For example in Unix, can set up a .rhosts file to allow logins from one machine to another, without having to retype password
Also allows rsh - command to do an operation on a remote node.
Combination means: send rsh request, pretending to be from the trusted user to install a .rhosts file granting imposter full access.
Similarly, if have open X windows connectionover the network, can send message appearing to be key strokes from window but really is commands to allow imposter access. If no encryption, no way to stop this
Trojan Horse appears helpful, but really does something harmful
Idea was to build up a small bit at a time. What happens to partial pennies from interest on bank and mortgage accounts?
Bank keeps it. Re-program so that partial pennies go to programmers account. Millions of customers adds up quickly. See Internet Worm later...