Tracing a Hacker's Footstep

Reading up on a blow by blow story of how an internet cafe attendant got into the President's personal ste was intriguing. It has been a while since I last read a similar read. The link is here. I'm not sure of what happened in here, I'm only familiar with some of the technique, such as SQL injection and DNS setting.

Comments