Abstract
Eric Clamons says that when this project was begun they wondered why so little
was written about computer penetration. At first they thought nobody wanted to
hand a burglar his tools. But now they know: in the search for a new way to
present the subject they discovered that whay applies to all systems is trival,
and what is of depth applies only to a specific system.
The first part of this paper does present successfully a not too trival
generalization of methods of attack; later a continual battle between trivia
and specifics can be seen.
Can our readers do better?