URBE Students summer 2006 - N812

Saturday, August 05, 2006

Hello URBE's summer students Class N812. Welcome !!
Please, be so kind and search information in the net about
SOCIAL ENGINEERING
and let's share it...
Important facts?: Definition, other terms related (shoulder surfing, password sniffing...) Sicological profile, Behavior, Common Procedures, How to avoid it...
AND YOUR OWN OPINION OF COURSE!!

If you paste information from a web site, please call the source

30 Comments:

  • This page is excellent

    By Anonymous Anonymous, at 10:58 AM  

  • the definition of social engineering is someone that use the weaknesses on others people also, it´s a bad thing! By.: Neileen Azuaje --> N812 -->> 17.806.580

    By Anonymous Anonymous, at 11:14 AM  

  • Social engineering is hacker-speak for conning legitimate computer users into providing useful information that helps the hacker gain unauthorized access to their computer system.
    This practice use the telephone or internet to reveal or to obtain confidential information. It is done by means of a social trick is for a hacker to send email claiming to be a system administrator, the hacker will claim to need your password for some important system administration work, it's possible for a hacker to forge email, making it look like it came from somebody you know to be a legitimate system administrator, often the hacker will send this message to every user on a system, hoping that one or two users will fall for the trick.
    Another common trick is known as "shoulder surfing".
    Security experts propose that as our culture becomes more dependent on information, social engineering will remain the greatest threat to any security system.
    Virginia Olivares
    16.707.326

    By Anonymous Anonymous, at 11:24 AM  

  • the social engeenering is the practice of obtainig confidential information by manipulation of legitimate users.

    this people use te phone or internet. is social becouse this people to tolk whit you face to face.

    this profetion is not good becouse this people explote de other people by tramps social engineers exploit the natural tendency of a person to trust his or her word.

    A contemporary example of a social engineering attack is the use of e-mail attachments that contain malicious payloads (that, for instance, use the victim's machine to send massive quantities of spam).

    the people call "the hackers" this people is very important by the police becouse the police use "the hackers" for sove it the problem in the red for criminals.


    name: Briggel Vera
    I.D: 17545723

    By Anonymous Anonymous, at 11:25 AM  

  • name:Leisy Boscan
    CI:14234245
    Seccion N-812


    In order to avoid the frauds, the legitimate users must have precaution and confidential prevention to transmit report specially to which he talks about to the numbers and keys of the credit cards and cards of debits.

    Also to inquirethe companies in where the financial transactions were made they are reliable and serious in the market

    By Anonymous Anonymous, at 11:25 AM  

  • Social engineering is a term that describes a nontechnical class of intrusión that trusts the human interaction heavy and often implies trampear of people to break normal procedures of the security.

    Social engineering will continue being the greatest threat any system of the security. The prevention includes to educate to people on the value of the information, the training of her to protect it, and the increase the knowledge of people of how the social engineers work.

    Juan Pablo Añez
    N812

    By Anonymous Anonymous, at 11:27 AM  

  • SOCIAL ENGINEERING:

    In the field of computer security, social engineering is the practice of obtaining confidential information by manipulation of legitimate users. A social engineer will commonly use the telephone or Internet to trick people into revealing sensitive information or getting them to do something that is against typical policies. By this method, social engineers exploit the natural tendency of a person to trust his or her word, rather than exploiting computer security holes. ...

    shoulder surfing:

    Looking over a user's shoulder as they enter a password. This is one of the easiest ways of obtaining a password to breach system security. The practice is used wherever passwords, PINs, or other ID codes are used.

    password sniffing:

    If a hacker can't guess your password, there are other ways he/she can try to get it. One way which has become very popular is called ``password sniffing''.
    It turns out that most networks use what's known as ``broadcast'' technology. What that means is that every message that a computer on the network transmits can be read by any other computer on that network. In practice, all the computers except the recipient of the message will notice that the message is not meant for them, and ignore it.
    However, many computers can be programmed to look at every message on the network. If one does this, one can look at message which are not intended for you.

    VICTOR AÑEZ. N-812

    By Anonymous Anonymous, at 11:28 AM  

  • With regard to the definition of the social engineer, of my own words it consists of a person who is in charge to swindle to Internet users, can be By means telephone line or networs, in anyone of the cases this represents a threat for which we are usuary of Internet. In my opinion these are very intelligent people dedicated explicitamente to this office, are generally shut up people of very few friends because they must maintain confidentiality. Commonly they operate by means of expensive the telephone lines or to face with his victimas extracting key personal of his credit cards and systems, among others. This must be punished.

    Alejandro Rivera 16267815

    By Anonymous Anonymous, at 11:35 AM  

  • Social engineering is the practice of obtaining confidential information by manipulation of legitimate users. Since social engineering involves the human element of any attack.
    Social engineering concentrates on the weakest link of the computer security chain.
    One of the essential tools used for social engineering is a good memory for gathered facts. This is something that hackers and sysadmins tend to excel in, especially when it comes to facts relating to their field.
    Another dimension of the social psychology of fraud involves the differences between the victim's attitudes and beliefs about the person soliciting his money over the Internet and the criminal's attitudes and beliefs about his intended or actual victims.
    Phishing is a form of criminal activity using social engineering techniques. Phishers attempt to fraudulently acquire sensitive information, such as passwords and credit card details, by masquerading as a trustworthy person or business in an electronic communication.
    Frequently, social engineers will search dumpsters for valuable information, memorize access codes by looking over someone's shoulder (shoulder surfing), or take advantage of people's natural inclination to choose passwords that are meaningful to them but can be easily guessed. Security experts propose that as our culture becomes more dependent on information, social engineering will remain the greatest threat to any security system. Prevention includes educating people about the value of information, training them to protect it, and increasing people's awareness of how social engineers operate.
    The social engineering is a very common act at present. In my opinion, I have never seen any case of social engineering in Internet, though if I have known those that do these criminal acts in automatic cashiers. Also, according to what I could find out, one of the ways for these delinquents of obtaining information, it is across a telephonic line. I think that it is necessary to have intelligence and skill great, to be able to be this type of delinquent, but even like that this continues being a crime.
    Johanna Briceño. CI 16121331 N812

    By Anonymous Anonymous, at 11:37 AM  

  • FREDY GONZALEZ N-812.
    They can frequently be found in the Online Internet Gaming community.
    Insecure personal password policies amongst gamers will often give the unscrupulous user access to gamer’s other types of account.

    Users of Internet systems frequently receive messages that request password or credit card information in order to "set up their account" or "reactivate settings" or some other benign operation in what are called phishing attacks.
    Users of these systems must be warned early and frequently not to divulge sensitive information, passwords or otherwise, to people claiming to be administrators. In reality, administrators of computer systems rarely, if ever, need to know the user's password to perform administrative tasks.

    I am not in agreement with name that receive these people. they must be called to hacker social

    By Anonymous Anonymous, at 11:38 AM  

  • Jesus Parra C.I. 15.060.848
    Social engineering is the practice of obtaining confidential information by manipulation of legitimate users. A social engineer will commonly use the telephone or Internet to trick people into revealing sensitive information or getting them to do something that is against typical policies.
    Social engineering also applies to the act of face-to-face manipulation to gain physical access to computer systems.
    Another form of social engineering goes back to guessing your password. People who can find out things about you, can use that information to guess your password. For example, the names of your children, their birthdays or the license plate number on your car are all likely candidates for guessing as passwords. We point this out to reinforce the extremes to which hackers will go to guess your password.

    By Anonymous Anonymous, at 11:40 AM  

  • "Social engineering is the practice of obtaining confidential information by manipulation of legitimate users. A social engineer will commonly use the telephone or Internet to trick people into revealing sensitive information or getting them to do something that is against typical policies" This is a wikipedia´s definition. What i understand is this is about getting people to comply your wishes, hackers that use psychological tricks on legitimate users of a computer system, in order to obtain information he needs to gain access to the system. I guess what this people want is the same thing that any others hackers, gain unauthorized access to systems or information in order to commit fraud, network intrusion, industrial espionage, identity theft, or simply to disrupt the system or network. Typical targets include telephone companies and answering services, big-name corporations and financial institutions, military and government agencies, and hospitals. About the behavior of social engineers, they should be very kind, in order to gain the people´s trust. And they should think that are superiors, should feel like they can get whatever they want and manipulate to whoever be necessary. Miguel Pulgar, ID 17219216, n-812

    By Anonymous Anonymous, at 11:41 AM  

  • -Social engineering: is the practice of obtaining confidential information by manipulation of legitimate users. they use the telephone or Internet to trick people into revealing sensitive information or getting them to do something that is against typical policies, i mean, the art and science of getting people to comply to your wishes.an outside hacker’s use of psychological tricks on legitimate users of a computer system, in order to obtain information he needs to gain access to the system. A example of a social engineering attack is the use of e-mail attachments that contain malicious payloads, use the victim's machine to send massive quantities of spam.
    other term is Attack: The act of trying to bypass security controls on a computer system, resulting in an attempted penetration or an actual penetration. The fact that an attack is made does not necessarily mean that it will succeed. The degree of success depends on a vulnerability of the system or activity and the effectiveness of existing countermeasures.
    -story (Hacker Tactics)
    a few years back, a group of strangers walked into a large shipping firm and walked out with access to the firm’s entire corporate network. How did they do it? By obtaining small amounts of access, bit by bit, from a number of different employees in that firm. First, they did research about the company for two days before even attempting to set foot on the premises. For example, they learned key employees’ names by calling HR. Next, they pretended to lose their key to the front door, and a man let them in. Then they "lost" their identity badges when entering the third floor secured area, smiled, and a friendly employee opened the door for them. The strangers knew the CFO was out of town, so they were able to enter his office and obtain financial data off his unlocked computer. They dug through the corporate trash, finding all kinds of useful documents. In this case, the strangers were network consultants performing a security audit for the CFO without any other employees' knowledge. They were never given any privileged information from the CFO but were able to obtain all the access they wanted through social engineering.
    -Social Engineering by Phone:
    The most prevalent type of social engineering attack is conducted by phone. A hacker will call up and imitate someone in a position of authority or relevance and gradually pull information out of the user. Help desks are particularly prone to this type of attack. Hackers are able to pretend they are calling from inside the corporation by playing tricks on the PBX or the company operator, so caller-ID is not always the best defense.
    -Dumpster diving, also known as trashing, is another popular method of social engineering. A huge amount of information can be collected through company dumpsters. The LAN Times listed the following items as potential security leaks in our trash: “company phone books, organizational charts, memos, company policy manuals, calendars of meetings, events and vacations, system manuals, printouts of sensitive data or login names and passwords, printouts of source code, disks and tapes, company letterhead and memo forms, and outdated hardware.”
    -On-Line Social Engineering:The Internet is fertile ground for social engineers looking to harvest passwords. The primary weakness is that many users often repeat the use of one simple password on every account: Yahoo, Travelocity, Gap.com, whatever.

    alciro rodriguez
    17414567

    By Anonymous Anonymous, at 11:42 AM  

  • Social engineering is the practice of obtaining confidential information by manipulation of legitimate users. A social engineer will commonly use the telephone or Internet to trick people into revealing sensitive information or getting them to do something that is against typical policies. By this method, social engineers exploit the natural tendency of a person to trust his or her word, rather than exploiting computer security holes. It is generally agreed upon that “users are the weak link” in security and this principle is what makes social engineering possible (wikipedia), personal opinion "about that social event, social engineer are person that used to attack people using face to face encounter or sending e-mail with attachments that contain malicious contents. After earlier malicious e-mails this people can stole important information about bank accounts or credit card passwords it can use to buy article online wihtout permission of the account ouwner. that is a ilegal practice and few people are punished by the justice because this act. for example: "Kevin David Mitnick (born August 6, 1963) is a well-known former computer cyber thief. He was arrested by the FBI on February 15, 1995. Mitnick was convicted of wire fraud and of breaking into the computer systems of Fujitsu, Motorola, Nokia, and Sun Microsystems. He served five years in prison (four years of it pre-trial), 8 months of that in solitary confinement, and was released on January 21, 2000. During his supervised release, which ended on January 21, 2003, he was restricted from using any communications technology other than a landline telephone, although occasional exceptions were granted." (wikipedia)
    (writed by anthony corsi, a student of english VIII in urbe campus, my theacher in charge is patricia mendoza)

    By Anonymous Anonymous, at 11:46 AM  

  • Jorge Barrera 10.683.480 N812

    A social engineering is the art and science of getting people to comply your wishes. is the practice of obtaining confidential information by manipulation of legitimate users, uses different methods not necessarily for Internet or telephone if not in person. The typical targets include telephone companies and answering services, big-name corporations and financial institutions, military and government agencies, and hospitals.
    A social engineering is conducted by lone individuals, the aim of personal persuasion is not to force people to complete your tasks, but enhance their voluntary compliance with your request.
    Recommendations that must be had by this type of persons, we must have care with what we say and in front of whom we say it

    By Anonymous Anonymous, at 11:47 AM  

  • Luis Urdaneta
    C.I. 17461232

    Social Engineer is very interesting topic that i had never read before. They are very dangerous, because they obtain confidential information by manipulation of users, they use various methods such as telephone calls or internet or in person.

    After looking in internet i found out that, Shoulder Surfing is the way to obtain information using different direct observations techniques such as looking over someone's shoulder. This is very common in cybercafes or in crowded places because it's easy to stand next to someone and peak a little to obtain the confidential information. To prevent this, is recommended that you use your body to shield the information you write or the windows opened in the computer.

    The term Password sniffing means a technique that is used by a hacker to intercept confidential information, this is common in computer networks where occurs a lot of data transmition and email information, this hackers can intercept this emails and change it to his owns purpose.

    Finally to understand what a social engineer is, it's important to mention one of the most infamous social engineers in recent history: Kevin Mitnick. His behavior is very calm, friendly, proffesional and very tricky at the same time, he find flaws in the voicemail system and he use this to obtain confidential information of important industry. He was arrested in 1995 for 4 years.

    Thank you very much for read it teacher =).

    Luis Urdaneta
    17.461.232

    By Anonymous Anonymous, at 11:51 AM  

  • Edgar Arteaga CI: 15052630
    SECCION N-812

    SOCIAL ENGINEERING

    a person who illegally enter computers systems by having persuaded an authorized person to reveal id`s, passwords and confidential information.

    a social engineering attack is the use of e-mail attachments that contain malicious payloads (that, for instance, use the victim's machine to send massive quantities of spam). After earlier malicious e-mails led software vendors to disable automatic execution of attachments, users now have to explicitly activate attachments for this to occur. Many users, however, will blindly click on any attachments they receive, thus allowing the attack to work.

    The hackers themselves teach social engineering from a psychological point-of-view, emphasizing how to create the perfect psychological environment for the attack. Basic methods of persuasion include: impersonation, ingratiation, conformity, diffusion of responsibility, and plain old friendliness. Regardless of the method used, the main objective is to convince the person disclosing the information that the social engineer is in fact a person that they can trust with that sensitive information. The other important key is to never ask for too much information at a time, but to ask for a little from each person in order to maintain the appearance of a comfortable relationship.

    By Anonymous Anonymous, at 11:52 AM  

  • Yorneilly, Briceño
    C.I:17.231.155
    Seccion: N-812

    For me a social engeenier it's like a hacker, because they manipulate information of other persons. They can find information about the person over the phone and internet tricking people into revealing sensitive information or personal information who can they can use for reveal passwords of computers, credits cards, bank acounts and somethings like that.

    Shoulder surfing: is a direct observation technique, such as looking over someone's shoulder to get information.
    Password sniffing: it means that every message that a computer in a network transmits can be read by any other computer on that netwok.

    The behavior is interrogating and misterious.

    One thing that you can do for avoid hackers is don't trus in nobuddy on the net, don't read e-mails of people that you don't know, and don't give any credit card numbers on a page.

    By Anonymous Anonymous, at 11:54 AM  

  • Social engineering is the art and science of getting people to comply to your wishes. They make you to believe that they are your best friends, they talk to you by computer or by face to face.

    After that meke you believe it they answer you to make buisness together, after that they take your money and go away, the way to avoid it is before you created a company toguether you should know everything about the other person.

    In my opinion you always should have malicia about everybody, and never give all your trust because you don`t know who can be a social engineer who make your live miserable.

    Beatriz Vicierra
    15405604

    By Anonymous Anonymous, at 11:54 AM  

  • in one of web sities i founded was said, is a art or science of
    getting people to comply with your wishes, for break security by interactions with people.

    The attacker will try to convince the victim for reveal sensitive information or carry out an act which is contrary to the organisation’s policies.

    Social engineers use several avenues of attack.

    Via the telephone
    this is the common form of attacker to approach the people.

    Face to face
    A targeted member of staff will be approached and manipulated, tricked or coerced into giving support or information.

    an the last one is Via e-mail
    Are the most common forms of social engineering attack via email. Emails are created to look like a legitimate.
    by Rafael Zambrano.

    By Anonymous Anonymous, at 11:55 AM  

  • Social engineering is the practice of obtaining confidencial information by manipulation of legitimate user. An outside hackre´s use of psicological tricks
    on legitimate users of computer system, in order to obtain information he needs to gains access to the system, or gettin needed information (for example,a password) form a person rather than breaking in to a system.
    Assertion or implications of authority can be highly effective,especially is used on a low-level or newly recruited member of staff; though conversation the attacker attempts to probe for a personal connection; fo example, suporting the same football club, sharing hobbies or activities or claiming to come from the same area. it is a natural tendency for human beings to associate with people who like the same things as them or who are similar to them. ANA BASABE N822

    By Anonymous Anonymous, at 11:55 AM  

  • Nathalie Bonilla CI:16782621
    MY OPINION

    It´s really sad that a problem like social engineering is happing right now because im studying really hard to be a great engineer and i will feel so embarrased if people judge me like a criminal, because social engineers steal money from people through the internet. One of their procedures is to offer a service and then they aks for the credict card number so in this way they can steal the money. Most of them look very professional and friendly and sometimes they offer their services face to face to be more convincing .Basically, social engineering is the art and science of getting people to comply to your wishes. It is not a way of mind control, it will not allow you to get people to perform tasks wildly outside of their normal behaviour and it is far from foolproof.
    Security professionals are constantly being told that security through obscurity is very weak security. In the case of social engineering it is no security at all. It is impossible to obscure the fact that humans use the system or that they can influence it, because there isn't a computer system on earth that does not have humans as a part of it. Finally i think that this is called social engineers because they are really intelligent and smart people as real engineers are.
    Almost every human being has the tools to attempt a social engineering attack, the only difference is the amount of skill used when making use of these tools.However, most social engineering is conducted by lone individuals and so the social pressure and other influencing factors have to be constructed by creating a believable situation which the target feels emmersed in.

    By Anonymous Anonymous, at 11:56 AM  

  • mary carla chacon
    c.I. 13.371.971

    For me a social engineering in the practice of obtaining confidential information by manipulation of legitimate users. Asocial engineer will commonly use the telephone or internet to trick people into revelaing sensitive information or getting them to do something that is against typical policies. Bey this method, social engineers exploit the natural tendency of a person to trust his or her word, rather than exploiting computer security holes. It is generally agreed upon that users are the weak link in security and this principle is what mekes social engineering possible.
    A contemporary example of a social engineering attack is the use of
    e-mail attachments that contain malicious payloads (that, for instance, use the victim's machine to send massive quantities of spam).After earlier malicious
    e-mails led software vendors to disable aumatic execution of e-mail
    attachments, users now have to explicitly activate attachments for this to occur. Many users, however, will blindly click on any attachments they receive, thus allowing the attack to work.

    By Anonymous Anonymous, at 11:56 AM  

  • Cesar Morales C.I 15117403 secion n812

    The Social Engineer is the person who looks for the confidential information of different persons and uses different ways, they can look for the way of violating the safety measures, Nevertheless, practically the law he/she informs and the government they have the effect of changing the behavior and as one can he/she was considering, " one social ingeniería " the prohibitions of murder, violation, suicide and the fact of throwing residues in excessive places they are all the politics destined to discourage the behaviors that are perceived as undesirable.

    A form of social engineering often can be found in the community of Game In Internet line. The treatment of friendship with with a user with the intention of starting to account passwords and spirited numbers of series

    By Anonymous Anonymous, at 11:57 AM  

  • Social engineering is a term that describes a non-technical kind of intrusion that relies heavily on human interaction and often involves tricking other people to break normal security procedures. A social engineer runs what used to be called a "con game". For example, a person using social engineering to break into a computer network would try to gain the confidence of someone who is authorized to access the network in order to get them to reveal information that compromises the network's security. They might call the authorized employee with some kind of urgent problem; social engineers often rely on the natural helpfulness of people as well as on their weaknesses. Appeal to vanity, appeal to authority, and old-fashioned eavesdropping are typical social engineering techniques.
    Social engineering is a concept in political science that refers to efforts to influence popular attitudes and social behavior on a large scale, whether by governments or private groups. In the political arena the counterpart of Social engineering is: Political engineering.
    For various reasons, the term has been imbued with negative connotations. However, virtually all law and governance has the effect of changing behavior and can be considered "social engineering" to some extent. Prohibitions on murder, rape, suicide and littering are all policies aimed at discouraging perceived undesirable behaviors. In British and Canadian jurisprudence, changing public attitudes about a behaviour is accepted as one of the key functions of laws prohibiting it. Governments also influence behavior more subtly through incentives and disincentives built into economic policy and tax policy, for instance, and have done so for centuries.

    A social engineer will commonly use the telephone or Internet to trick people into revealing sensitive information or getting them to do something that is against typical policies. By this method, social engineers exploit the natural tendency of a person to trust his or her word, rather than exploiting computer security holes. It is generally agreed upon that “users are the weak link” in security and this principle is what makes social engineering possible.
    A contemporary example of a social engineering attack is the use of e-mail attachments that contain malicious payloads (that, for instance, use the victim's machine to send massive quantities of spam). After earlier malicious e-mails led software vendors to disable automatic execution of e-mail attachments, users now have to explicitly activate attachments for this to occur. Many users, however, will blindly click on any attachments they receive, thus allowing the attack to work.
    Contrary to popular belief, it is often easier to hack people than send mail. But it takes far less effort to have employees who can prevent and detect attempts at social engineering than it is to secure any Unix system.

    Sysadmins don't let the human link in your security chain let your hard work go to waste. And hackers don't let Sysadmins get away with weak links, when it is their chains that are holding your data.

    Danilo Vargas 15.435.345 N-812

    By Anonymous Anonymous, at 1:29 PM  

  • THE SOCIAL ENGINEERING.


    • Definition:

    These attacks are mounted by people, who enter the information systems; the Social engineering is the art and science of getting people to comply with your wishes. It is not a way of mind control, you field of computer security, a social engineer will commonly use the telephone or Internet to trick people into revealing sensitive information or getting them to do something that are against typical policies.
    The hacker will claim to need the password for some important system administration work, and ask you to email it to him/her.
    This person is dangerous, never him to facilitate information because this people single want to you to rob and to manipulate your information.
    it is necessary to have much well-taken care of because these people have tricks so that your him proportions the information that needs.
    You do not speak with people of who you do not feel trusted and never have you revealed information

    By: Sherwin Alvarado
    T- N822

    By Anonymous Anonymous, at 1:44 PM  

  • The engineer is a person that has many quality, like creative, ingenious and other things very important, that make they a great and social engineers. The Social Engineering consist in the manipulate people, who voluntarily make acts that normally not to do. A social engineer will commonly use the telephone or Internet to trick people into revealing sensitive information or getting them to do something that is against typical policies.
    The one thing that everyone seems to agree is that social engineering is generally a hacker’s clever manipulation of the natural human tendency to trust.
    The goals of the social engineering are same as traditional hacking. But by social engineering hackers got these goals by implementing social skills and exploiting human tendencies. By social engineering crackers are not the mind controllers of the victim. Victim will not do the things out of his normal behavior. He will perform the usual acts but unconsciously he becomes the asset for cracker. Crackers are exploiting the nature of human beings. Most brilliant crackers of the day study the human psychology with same effort and attention as they learn new bugs in most secure operating systems. They will consider/study all the possibilities according to the nature of attack being performed.
    Since social engineering involves the human element of any attack, it's important to get into the head of the hacker and understand her motivation. Historically, the motivation has been intellectual challenge, bragging rights, access to sensitive information, simple curiosity, or our biggest fear - malicious intent. By knowing why we are at risk, we can better protect ourselves from the foolish things we do, thereby allowing social engineers to exploit us.yorlany leon 17461977

    By Anonymous Anonymous, at 5:09 PM  

  • the social engineering used to be a dirty wayto take information from a company.today is a hacker tactic to know what other organizations are doing in order to aplly their methods in your company. there are people hired today to make that job ."and well paid" by the way.
    "The basic goals of social engineering are the same as hacking in general: to gain unauthorized access to systems or information in order to commit fraud".
    not only computer information can be taken by a social engineer, they also can look for human resources, working methods, etc...
    ELISA MENDEZ
    1:10 PM

    By Anonymous Anonymous, at 2:48 PM  

  • Hello profe Patricia!!
    beutifull name by the way! jajaj! REALLY!
    A social engineer to me is just like any type of thief but with an extrabagant name! Now that tecnology is part of our daily life, thiefs find ways to use tecnology in there advantage to! there is nothing more to it!!!!! He is a thief who tricks his victims by using tecnology to get information that he could use to steal anything from them later!
    PROFE.... nice asingment! see ya in class!
    peace out!!!
    Juan Rivera. A.K.A.(CARACO)

    By Anonymous Anonymous, at 9:13 PM  

  • Ok guys I’ve been very pleased with your investigation and everybody demonstrated in the exam how your research was... Congrats!!, you did a pretty good job and I hope you’ve really learned and enjoyed working with the topic.
    I’ll see you around and KEEP ON the good work!!

    By Blogger PatMendoza, at 6:39 PM  

Post a Comment

<< Home