Knowledge (XXG)

Dan Farmer

Source 📝

259: 115: 27: 68: 408:
terminated Farmer's employment. However, contrary to popular opinion, SATAN did not function as an automatic hacking program that undermined network security. Rather, it operated as an audit on network security that identified vulnerabilities and made suggestions to help prevent them. No information
635: 393: 316: 640: 143: 123: 89: 76: 417: 378: 310: 645: 630: 566: 234: 216: 54: 530: 650: 197: 147: 139: 169: 583:
Ortiz, Catalina (4 April 1995). "Computer Program to Find Security Holes Bedevils Some Experts". The Associated Press.
558: 40: 128: 401: 176: 132: 81: 416:
He co-developed the Titan vulnerability scanner with Brad Powell and Matt Archibald, which they presented at the
479: 409:
about how security vulnerabilities could be exploited was provided by the tool. Within a few years, the use of
428: 439: 183: 625: 410: 397: 382: 339: 165: 620: 463: 424: 154: 562: 396:(SATAN). Due to a misunderstanding of SATAN's capabilities, when it was first published, some 370: 331: 298: 405: 366: 350: 346: 46: 190: 438:
Farmer co-founded Elemental Security with Dayne Myers, and served as the corporation's
392:(a Dutch programmer and physicist) developed a second vulnerability scanner called the 362: 614: 389: 374: 413:
such as SATAN became an accepted method for auditing computer and network security.
377:, one of his professors, helped him to start the project. The software, called the 258: 385:
designed to identify security weaknesses in one part of a Unix operating system.
509: 335: 604: 404:
would use it to identify and break into vulnerable computers. Consequently,
67: 486: 594: 343: 153:
from the article and its talk page, especially if potentially
108: 61: 20: 607:, episode of NetCafe containing an interview with Dan Farmer 636:
Chief technology officers of computer security companies
599: 16:
American computer security researcher and programmer
418:
Large Installation System Administration Conference
304: 294: 286: 268: 249: 423:Farmer and Venema collaborated again to develop a 394:Security Administrator Tool for Analyzing Networks 317:Security Administrator Tool for Analyzing Networks 460:Profile: Dan Farmer – From Satan to Zen 381:(COPS), comprises several small, specialized 8: 400:and law enforcement personnel believed that 55:Learn how and when to remove these messages 257: 246: 146:about living persons that is unsourced or 435:(2005), a book about computer forensics. 235:Learn how and when to remove this message 217:Learn how and when to remove this message 338:who was a pioneer in the development of 92:of all important aspects of the article. 451: 88:Please consider expanding the lead to 7: 330:(born April 5, 1962) is an American 379:Computer Oracle and Password System 311:Computer Oracle and Password System 641:American chief technology officers 14: 480:"login interview with Dan Farmer" 36:This article has multiple issues. 113: 66: 25: 80:may be too short to adequately 44:or discuss these issues on the 90:provide an accessible overview 1: 124:biography of a living person 559:Addison-Wesley Professional 531:"LISA 98 Technical Program" 361:Farmer developed his first 151:must be removed immediately 667: 256: 646:Computer science writers 631:Purdue University alumni 651:Silicon Graphics people 440:chief technical officer 431:, and later coauthored 508:Palmer, C. C. (2001). 411:vulnerability scanners 398:network administrators 383:vulnerability scanners 340:vulnerability scanners 138:Please help by adding 429:The Coroner's Toolkit 458:Gibbs, W. W. (1997) 388:In 1995, Farmer and 144:Contentious material 517:IBM Systems Journal 464:Scientific American 555:Forensic Discovery 433:Forensic Discovery 425:computer forensics 263:Dan Farmer in 2007 510:"Ethical Hacking" 371:Purdue University 351:computer networks 347:operating systems 332:computer security 325: 324: 299:Purdue University 245: 244: 237: 227: 226: 219: 201: 127:needs additional 107: 106: 59: 658: 584: 570: 552: 546: 545: 543: 541: 527: 521: 520: 514: 505: 499: 498: 496: 494: 484: 476: 470: 456: 420:(LISA) in 1998. 367:computer science 282: 278: 276: 261: 247: 240: 233: 222: 215: 211: 208: 202: 200: 159: 140:reliable sources 117: 116: 109: 102: 99: 93: 70: 62: 51: 29: 28: 21: 666: 665: 661: 660: 659: 657: 656: 655: 611: 610: 591: 582: 579: 574: 573: 553: 549: 539: 537: 529: 528: 524: 512: 507: 506: 502: 492: 490: 489:. December 2014 482: 478: 477: 473: 457: 453: 448: 365:while he was a 359: 357:Life and career 334:researcher and 295:Alma mater 280: 274: 272: 264: 252: 241: 230: 229: 228: 223: 212: 206: 203: 160: 158: 137: 118: 114: 103: 97: 94: 87: 75:This article's 71: 30: 26: 17: 12: 11: 5: 664: 662: 654: 653: 648: 643: 638: 633: 628: 623: 613: 612: 609: 608: 602: 597: 590: 589:External links 587: 586: 585: 578: 575: 572: 571: 547: 535:www.usenix.org 522: 500: 471: 450: 449: 447: 444: 363:software suite 358: 355: 323: 322: 321: 320: 314: 306: 305:Known for 302: 301: 296: 292: 291: 288: 284: 283: 270: 266: 265: 262: 254: 253: 250: 243: 242: 225: 224: 148:poorly sourced 121: 119: 112: 105: 104: 84:the key points 74: 72: 65: 60: 34: 33: 31: 24: 15: 13: 10: 9: 6: 4: 3: 2: 663: 652: 649: 647: 644: 642: 639: 637: 634: 632: 629: 627: 626:Living people 624: 622: 619: 618: 616: 606: 603: 601: 598: 596: 593: 592: 588: 581: 580: 576: 568: 567:0-201-63497-X 564: 560: 556: 551: 548: 536: 532: 526: 523: 518: 511: 504: 501: 488: 481: 475: 472: 468: 465: 461: 455: 452: 445: 443: 441: 436: 434: 430: 427:suite called 426: 421: 419: 414: 412: 407: 403: 399: 395: 391: 390:Wietse Venema 386: 384: 380: 376: 375:Gene Spafford 372: 368: 364: 356: 354: 352: 348: 345: 341: 337: 333: 329: 318: 315: 312: 309: 308: 307: 303: 300: 297: 293: 289: 285: 281:(age 62) 271: 267: 260: 255: 248: 239: 236: 221: 218: 210: 199: 196: 192: 189: 185: 182: 178: 175: 171: 168: –  167: 163: 162:Find sources: 156: 152: 149: 145: 141: 135: 134: 130: 125: 120: 111: 110: 101: 98:February 2015 91: 85: 83: 78: 73: 69: 64: 63: 58: 56: 49: 48: 43: 42: 37: 32: 23: 22: 19: 577:Bibliography 554: 550: 538:. Retrieved 534: 525: 516: 503: 491:. Retrieved 474: 466: 459: 454: 437: 432: 422: 415: 387: 360: 327: 326: 279:5 April 1962 231: 213: 204: 194: 187: 180: 173: 166:"Dan Farmer" 161: 150: 133:verification 126: 95: 79: 77:lead section 52: 45: 39: 38:Please help 35: 18: 621:1962 births 469:(4), 32-34. 369:student at 287:Nationality 615:Categories 446:References 336:programmer 328:Dan Farmer 275:1962-04-05 251:Dan Farmer 207:April 2020 177:newspapers 41:improve it 595:Home page 373:in 1989. 129:citations 82:summarize 47:talk page 540:29 April 493:19 March 290:American 155:libelous 605:Hackers 402:hackers 319:(SATAN) 191:scholar 565:  487:Usenix 313:(COPS) 193:  186:  179:  172:  164:  519:: 40. 513:(PDF) 483:(PDF) 198:JSTOR 184:books 122:This 600:Blog 563:ISBN 542:2023 495:2017 349:and 344:Unix 342:for 269:Born 170:news 131:for 467:276 406:SGI 617:: 561:. 557:, 533:. 515:. 485:. 462:, 442:. 353:. 277:) 142:. 50:. 569:. 544:. 497:. 273:( 238:) 232:( 220:) 214:( 209:) 205:( 195:· 188:· 181:· 174:· 157:. 136:. 100:) 96:( 86:. 57:) 53:(

Index

improve it
talk page
Learn how and when to remove these messages

lead section
summarize
provide an accessible overview
biography of a living person
citations
verification
reliable sources
Contentious material
poorly sourced
libelous
"Dan Farmer"
news
newspapers
books
scholar
JSTOR
Learn how and when to remove this message
Learn how and when to remove this message

Purdue University
Computer Oracle and Password System
Security Administrator Tool for Analyzing Networks
computer security
programmer
vulnerability scanners
Unix

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.