novell com) (2 replies) Re: Vulnerabilites in new laws on computer hacking Feb 22 2006 11:16AM Ansgar -59cobalt- Wiechers (bugtraq planetcobalt net) Re: Vulnerabilites in new laws on computer hacking Feb 20 2006 10:30AM Radoslav Dejanoviæ (radoslav dejanovic opsus hr) Re: Vulnerabilites in new laws on computer hacking Feb 16 2006 05:19PM Sysmin Sys73m47ic (sysmin systematic gmail com) Re: Vulnerabilites in new laws on computer hacking Feb 16 2006 04:45PM Max Ashton (maxashton eml cc) |
|
Privacy Statement |
self-destruction (at) itsbest (dot) com [email concealed] wrote:
> New generations of teenagers will be scared of doing online
> exploration. I'm not talking about damaging other companies' computer
> systems. I'm talking about accessing them illegally *without*
> revealing private information to the public or harming any data that
> has been accessed.
Even if rootkits aren't actually installed and information isn't
actually revealed, the victim cannot be sure of that. Once they
discover that unauthorised access has occurred, they have to act
accordingly (e.g. notify customers, issue new cards, re-install the
system etc).
Anyone who manages to obtain unauthorised access may have already done
harm, regardless of what (if anything) they do with that access
thereafter.
Regarding new "hacking" laws, a more serious threat to overall
security is the idea of criminalising the posession of "hacking
tools", which will make even legitimate pen-testing difficult. It may
not be possible to simply outsource pen-testing to a country where
such tools are legal (e.g. due to laws restricting the transfer of
sensitive data abroad).
--
Glynn Clements <glynn (at) gclements.plus (dot) com [email concealed]>
[ reply ]