While the bin remove payload is a favourite of many authors, there are other traditional attacks which are not as overt in their destruction. These other attacks are more important because they bend the operation of the system to the purposes of the attacker while not revealing themselves to the system operator. Attacks of this form include the appending of an account record to the password file, copying the password file to an offsite email address for leisurely cracking, and modification of the operating system to include back doors or cause the transfer of money or property. It is extremely simple to email valuable information offsite in such a manner as to insure that the recipient cannot be traced or located. Some of these methods are path dependent, however, the path selected is at the discretion of the attacker.