>Is anyone aware of any actual break-in that was accomplished by "taking
>over" a PC (running DOS or Windows or Windows for Workgroups or NT) and then
>launching an attack from there? I don't mean dialling in to a modem on the
>PC, but an attack that could have been prevented by a better firewall.
Yes, the "dutch hacker" incident in which tracer.army.mil was taken over.
Remember the "Dan Quayle" account ? Tracer was a PC running what looked like
XENIX. I have a copy of the video made of the incident. The A-6s then used
files found on tracer to springboard onto other systems AFAIR.