Implications of Active Attacks
Remote login is no longer secure, even when protected by hand-held authenticators.
Login through a firewall is not safe, either.
Other protocols are subject to similar attacks.
Previous slide
Next slide
Back to first slide
View graphic version