June 28, 2000
      
                  
        
  Author(s)
  Peter M. Mell,   John P. Wack
 
       
            
    
    
        [For the latest information on vulnerabilities, see the National Vulnerability Database, nvd.nist.gov] It seems that every week, computer security organizations are issuing press releases concerning the latest hacker attack. Some sound dangerous, like the