[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [Y] [Z] Packetstorm Tutorials List web site papers and articles parsing error attack passing the buck passwords cracking attack issued via email unencrypted patches keeping current peer reviews 2nd penetration testing 2nd tools Perrow, Charles Phillips, Paul Pike, Rob Plauger, P. J. playpen environments 2nd Postfix mail transfer agent case study principle of complete mediation principle of least privilege principle of psychological acceptability privilege compartmentalization flaw, case study privileges managing production pressures profilers pseudo-random numbers psychology of hunting flaws Pu, Calton |