![]() ![]() G'day, Imagine you received the following email Hi, you don't know me, and to protect me from the law I must remain anonymous, but I am offering something stolen that you want, and which would otherwise cost you a lot of money, for no cost at all!Īll you have to do is run the attached executable file, and it will make that stolen item available to you. The article goes on to point out the risks of installing execuatbles provided by unknown parties and some of the possible consequences. An exploration, for uninitiated, of how software cracking usually works. Abstract Author: History: First published at John's blog, April 2004. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |