| Description |
viii, 84 leaves : illustrations ; 28 cm + 1 CD-ROM (4 3/4 in.) |
| Notes |
System requirements: Internet Explorer browser, Adobe Acrobat Reader, and Notepad. |
| Summary |
"Various hostile applets were developed as part of this research to study the effects of hostile applets, including annoyance applets, denial of service applets and an invasion of privacy applet. To further study the effects of hostile applets, two social engineering attacks were developed to collect the usernames and passwords of users by introducing a fake login screen. A password attack was carried out using John the Ripper password cracker to study the vulnerabilities of passwords."--Abstract, p. iii. |
|