Rev 13 | Show entire file | Ignore whitespace | Details | Blame | Last modification | View Log | RSS feed
Rev 13 | Rev 5757 | ||
---|---|---|---|
Line 1... | Line 1... | ||
1 | <br> |
1 | <br/> |
2 | Can you be sure that there is not a ``hacker'' among your students? If not, here is what (s)he may try to do to break/attack your server. |
2 | Can you be sure that there is not a ``hacker'' among your students? If not, here is what (s)he may try to do to break/attack your server. |
3 | 3 | ||
4 | He may look for security weaknesses in a neighboring virtual class, try to steal/crack site manager's password, or more frequently, simply break into the operating system (by the way, this is an important reason why we don't port WIMS to Windows). |
4 | He may look for security weaknesses in a neighboring virtual class, try to steal/crack site manager's password, or more frequently, simply break into the operating system (by the way, this is an important reason why we don't port WIMS to Windows). |
5 | 5 | ||
6 | And if he is ever to succeed, he may be able to either destroy your virtual class, or modify it in such a manner that it becomes extremely difficult for you to find out where are the modifications. The latter can often do you more dammage than a simple destruction. |
6 | And if he is ever to succeed, he may be able to either destroy your virtual class, or modify it in such a manner that it becomes extremely difficult for you to find out where are the modifications. The latter can often do you more dammage than a simple destruction. |