Internet Attack Methods
-  Exploitation of vulnerabilities in vendor programs. 
 -  Exploitation of cgi-bin vulnerabilities. 
 -  Email bombing, spamming and relaying through other sites. 
 -  Exploitation of misconfigured anonymous FTP and web servers. 
 -  Exploitation of named/BIND vulnerabilities. 
 -  Exploitation of mail transfer agents and mail readers. 
 -  Denial of Services (DoS) attacks using various methods. 
 -  Sending hostile code and attack programs as mail attachments or browsed
page contents.