[ZDP] BackTalk to Document The Zope Book (2.5 Edition)/Users and Security

webmaster@zope.org webmaster@zope.org
Mon, 23 Sep 2002 20:12:11 -0400

A comment to the paragraph below was recently added via http://www.zope.org/Documentation/Books/ZopeBook/current/Security.stx#3-100


      The basic scenario that motivates both ownership and executable
      content controls is a *Trojan horse* attack. A Trojan horse is
      an attack on a system that operates by tricking a user into
      taking a potentially harmful action. A typical Trojan horse
      masquerades as a benign program that causes harm when you
      unwittingly run it.

        % Anonymous User - Sep. 23, 2002 8:12 pm:
         The attacker lacks permission to run the program himself, but tricks someone authorized to run it.