This book first came to my attention several years back when the first edition received glowing reviews, including recommendations for its use as a study guide for the CISSP exam. The third edition was recently released, and I pre-ordered it, considering it for use in my teaching of both undergraduate and postgraduate programs, as well as CISSP prep courses.

I'm preserving this, since copies of it have been disappearing off the Internet. It's a transcript of what must be the world's dumbest hacker on an IRC channel. The comments are by the original poster, who is unfortunately no longer known.

Most system administrators soon find that working at the command line is the best way to work, for several reasons:

  • Low bandwidth
  • Ubiquity
  • Scripting

In this article, I'll describe ways to make use of SSH for fast, easy access to multiple systems with good security. Instructions are provided for both Windows and Linux clients.

The British are feeling the pinch in relation to recent terrorist threats in Islamabad and have raised their security level from "Miffed" to "Peeved." Soon, though, security levels may be raised yet again to "Irritated" or even "A Bit Cross." Brits have not been "A Bit Cross" since the blitz in 1940 when tea supplies all but ran out. Terrorists have been re-categorised from "Tiresome" to a "Bloody Nuisance." The last time the British issued a "Bloody Nuisance" warning level was during the great fire of 1666.