Hackers access the Windows Name/Finger communications protocol using it against itself to infiltrate and make off with data. John Page discovered a sneaky, unorthodox way hackers use the Name/Finger network communication protocol to exfiltrate files from a network. The Windows Name/Finger communications protocol uses a rudimentary command … [Read more...] about Hackers access the Windows Name/Finger Communications