So, my networking teacher was discussing some various caveats of cyber security, and one threat he mentioned was social engineering. He decided to give a real-world example - two students from his Cyber Security class (which I'm taking next semester). The two of them followed this little scheme, and managed to get ahold of a passcode to what was supposed to be a locked lab with restricted access. Oops!
Note: this does not advocate the abuse of these weaknesses in a college bureaucracy. Do not do this. It's bad for you. God kills a kitten for every time you do this.
Call your campus IT services. Ask for a list of computer lab monitors in the building. Pick a monitor and create a Hotmail account using the name of the person as a username. Contact the secretary for engineering using this e-mail address, saying that you lost the password. Bing-o, you got the passcode to the door.
Whoopsies! I expect this little security hole will be fixed shortly.
Note: this does not advocate the abuse of these weaknesses in a college bureaucracy. Do not do this. It's bad for you. God kills a kitten for every time you do this.
Call your campus IT services. Ask for a list of computer lab monitors in the building. Pick a monitor and create a Hotmail account using the name of the person as a username. Contact the secretary for engineering using this e-mail address, saying that you lost the password. Bing-o, you got the passcode to the door.
Whoopsies! I expect this little security hole will be fixed shortly.
the idiot is the person who follows the idiot and your not following me your insulting me your following the path of a idiot so that makes you the idiot - LC Tusken