PPT Slide
Trend in Hacking Technology
e-Commerce Vulnerabilities
Losses
Y2K Challenges
Malicious Code Insertions
Y2K “event” Exploitations
Most likely Occurrences
Contact Information