1 Named pipes are mechanisms that enable network processes to access objects independently of the objects’ paths. In UNIX FIFOs (first in, first outs) are examples of named pipes.

2 A utility in the Windows 2000 Resource Kit, Passprop.exe, enables the default Administrator account to be locked when the criterion number of bad logon attempts is reached, provided that at least one other, nondisabled account with Administrator privileges exists. Passprop.exe works only when logon attempts are remote, not local. The Windows 2000 version of Passprop.exe works both under Windows 2000 and Windows XP. Also note that this difficult-to-locate file is found in the netmgmt.cab file in the Windows 2000 Resource Kit.

1 In fact, several researchers discovered an interesting anomaly with cell phone voice mail. Using a caller ID spoofing service, these researchers called cell phones from certain providers and passed the same caller ID number as the destination cell phone number. They’d then be dropped into the voice mailbox of that cell phone, without having to provide the voice mail passcode. The cell phone voice mail system just figures that the cell phone customer is calling to check voice mail from his or her own phone, and therefore does not authenticate the user! That’s chilling. As of this writing, this cell phone voice mail authentication bypass can only be “fixed” by the customer changing the voice mail configuration to always require a passcode, regardless of where the call originates.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.188.175.182