Geometry.Net - the online learning center
Home  - Book_Author - Hackers The
e99.com Bookstore
  
Images 
Newsgroups
Page 4     61-80 of 195    Back | 1  | 2  | 3  | 4  | 5  | 6  | 7  | 8  | 9  | 10  | Next 20
A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

         Hackers The:     more books (99)
  1. Philosophical Foundations of Neuroscience by M. R. Bennett, P. M. S. Hacker, 2003-04-25
  2. The Time Hackers by Gary Paulsen, 2006-08-22
  3. The Bedford Handbook with 2009 MLA and 2010 APA updates by Diana Hacker, Nancy Sommers, 2009-12-16
  4. Who Is Shayla Hacker by Evan Kilgore, 2007-06-15
  5. Kingpin: How One Hacker Took Over the Billion Dollar Cyber Crime Underground by Kevin Poulsen, 2011-02-22
  6. The Best of 2600, Collector's Edition: A Hacker Odyssey by Emmanuel Goldstein, 2009-02-03
  7. The Happy Hacker: A Guide to (Mostly) Harmless Computer Hacking by Carolyn Meinel, 2001-12
  8. The Canon Camera Hackers Manual: Teach Your Camera New Tricks by Berthold Daum, 2010-05-17
  9. Firewalls and Internet Security: Repelling the Wily Hacker (2nd Edition) by William R. Cheswick, Steven M. Bellovin, et all 2003-03-06
  10. Webster's New World Hacker Dictionary by Bernadette Schell, Clemens Martin, 2006-09-05
  11. Neuroscience and Philosophy: Brain, Mind, and Language by Maxwell Bennett, Daniel Dennett, et all 2009-03-04
  12. Anti-Hacker Tool Kit, Third Edition by Mike Shema, Chris Davis, et all 2006-02-09
  13. The Hacker's Handbook: The Strategy Behind Breaking into and Defending Networks by Susan Young, Dave Aitel, 2003-11-24
  14. Hacker Culture by Douglas Thomas, 2003-06-02

61. CNN - Hackers Train Sights On All Federal Web Sites - June 2, 1999
CNN
http://www.cnn.com/TECH/computing/9906/02/feds.hackers/index.html
[an error occurred while processing this directive]
MAIN PAGE
WORLD ASIANOW U.S. ... news quiz
CNN WEB SITES: TIME INC. SITES: Go To ... Time.com People Money Fortune EW MORE SERVICES: video on demand video archive audio on demand news email services ...
pagenet

DISCUSSION: message boards chat feedback
SITE GUIDES: help contents search
FASTER ACCESS: europe japan
WEB SERVICES:
Main Page
Bracing for Cyberwar Hacking Primer Scenes from the 'Hacker Underground' ... Related Sites
Hackers train sights on all federal Web sites
RELATED VIDEO
CNN's Marsha Walton reports on the continuing attacks on government Web sites by hackers
Windows Media
ALSO
Feds warn hackers will be prosecuted; pro-Mitnick protest planned Sign up for the Computer Connection email service For more computing stories June 2, 1999 Web posted at: 2:47 p.m. EDT (1847 GMT) From Correspondent Marsha Walton (CNN) The threat has been made. Some hacker groups angry with the FBI say every site on the Internet that ends in ".gov" will be a target. That means every U.S. government Web site, from the Senate to NASA to the Fish and Wildlife Service will have to beef up security. The FBI site has been inaccessible for most of the past week, the Department of the Interior and the General Services Administration are two of the latest to be defaced.

62. ] DOT HACKERS || A Project .hack Site [
Version 3.0 News @ 0454 PM. Greetings and welcome back to version3.0 of dot Hackers! It s been a while since there was a good update.
http://www.blackwings.net/hack/index.php
.. Navigation;
Introduction

Timeline

Glossary
Seiyuu List

The World BBS

.hack//SIGN Story
Characters

Episodes

Gallery

.hack//liminality Story Characters Gallery .hack//udeden Story Characters Episodes Manga .hack//game Game Details Story Characters .hack//others Novels Other Books multimedia Scans Wallpaper Music Winamp Skins ... Lyrics .. Recent Updates; Latest News; [ Jan 14, 2004 ] News 04:54 PM Greetings and welcome back to version 3.0 of [dot] hackers! It's been a while since there was a good update. I present you with a revamped .hackers with up-to-date information and without all that green-ness of the last version. ;D On a side note, thanks to those who reported strange little sites on the web taking my information and images. Shame on them ...and you (if you're one of them, you know who you are!). archives: january 2004 august 2003 june 2003 april 2003 ... may 2002 .. .hack?; .hack (pronounced as dot-hack) is Bandai's most major project yet. It consists of an anime TV series, comic, exclusive PS2 game and OVA done by a powerful team, composed of Kazunori Ito, Kouichi Mashimo and Yoshiyuki Sadamoto. .. Releases;

63. HNSG
Anarchy, HAcking, Phreaking files for newbies.
http://hnsg.net/

64. Hacker - Wikipedia, The Free Encyclopedia
hat type of activity. How some Hackers define themselves. The followingis and electronics tinkerers in the mid1950s. Notable Hackers.
http://en.wikipedia.org/wiki/Hacker
Hacker
From Wikipedia, the free encyclopedia.
A hacker is anyone who enjoys the intellectual challenge of creatively overcoming or circumventing limitations, primarily in their fields of interest, namely programming or electrical engineering . As will be discussed below, there is a trend in the popular press to use the term to describe computer criminals (which some call crackers ), and others, whose actions run afoul of various governments. This trend annoys some old-school computer/technology enthusiasts, although not all old-school hackers - some of them, like Steve Wozniak , hacked regardless of whether their activities were legal or illegal. Table of contents 1 Hacker History Begins
1.1 "Hacker"

2 Hacker: Brilliant programmer

3 Hacker: criminalized by government
...
edit
Hacker History Begins
edit
"Hacker"
Among ham radio fans in the 1950s, hacking meant creatively tinkering to improve performance. It was a term borrowed from Anglo-American riding culture, where "hacking" (as opposed to fox-hunting ) meant riding about informally, to no particular purpose. Compare "hacking jacket". On the U.S. East Coast in the mid-1950s, a car could be substituted for a horse, and hacking was a precursor to cruising.

65. Transportation Site Knocked Offline By Hackers
CNN
http://cnn.com/2001/TECH/internet/05/01/railroad.hack.ap/index.html

66. Why Hackers Are A Step Ahead Of The Law | CNET News.com
Why Hackers are a step ahead of the law The Internet has bred an elite classof computer criminals who are organized, well funded and far more
http://news.com.com/2009-1017_3-912708.html
CNET
News.com
E-mail alerts! Sign up now by company topic , or keyword Get News around the Web (beta)
By Greg Sandoval
Staff Writer, CNET News.com
May 14, 2002, 4:00 a.m. PT The nightmare for Ecount, an online gift certificate service, began last year when a hacker broke in to the company's system and stole personal information belonging to its customers. Nine months later, the criminal is still at large. The thief has brazenly taunted executives with repeated e-mails while staying ahead of investigators, deftly wiping away his electronic fingerprints and covering his tracks at every turn. "We're sick to death of hearing from him," Ecount Chief Executive Matt Gillin said of the intruder, who has offered to return the information for a fee. Although law enforcement agencies are quick to trumpet their occasional victories against cybercriminals, they are rarely able to track down hackers sophisticated enough to pull off such complicated heists. Few hackers of this caliber are arrested, and fewer still spend time behind bars. The resulting frustration for investigators, companies and consumer victims raises a question that has persisted for years: Why are hackers able to elude capture so easily? The answer, according to security analysts and fraud investigators, is that the Internet has bred an elite class of criminals who are organized, well funded and far more technologically sophisticated than most law enforcement officials.

67. Hacker's World Portal
Links to hacking history, cryptology, censorship, international hacking groups, news, publications, security, weekly features.
http://www.geocities.com/hackersworldportal/
Hackers World Portal is for informational purposes only. We pride ourselves in the sharing of knowledge. We do not believe in unwarranted malicious attacks, and this is not the place for such activities. SECURITY /ANONYMITY- UPDATES CENSORSHIP PUBLICATIONS ... TOOLS ACCESS SCAN INITIATED
PLEASE STAND BY
NEWS Some have theorized that this site is merely a front for another organization and have requested info. To those of you, you will be contacted. Some of you have access to our mirror site and you still have the same rights and priviledges. Are all movies about computers lame?- Essay by Jim Leonard Latest Defacements
Cyber Criminals Most Wanted

Instant Hacking with Python
BREAKING NEWS WEEKLY FEATURES LINKS
No portion or content of this site may be rewritten, redistributed, republished or used in any manner. CONTACT US HACKERS CHALLENGE
Secure Computing is offering a reward of $50,000 (which goes up one cent every second until it reaches $100,000) to get past their "Sidewinder" firewall and "Safeword" auth server and retrieve a file named 'secret.txt' stored on one of their machines. The winner also receives a Sidewinder leather jacket ("oooh") and bragging rights ("ahhh.."). So far there's been 19839 attacks with no success... more details continue....
http://www.challenge.securecomput

68. Microsoft To Offer Bounty On Hackers | CNET News.com
Microsoft to offer bounty on Hackers img src=http//ii.com.com/cnwk.1d/i/ne/hdrs/highimpact_fd1.jpgwidth=57 height=30 border=0 align=left / The software
http://news.com.com/2100-7355_3-5102110.html
CNET
News.com
E-mail alerts! Sign up now by company topic , or keyword Get News around the Web (beta)
Microsoft to offer bounty on hackers
Last modified: November 4, 2003, 3:04 PM PST By Robert Lemos
Staff Writer, CNET News.com
Microsoft will work with law enforcement to track down writers of worms, viruses and other malicious code, and is ponying up $5 million to fund the search. As first reported by CNET News.com, the initiative's first two bountiesto the tune of $250,000 eachwill be for information leading to the arrest and conviction of the people responsible for releasing the MSBlast worm and Sobig virus, both of which wreaked havoc online over the summer. News.context
What's new:
Microsoft sets aside $5 million to fund the search for those who released the MSBlast worm and the Sobig virus. Bottom line:
The initiative marks the latest move by Microsoft and law enforcement to curtail attacks that plague the Internet. Track the players Microsoft executives were joined by representatives from the FBI, the Secret Service and Interpol at a press conference Wednesday that announced the new fund.

69. Computer Hacking And Ethics
Paper about developing ethics in teenage Hackers.
http://www.cs.berkeley.edu/~bh/hackers.html
Computer Hacking and Ethics
Brian Harvey
University of California, Berkeley [A slightly different version of this paper was written for the ``Panel on Hacking'' held by the Association for Computing Machinery in April, 1985. Thanks to Batya Friedman, Donn Parker, and Carter Sanders for their comments on early drafts.] [Neal Patrick] said he and his friends, who named themselves the ``414s'' after the Milwaukee area code, did not intend to do any damage and did not realize they were doing anything unethical or illegal. In fact, when asked [at a Congressional subcommittee hearing] at what point he questioned the ethics of his actions, he answered, ``Once the FBI knocked on the door.'' It's no secret that a mature sense of ethics is something a person develops over time. Parents are supposed to exercise authority over their children because the children are not expected to know how to make certain decisions for themselves. We have a juvenile court system separate from the adult criminal court system because we believe that a young person is not capable of criminal intent in the same sense that an adult is capable of it.

70. Dead Hackers Society
(c) Copyright 19942004, Dead Hackers Society.
http://www.dhs.nu/
Atari Demoscene
Competitions

Mailing lists

Links

Party Downloads
...
IRC #atariscne

Atari Bulletins
Demoscene

Buy/sell/swap

Misc (crap)

Scene polls What about another issue of an Atari diskmag ? I'll help and support it I'll wait and read it That's old crap Atari Utils Coding tools Demo creation Chip editors Digital editors ... Centurbo II files Search pathfinder Add a news article! New gameboy emulator ported to Atari May 22, 2004 Data of Trio has recently (well, a week ago) ported the open source Gameboy emulator called 'gngb' to the Atari. The emulator should work with any Atari with a 68020 or better processor, but the faster the better, as always with emulation. Download gngb for Atari Audio Exposure ST - Remix CD available May 22, 2004 A few years ago, in 2001 to be more specific, Rich Davey from Little Green Desktop began collecting remixes of classic Atari ST tunes. He got eight tunes, but the project somewhow cooled down and was put on ice. Until now that is, the CD has been resurrected and is available thru Atari.Org's web-mirror (similar style to Fading Twilight / No Fragments). The tracks remixed are:
  • Rings of medusa
  • Syntax Terror Fletch
  • Gods
  • Goldrunner
  • The Killing Game Show
  • Mindbomb demo
  • There aren't any sheeps in outer mongolia
  • Verminator
Yep! Nice to see such classics in new form, personally I'm most happy that someone still remember Verminator :)

71. CNN.com - Clinton Administration Develops Internet Security Proposals As Investi
CNN
http://www.cnn.com/2000/TECH/computing/02/16/hacking.investigation.01/index.html
technology computing CNN Sites CNN CNNfn CNNSI myCNN AllPolitics Languages myCNN Video Audio Headline News Brief ... Feedback
CNN Sites CNN CNN Europe CNNfn CNNSI myCNN CNNfyi AllPolitics Languages
Search
CNN.com CNNSI.com CNNfn.com The Web
TECHNOLOGY

TOP STORIES
Consumer group: Online privacy protections fall short

Guide to a wired Super Bowl

Debate opens on making e-commerce law consistent

MORE

TOP STORIES More than 11,000 killed in India quake Mideast negotiators want to continue talks after Israeli elections MORE BUSINESS ... MORE MARKETS 4:30pm ET, 4/16 DJIA NAS SPORTS Jordan says farewell for the third time ... LOCAL EDITIONS: CNN.com Europe change default edition MULTIMEDIA: video video archive audio multimedia showcase ... more services E-MAIL: Subscribe to one of our news e-mail lists Enter your address: DISCUSSION: chat feedback CNN WEB SITES: CNNfyi.com CNN.com Europe AsiaNow Spanish ... Korean Headlines TIME INC. SITES: Go To ... Time.com People Money Fortune EW CNN NETWORKS: CNN anchors transcripts Turner distribution SITE INFO: help contents search ad info ... jobs WEB SERVICES: Main Page Bracing for Cyberwar Hacking Primer Scenes from the 'Hacker Underground' ... Related Sites
Clinton administration develops Internet security proposals as investigators pursue hackers
February 16, 2000

72. CNN In-Depth Specials - Hackers
Full story. Hackers, Crackers and Trojan Horses. Two things terrify today scomputer users viruses and Hackers. Full story. School for Hackers.
http://www.cnn.com/TECH/specials/hackers/

MAIN PAGE

WORLD

U.S.

WEATHER
...
ABOUT US

CNN TV what's on
show transcripts

CNN Headline News

CNN International
...
askCNN
EDITIONS CNN.com Asia CNN.com Europe set your edition Languages Spanish Portuguese German Italian Danish Japanese Korean Arabic Time, Inc. Time.com People Fortune EW Bracing for Cyberwar "If somebody wanted to launch an attack, it would not be at all difficult," says one expert. Full story Hackers, Crackers and Trojan Horses Two things terrify today's computer users: viruses and hackers. And just like viruses, most people don't understand hackers or what they do. Full story Scenes from the 'hacker underground' Friday night in the mall with the 'hacker underground' Full story Two Views of Hacking Charles Palmer, head of IBM's ethical hacking unit, and Emmanuel Goldstein, editor of 2600, on the evils and virtues of hacking. Full story School for Hackers TIME reporter Chris Taylor takes a crash course in counterhacking Full story From the first phone pranksters to a billion-dollar security plan An interactive sampling of hacked Web sites Recent news articles on hacking and computer security Follow these links to more information Computer Security Cyberterrorism Computer Hacking Civil Liberties Recent stories on hackers: Search CNN.com

73. CNN - Hackers Tampering With Internet, E-mail Links - February 8, 2000
CNN
http://www.cnn.com/2000/TECH/computing/02/08/email.hacks.idg/index.html
[an error occurred while processing this directive]
MAIN PAGE
WORLD U.S. LOCAL ... daily almanac
MULTIMEDIA:
video
video archive audio multimedia showcase ... more services
E-MAIL:
Subscribe to one of our news e-mail lists.
Enter your address: document.write(' '); Or:
Get a free e-mail account

E-MAIL
DISCUSSION: message boards chat feedback
CNN WEB SITES:
AsiaNow
Svenska Norge Danmark ... Italian FASTER ACCESS: europe japan TIME INC. SITES: Go To ... Time.com People Money Fortune EW CNN NETWORKS: more networks transcripts SITE INFO: help contents search ad info ... jobs WEB SERVICES: Main Page Bracing for Cyberwar Hacking Primer Scenes from the 'Hacker Underground' ... Related Sites
Hackers tampering with Internet, e-mail links
February 8, 2000 Web posted at: 8:35 a.m. EST (1335 GMT) by Diane Frank From... (IDG) Federal and industry security teams are warning agencies about malicious code embedded in Internet links on World Wide Web sites and in e-mails that could allow hackers to capture any information entered by the user. MORE COMPUTING INTELLIGENCE IDG.net home page

74. Index Of /2004/TECH/internet/04/15/hackers.supercomputers.ap/
DIR Parent Directory......Index of /2004/TECH/internet/04/15/Hackers.supercomputers.ap/.Name Last modified Size
http://www.cnn.com/2004/TECH/internet/04/15/hackers.supercomputers.ap/

75. CNN - Hackers Hit Government Web Sites After China Embassy Bombing - May 10, 199
CNN
http://www.cnn.com/TECH/computing/9905/10/hack.attack.02/index.html

MAIN PAGE
WORLD ASIANOW U.S. ... news quiz
CNN WEB SITES: TIME INC. SITES: Go To ... Time.com People Money Fortune EW MORE SERVICES: video on demand video archive audio on demand news email services ...
pagenet

DISCUSSION: message boards chat feedback
SITE GUIDES: help contents search
FASTER ACCESS: europe japan
WEB SERVICES:
Hackers hit government Web sites after China embassy bombing
RELATED VIDEO
CNN's Ann Kellan reports on the increase in Web site protests following the NATO bombing of the Chinese Embassy.
Windows Media
  • Bracing for Cyberwar
  • Hacking Primer
  • Hacking: Two Views
  • Timeline ...
  • Related Sites May 11, 1999 Web posted at: 12:03 a.m. EDT (0403 GMT) WASHINGTON (CNN) Computer hackers protesting NATO's bombing of the Chinese Embassy in Belgrade have attacked three U.S. government Web sites, government officials tell CNN. The main Internet sites for the Energy and Interior departments and the National Park Service were hacked Sunday. The hackers planted messages condemning the bombing, prompting at least one Cabinet site to remain closed all day Monday. Hackers inserted protest messages into the agencies' home pages. The pictures of three Chinese journalists who died in the bombing were briefly posted on the Interior Department Web page.
  • 76. Meet The Hackers - ZDNet UK Special Reports
    Meet the Hackers. Patrick Gray, ZDNet Australia. Raven Alder Girl power. The firstwoman to deliver a technical presentation at the famed DefCon hacker conference
    http://insight.zdnet.co.uk/internet/security/0,39020457,39154438,00.htm
    Price Comparison Shopping at ZDNet
    All of ZDNet News Insight Comment White Papers Reviews Downloads Prices Jobs All the Web top search newsletters Special Reports Friday 4th June 2004
    Meet the hackers
    Patrick Gray, ZDNet Australia
    Raven Alder: Girl power The first woman to deliver a technical presentation at the famed DefCon hacker conference, talks about "gender wars" in the hacking realm.
    Name: Raven Alder
    Handle(s): Raven
    Age:
    Place of birth:
    Mississippi, USA
    Marital status: Single
    Current residence: Maryland, USA
    Job: Security consultant, True North Solutions First computer: Home-built 8088 machine in 1988 Best known for: Tracing spoofed distributed denial of service attacks Area(s) of expertise: ISP backbone networking, protocol decoding and design, Linux/BSD security, and cryptography What's the difference between male and female hackers? If you ask Raven Alder, she might let out a string of expletives because gender is a non-issue. Alder was the first woman to deliver a technical presentation at the famed DefCon hacker conference in Las Vegas. But don't harp on it. If there's one thing she hates, it's being type-cast as a "chick hacker". "If I never read another 'she's going to save the Internet' article or have a reporter wanting me to pose by the pool at DefCon with a life preserver, it will be too soon.

    77. CNN.com - Technology - Hackers Are Naughty And Nice At Def Con - August 3, 2000
    CNN
    http://www.cnn.com/2000/TECH/computing/08/03/defcon.notebook.idg/index.html
    technology > computing Editions myCNN ... Feedback
    CNN Sites CNN CNN Europe CNNfn CNNSI myCNN CNNfyi AllPolitics Languages
    Search
    CNN.com CNNSI.com CNNfn.com The Web
    TECHNOLOGY

    TOP STORIES
    Consumer group: Online privacy protections fall short

    Guide to a wired Super Bowl

    Debate opens on making e-commerce law consistent

    MORE

    TOP STORIES More than 11,000 killed in India quake Mideast negotiators want to continue talks after Israeli elections MORE BUSINESS ... MORE MARKETS 4:30pm ET, 4/16 DJIA NAS SPORTS Jordan says farewell for the third time ... LOCAL EDITIONS: CNN.com Europe change default edition MULTIMEDIA: video video archive audio multimedia showcase ... more services E-MAIL: Subscribe to one of our news e-mail lists Enter your address: DISCUSSION: chat feedback CNN WEB SITES: CNNfyi.com CNN.com Europe AsiaNow Spanish ... Korean Headlines TIME INC. SITES: Go To ... Time.com People Money Fortune EW CNN NETWORKS: CNN anchors transcripts Turner distribution SITE INFO: help contents search ad info ... jobs WEB SERVICES:
    Hackers are naughty and nice at Def Con
    From... by Ann Harrison LAS VEGAS (IDG) "We apologize for the delay," said the Def Con press attache. "The CIA is caucusing in the men's room." "Well I'm so glad I left the tape recorder running in there," replied a British reporter calmly pouring scotch. "Would anyone like a drink?"

    78. Palm Hackers Salon

    http://salon.simple-palm.com/

    79. Hacker Stickers Computer Stickers For Hackers And Geeks And T-Shirts, Energy Can
    Hackers and geeks will place this on their computers and feel like their in the movies,after your gear is pimped out make sure you use and always enhance your
    http://www.hackerstickers.com/
    Order/Checkout GEEK
    BSD Daemon

    BOMB
    ...
    Kola

    Penguin Mints
    Penguin Mints

    Penguin Reds

    Geek Clothes

    31337 Ninja-
    ...
    White Hat

    Gray Hat GEEK BEANIE Geek Hardware KeyKatcher Lock Pick Set ... SUGGESTION BOX LINKS/LINKING AFFILIATES
    Hacker Stickers Stickers for Geeks, Nerds and Computers or Cars Free Sticker! Spoof up your laptop a little with this brightly or darkly colored fused bomb is ready to blow. Hackers and geeks will place this on their computers and feel like their in the movies, after your gear is pimped out make sure you use and always enhance your skills. Ever see the word 'Hacker' in Japanese? The japanese hacker sticker shows real ninja skills when placed on your computer. The sticker is bound to bring you either stealthyness or attraction depending on your location and surroundings. Hacker stickers are available in white, black and red in vinyl sticker which is weatherproof so it works perfectly for car windows and laptops or the home computer case. Give this as a gift to your son or daughter or surprise your parents by sporting this specialty sticker. Many who subscribe to 2600 The Hackers Quarterly enjoy the Hacker sticker as they are not afraid to show their pride in being a hacker.

    80. CNN.com - Hackers Attempted To Breach California Power Grid - June 9, 2001
    CNN
    http://cnn.com/2001/TECH/internet/06/09/california.energy.hackers/index.html
    MAIN PAGE
    WORLD

    U.S.

    WEATHER
    ...
    ABOUT US

    CNN TV what's on
    show transcripts

    CNN Headline News

    CNN International
    ...
    askCNN

    EDITIONS CNN.com Asia CNN.com Europe set your edition Languages Time, Inc. Time.com People Fortune EW
    Hackers attempted to breach California power grid
    From CNN Assignment Editor Megan Clifford LOS ANGELES, California (CNN) As Californians suffered under rolling blackouts last month, computer hackers were trying to breach the computer system at the California Independent System Operator (Cal-ISO), which oversees most of state's power transmission grid, a spokeswoman told CNN. Cal-ISO spokeswoman Lisa Szot said a Cal-ISO computer system in Sacramento was attacked for a brief period of time in late April and early May. Szot said the system wasn't altered or harmed in anyway, but hackers did attempt to do so. IN-DEPTH The energy crunch in California MESSAGE BOARD Energy crunch The attack began in late April and it was not detected until the second week of May. On May 7 and 8, California suffered widespread rolling blackouts, but Szot said there was no connection between the hacking and the lack of power for the state. The hackers' ineffective efforts exposed security weaknesses in the system used by Cal-ISO, which Szot said have since been corrected. An internal group of Cal-ISO staff members are investigating the attack.

    A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

    Page 4     61-80 of 195    Back | 1  | 2  | 3  | 4  | 5  | 6  | 7  | 8  | 9  | 10  | Next 20

    free hit counter