Scientific American October 1998How Hackers Break In. . . and how they are CaughtPort scanners, core dumps and buffer overflows are but a few of the many weapons in every sophisticated hacker's arsenal. Still, no hacker is invincibleBy Carolyn P. Meinel on October 1, 1998