Hacking: the must-have business tool

  • From: Educational CyberPlayGround <admin@xxxxxxxxxxxxxxx>
  • To: nethappenings@xxxxxxxxxxxxx
  • Date: Thu, 28 Oct 2004 12:25:50 -0400

**************************************************************
Educational CyberPlayGround Community 
http://www.edu-cyberpg.com/

ECP Mailing Lists Subscribe - Unsubscribe - Email Preferences
http://www.edu-cyberpg.com/Community/index.html
**************************************************************
NetHappenings Mailing List ©1993
<http://www.edu-cyberpg.com/Community/NetHappenings.html>

Advertise on Nethappenings the oldest K12 Mailing List 
<http://www.edu-cyberpg.com/Community/Subguidelines.html>
**************************************************************

**************************************************************************
ActiveServers, Inc ServerFarm, Co-Location, Point to Point Wireless,
Consulting, and Windows dotnet Servers. Premium Hosting Solutions
on multiple OC-48 redundant connections.
Visit http://activeservers.com
**************************************************************************

Date: Thu, 28 Oct 2004 03:32:30 -0500 (CDT)
Hacking: the must-have business tool
http://www.theregister.co.uk/2004/10/26/competitive_hacking/

By Mark Rasch
SecurityFocus
26th October 2004

Your competitor has a wildly successful web-based tool which is being
used by many of your customers. Do you (A) give up and get out of the
business; (B) set up a team of product developers to make a competing
product; or (C) hack into the competitor's website, steal the code,
and for good measure hire their critical employees to develop an exact
duplicate of their website. If you answered (C) then congratulations
and welcome to the new world of competitive hacking.

On 15 October, the United States Court of Appeals for the Ninth
Circuit in Seattle, Washington had to deal with the case of two
competing websites geared at helping long-distance truckers take on
additional revenue-producing load to avoid the unprofitable practice
of "dead-heading" - driving a truck that was less than full. One
company, Creative Computing, created a successful website called
Truckstop.com to help match truckers with loads. In the words of the
court, a second company, Getloaded.com, "decided to compete, but not
honestly".

Getloaded.com used many mechanisms to acquire data from the
Truckstop.com website. Initially, they just copied the most current
lists of unmatched drivers and loads. When Truckstop started using
user IDs and passwords, Getloaded did the same. Reasoning correctly
that truckers using both sites would create the same userid's and
passwords, Getloaded officials logged into Truckstop's site using
their customers' IDs. Then they registered a defunct company as a
subscriber as another route to getting access to the data.


snip


<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>
EDUCATIONAL CYBERPLAYGROUND 
http://www.edu-cyberpg.com

Net Happenings, K12 Newsletters, Network Newsletters
http://www.edu-cyberpg.com/Community/index.html

FREE EDUCATION VENDOR DIRECTORY LISTING
http://www.edu-cyberpg.com/Directory/default.asp

HOT LIST OF SCHOOLS ONLINE
http://www.edu-cyberpg.com/Schools/default.asp

Educational CyberPlayGround Services
http://www.edu-cyberpg.com/PS/Home_Products.html
<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>

Other related posts:

  • » Hacking: the must-have business tool