home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!ogicse!flop.ENGR.ORST.EDU!gaia.ucs.orst.edu!skyking!stanley
- From: stanley@skyking.OCE.ORST.EDU (John Stanley)
- Newsgroups: comp.security.misc
- Subject: Re: Two hackers caught tapping into Boeing, federal computers
- Message-ID: <1ejjt7INNhql@talon.UCS.ORST.EDU>
- Date: 20 Nov 92 21:04:39 GMT
- Article-I.D.: talon.1ejjt7INNhql
- References: <1992Nov12.084549.5128@unix.brighton.ac.uk> <1992Nov13.195515.19232@jato.jpl.nasa.gov>
- Organization: Oregon State University, College of Oceanography
- Lines: 12
- NNTP-Posting-Host: skyking.oce.orst.edu
-
- In article <1992Nov13.195515.19232@jato.jpl.nasa.gov> dave@jato.jpl.nasa.gov writes:
- >ddv@unix.brighton.ac.uk (Domenico De Vitto) writes:
- >>Any org. that has a _root_ password in _a_ dictionary gets all it deserves.
- >
- >They didn't explicitly say that they cracked the root password.
-
- >>filed with the charges stated. ``He then transferred the password file
- >>to a Boeing Company computer, where he decrypted the passwords.''
- >> That process gave Anderson the ``root'' password, which allowed
-
- If decrypting the passwords gave him the root password, then yes, Dave,
- they cracked the root password.
-