Geometry.Net - the online learning center
Home  - Book_Author - Hackers The
e99.com Bookstore
  
Images 
Newsgroups
Page 5     81-100 of 195    Back | 1  | 2  | 3  | 4  | 5  | 6  | 7  | 8  | 9  | 10  | Next 20
A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

         Hackers The:     more books (99)
  1. The Hacker's Dictionary: A Guide to the World of Computer Wizards by Guy L. Steele, 1983
  2. Philology and Confrontation: Paul Hacker on Traditional and Modern Vedanta
  3. Pocket Style Manual: Updated With 2003 MLA Update by Diana Hacker, 2000
  4. Unauthorized Voices: Essays on Poets and Poetry, 1987-2009 (Poets on Poetry) by Marilyn Hacker, 2010-10-19
  5. A Writer's Reference With Help for Writing in the Disciplines by Diana Hacker, 2010-12
  6. CYBERPUNK: Outlaws and Hackers on the Computer Frontier, Revised by Katie Hafner, 1995-11-01
  7. World Military History Bibliography: Premodern and Nonwestern Military Institutions and Warfare (History of Warfare, 16) by Barton C. Hacker, 2003-06
  8. Wittgenstein: Understanding and Meaning: Volume 1 of an Analytical Commentary on the Philosophical Investigations, Part I: Essays (Pt. 1) by G. P. Baker, P. M. S. Hacker, 2005-02-11
  9. Insight and Illusion: Wittgenstein on Philosophy and the Metaphysics of Experience by P. M. S Hacker, 1975
  10. Doctor Ecco's Cyberpuzzles: 36 Puzzles for Hackers and Other Mathematical Detectives by Dennis E. Shasha, 2004-02
  11. Wittgenstein, Meaning and Understanding (Essays on the Philosophical Investigations, Vol. 1) by Gordon P Baker, P.M.S. Hacker, 1985
  12. Death Is a Two-Stroke Penalty: A Hacker Mystery by James Y. Bartlett, 1991-05
  13. Two Nations : Black and White, Separate, Hostile, Unequal by Andrew Hacker, 2003-05-19
  14. The Costs of Bad Hiring Decisions & How to Avoid Them, Second Edition by Carol Hacker, 1998-05-26

81. A Prolog Introduction For Hackers || Kuro5hin.org
k5 store. P. A Prolog Introduction for Hackers (Technology) By tkatchevThu Feb 26th, 2004 at 050323 PM EST, Software. Strange, but
http://www.kuro5hin.org/story/2004/2/25/124713/784

create account
help/FAQ contact links ... MLP We need your support: buy an ad premium membership k5 store A Prolog Introduction for Hackers ... Technology
By tkatchev
Thu Feb 26th, 2004 at 05:03:23 PM EST
Strange, but true: Prolog is, without a doubt, currently the simplest and the most straightforward programming language of all mainstream programming languages; however, the special interests of academia and inept teaching have given it a horrible, pariah-like reputation. (After all, you cannot write a PhD thesis explaining obvious, practical things.) This article aims to ameliorate the situation; to introduce the practical simplicity of Prolog to those that might normally sneer at what they consider a horrible, convoluted playing field of doctorate theory. ADVERTISEMENT
Sponsor: dhecht Custom Build Your Own Dedicated Server. Debian, Red Hat, FreeBSD or Windows starting at just $83! Build your own hosting solution at the West Coast's #1 Dedicated Server Specialist. Huge bandwidth, customizable processors, RAM and hard drives, and your choice of OS and software. Screaming-Fast network, 99.999% uptime guarantee. comments active buy ad
ADVERTISEMENT The Prolog approach Prolog is, essentially, a query language for databases, like SQL. However, unlike SQL, which is a limited query language for relational databases, (tables of rows and columns, much like a spreadsheet) Prolog is a query language for matching complicated patterns against a database of simple facts.

82. CNN.com - Technology - Power Grids Could Be Vulnerable To Hackers - March 6, 200
CNN
http://cnn.com/2001/TECH/internet/03/06/power.hackers.idg/index.html
MAIN PAGE
WORLD

U.S.

WEATHER
...
ABOUT US

CNN TV what's on
show transcripts

CNN Headline News

CNN International
...
askCNN

EDITIONS CNN.com Asia CNN.com Europe set your edition Languages Spanish Portuguese German Italian Danish Japanese Korean Arabic Time, Inc. Time.com People Fortune EW
Power grids could be vulnerable to hackers
From... By Dan Verton (IDG) Nationwide rolling blackouts could have a devastating impact on the economy, but experts also fear that the stress being placed on the nation's power grid could make it more susceptible to disruptions from hackers. In California's Silicon Valley, large Internet data centers have been blamed for stressing the region's power grid beyond what its Korean War-era design can handle. Now, other states, including Oregon, Utah and Washington, are preparing for possible rolling blackouts. "From a cybersecurity perspective, the electric power grids in the West are now more fragile, [and] margins for error are significantly less," said Tim Bass, a longtime information security consultant for the U.S. Air Force and now CEO of The Silk Road Group Ltd., a network security consulting firm in Centerville, Va. "With diminishing margins and power reserves, the probability for cascading catastrophic effects are higher." MESSAGE BOARD Security on the Net The recent power shortages come as the Critical Infrastructure Assurance Office (CIAO) of the U.S. Department of Commerce on Feb. 22 delivered to Congress the first status report on private-sector efforts to bolster cyberdefenses for systems that run critical sectors of the economy. Although progress has been made in improving information sharing, officials acknowledged that they still know very little about how failures in one sector could affect other sectors.

83. A Verilog Introduction For Hackers || Kuro5hin.org
P. A Verilog Introduction for Hackers (Technology) By the Sun Feb 29th, 2004at 092314 AM EST, Hardware. Designing your own chips, the silicon variety.
http://www.kuro5hin.org/story/2004/2/27/213254/152

create account
help/FAQ contact links ... MLP We need your support: buy an ad premium membership k5 store A Verilog Introduction for Hackers ... Technology
By the
Sun Feb 29th, 2004 at 09:23:14 AM EST
Designing your own chips, the silicon variety. That's something you do with millions, if not billions of dollars of equipment and large fabrication plants under ultraclean conditions. Well, isn't it? Actually, no. You can design your own chips at home with a PC using no more than about $50 of equipment and I'm going to tell you how with the absolute minimum of effort. I'm going to make some basic assumptions: that you vaguely know a language with C like syntax and have a vague idea that digital electronics is about manipulating binary data represented in wires by a voltage level using logic gates. You can't design your own components completely from the ground up at home, for that you do need a lot of expensive equipment. But what you can do is program what are known as Field Programmable Gate Arrays (FPGAs) or Complex Programmable Logic Devices (CPLDs). These are large arrays of logic gates connected by a complex network that allows you to connect any gate to any other pretty much however you want. In effect you design a logic circuit on a PC that is downloaded to a chip. You can use all the usual digital components that you expect to see as discrete components: adders, flip-flops, shifters and so on. Even better, you don't even have to get your hands dirty designing circuits with these things because you can implicitly design your circuit with a high level language and have it automatically turned into a downloadable circuit.

84. Hackerthreads.com
Sale of caps, Tshirts and jackets to Hackers not crackers
http://www.hackerthreads.com
Forums Company Contact FAQ ... Login
Navigation Home All Shirts New Shirts Department Hackerwear LAN Party Open Source PC ...
Hackerthreads.org

Programs Sponsorships Affiliate Retail/E-tail Custom Apparel ... Other Services Search
Enlarge Image
Point Click Bang
The three essential steps to sucessful gaming. Price - 14.95 USD
Color: White Size: M L XL XXL Qty:
Enlarge Image
Stroke It
Front and back print. Click on thumbnail to see back print. One of the most popular graphic designs we sell. Price - 14.95 USD
Color: White Size: M L XL XXL Qty:
Enlarge Image
Hackerthreads embroidered cap High quality stitching with velcro adjustable back. Sandwich bill. Excellent. Those of you who have one know how durable these are. One size fits all. Price - 19.95 USD Color: Stone Size: ONE SIZE Qty: Enlarge Image LAN Party by Hackerthreads Another awesome Hackerthreads Original by our man Phorq. This design truly rocks, and will appeal to those LANers worldwide! This is a LAN Party done the Hackethreads way! Price - 9.99 USD

85. Www.muppetlabs.com/linux/descent/
Hackers 4 Hackers (H4H)Welcome to the homepage of Hackers 4 Hackers (H4H), a magazine for dutchspeaking Hackers and people who wanna read about it. Hackers 4 Hackers.
http://www.muppetlabs.com/linux/descent/

86. Wired News: Adobe Hackers: We're Immune
The Russian company that created software to circumvent Adobe's ebook format argued on Monday that its conduct which caused the arrest and detainment of programmer Dmitri Sklyarov in a high-profile case last summer was not illegal. By Farhad Manjoo and Michelle Delio. Wired
http://www.wired.com/news/politics/0,1283,50797,00.html
Welcome to Wired News. Skip directly to: Search Box Section Navigation Content Search:
Wired News Animations Wired Magazine HotBot (the Web)
Adobe Hackers: We're Immune
By Michelle Delio and Farhad Manjoo Also by this reporter Page 1 of 1
06:14 AM Mar. 04, 2002 PT SAN JOSE The Russian company that created software to circumvent Adobe's e-book format argued on Monday that its conduct which caused the arrest and detainment of programmer Dmitri Sklyarov in a high-profile case last summer was not illegal. Wireless Hot Spot Directory Search for Wi-Fi hot spots near you:
Story Tools
See also
Today's Top 5 Stories
Breaking News
Tech Jobs Partner Today's the Day Joseph Burton, Elcomsoft's attorney, told U.S. District Judge Ronald Whyte that Elcomsoft's actions "occurred in Russia or on the Internet, and we take the position that the Internet is a place" outside of U.S. jurisdiction.

87. GuideSuperEva Hackers
Una guida completa su Hackers, phreaking, cracking, coders, anonimy, sicurezza. Download programmi demo.
http://guide.supereva.it/hackers/
Mappa Fai di sEva la tua Home Help Sei qui: superEva guide Cerca la guida: A B C D ... Viaggi Le Guide di oggi Softcore
di Alex Bonelli
Alla scoperta dell'erotismo sensuale
di Zia Angie
Uomini per tutti i gusti! In evidenza Magia e illusionismo di Richard Giornalismo di Simona Petaccia Religione cattolica di Marco Campoli Bodybuilding di Mauro Pierini Mangiar bene di Angie Hobby creativi di Monica Resta Oggi si parla di: Federica Fontana on the Beach di RED GLAMOUR (guida di Top model e bellissime
Club Cleò
di Mister x (guida di Club Privé
Vi ricordate la mitica Ramba?
di Beds (guida di Pornostar
Magnifici Cognati Caldi
di Erotiko (guida di Racconti Erotici
Il business del rifiuto
di Klò (guida di Ecologia
Bertinotti...
di Dr. Massimo Fochi (guida di Psicologia
Weird War
di Fabry T (guida di E che il suono abbia inizio di The Ravers Blade (guida di Musica dance Tiesto di The Ravers Blade (guida di Musica dance Gigi D’Agostino di The Ravers Blade (guida di Musica dance Festival dei Primi D'Italia di Angie, guida di Mangiar bene Buon compleanno Space Invaders! di Fabry T, guida di Dichiarazioni shock di Bush di Hombre Comùn , guida di No Global Oggi e domani la WWE in Italia!!!

88. :: United Hackers Association ::
GraFX and Website redeveloped and enhanced and added to(filez) by CHRoNo§§. ©1992 2004 United Hackers Association, Contact the Webmaster. web site metrics
http://www.uha1.com/

Windows Enter
Unix Enter
UHA1-forum

Vote
... Flash Movie 2
We are the uha.
The information provided on these pages are for educational purposes only. The authors of this site are in no way responsible for any damage that is the result of the use of the information provided on this site nor any DUMBASS script kiddy that doesn't know his shit!!!!!!!!!!!
GraFX and Website redeveloped and enhanced and added to(filez) by CHRoNo§§
Webmaster
var sc_project=251397;

89. Hackers Advised Against Crime At Def Con
CNN
http://cnn.com/2001/TECH/internet/07/16/hacker.convention.reut/index.html

90. PhreakNIC 8 - Nashville, TN
A convention for Hackers, phone phreaks, cypherpunks, programmers, civil libertarians, ham/scanner enthusiasts, security experts, feds, and culture jammers.
http://www.phreaknic.info/
Create an account Log In Home Downloads ... Forums
Modules Home
Event Calendar

Feedback

Forums
...
Your Account

Who's Online There are currently, 3 guest(s) and member(s) that are online.
You are Anonymous user. You can register for free by clicking here
PhreakNIC 8
PhreakNIC is an annual convention held in Nashville, TN. Originally started as a "hacker convention," it has since grown to include all things of interest to the technology minded individual. PhreakNIC is organized by the Nashville 2600 Organization and the Nashville Linux Users Group . There are technical presentations, cultural exhibits and panels, as well as plenty of socializing. Sign up for the info mailing list!
Costs
Passes are good for the entire weekend. They are $20 to non-members of Nashville 2600 (whose annual dues are currently paid). Volunteers get a refund of $10 after working their shifts. Speakers get in for free. As per tradition since PhreakNIC 6, there will be some sort of souvenir swag given out to the first 300 paid attendees.
Hotel
This year PhreakNIC is October 22-24 at the Days Inn Stadium in Nashville, TN. The room rate is $62 per night when you book under the code

91. Hackers -------?------- Fanlisting
Welcome. To the official fanlisting for the movie Hackers. Pleaseread through all the information on the site before joining. If
http://hackers.hell-yes.net/
Welcome To the official fanlisting for the movie Hackers. Please read through all the information on the site before joining. If you have an questions, comments, offers and such... email them to fan@hell-yes.net Site Statistics We have a total of members!
We have a total of pending member !
Last updated on June 2, 2004 Rules 1. Of course, you have to be a fan of the movie.
2. You do not have to have a web site to join, an email address is fine.
3. If you do have a web site, please put a link back to the fanlisting.
4. No offensive material such as, hate rhetoric, homophobic rantings, porn etc.
5. No TyPiNG lIKe tHis, it is very annoying and hard to read. Join Click here for join form Members Click here to see a list of the members Codes
Code contributions. Thanks to those who do send in graphics! :X 50 x 50
Kaylee

(Katelyn) 100 x 50
all from Theresa Other sizes Francis Affiliates Hell-Yes.Net

92. Jesux
Jesux (pronounced Haysooks) is a new Linux distribution for Christian Hackers, schools, families, and churches. There is already a core distribution being prepared, based on RedHat's distribution. Please note - this is strictly a satire!
http://www.geocities.com/ResearchTriangle/Node/4081/
Welcome to the Jesux home page
The distribution that will not lead you into temptation
What is Jesux
Jesux (pronounced Hay-sooks) is a new Linux distribution for Christian hackers, schools, families, and churches. There is already a core distribution being prepared, based on RedHat's distribution. Jesux will aim to be an environment that is pleasant for Christians to work in, with all the amenities a Christian might expect, and when possible, free from worldly influences.
What is different about Jesux?
Below is a short list. As we get more information, we will put it here. Send more suggestions to jesux@pobox.com . Send your suggestions for content in the bookmark, fortune, and .newsrc files, too, and we will start posting some of this stuff.
  • default fortune file contains quotes from the scriptures, Augustine, C.S. Lewis, Chuck Swindoll, etc. Christian Enlightenment themes featuring Jesus, the cross, and other Christian icons Login screen has full text to Lord's Prayer and Pledge of Allegiance, with Christian and American symbols
    • Provide alternate screens for non-Americans, perhaps

93. Hackers (1995) - MovieWeb
Hackers Starring Jonny Lee Miller, Angelina Jolie, Jesse Bradford, Matthew Lillard,Laurence Mason, Renoly Santiago, Fisher Stevens, Alberta Watson, Darren
http://movieweb.com/movies/film.php?1869

94. CNN.com - Technology - Malaysian Hackers May Face Indefinite Detention - January
CNN
http://cnn.com/2001/TECH/computing/01/10/malaysian.hackers.idg/index.html
technology > computing Editions myCNN ... Feedback
CNN Sites CNN CNN Europe CNNfn CNNSI myCNN CNNfyi AllPolitics Languages
Search
CNN.com CNNSI.com CNNfn.com The Web
TECHNOLOGY

TOP STORIES
Consumer group: Online privacy protections fall short

Guide to a wired Super Bowl

Debate opens on making e-commerce law consistent

MORE

TOP STORIES More than 11,000 killed in India quake Mideast negotiators want to continue talks after Israeli elections MORE BUSINESS ... MORE MARKETS 4:30pm ET, 4/16 DJIA NAS SPORTS Jordan says farewell for the third time ... LOCAL EDITIONS: CNN.com Europe change default edition MULTIMEDIA: video video archive audio multimedia showcase ... more services E-MAIL: Subscribe to one of our news e-mail lists Enter your address: DISCUSSION: chat feedback CNN WEB SITES: CNNfyi.com CNN.com Europe AsiaNow Spanish ... Korean Headlines TIME INC. SITES: Go To ... Time.com People Money Fortune EW CNN NETWORKS: CNN anchors transcripts Turner distribution SITE INFO: help contents search ad info ... jobs WEB SERVICES:
Malaysian hackers may face indefinite detention
From... by David Legard (IDG) The Malaysian government is considering using the country's Internal Security Act (ISA) against hackers such as those who defaced the country's parliament Web site in late December, according to the government news agency Berita Nasional Malaysia.

95. CNN.com - Firms Warned Of 'drive-by Hackers' - November 21, 2001
CNN
http://cnn.com/2001/TECH/internet/11/21/europe.hacking/index.html
MAIN PAGE
WORLD

U.S.

WEATHER
...
ABOUT US/HELP

CNN TV what's on
show transcripts

CNN Headline News

CNN International
...
askCNN

EDITIONS CNN.com Asia CNN.com Europe CNNenEspanol.com CNNArabic.com ... set your edition Languages Spanish Portuguese German Italian Korean Arabic Japanese Time, Inc. Time.com People Fortune EW InStyle Business 2.0
Firms warned of 'drive-by hackers'
By CNN's Peter Wilkinson LONDON, England (CNN) Companies that use wireless technology to allow workers to log into networks throughout offices have been warned they could be laying themselves open to hackers. The alert comes ahead of the scheduled signing in Hungary on Friday of a European convention that aims to unite about 30 countries in the fight against cyber-criminals. The warning was made by London-based computer security company Orthus, after it drove around the financial centre of the British capital to see how easy it was to pick up radio signals containing data from wireless networks. Using a laptop and easily obtainable software, Orthus said its experts detected 124 wireless computer systems that allowed them to access 207 different networks. More than two-thirds of these systems were not protected by any form of encryption, it added. Orthus spokesman Richard Hollis said wireless users, expected to grow rapidly in number in the next few years, presented hackers using easily available equipment with an easy target.

96. BBC NEWS | Technology | Hackers Exploit Windows Patches
Hackers are relying on Microsoft to help them exploit loopholes inWindows, say security experts. Hackers exploit Windows patches.
http://news.bbc.co.uk/2/hi/technology/3485972.stm
News
Sport

Weather

World Service
... Programmes
Last Updated: Thursday, 26 February, 2004, 10:54 GMT E-mail this to a friend Printable version Hackers exploit Windows patches
By Mark Ward
BBC News Online technology correspondent
Malicious hackers and vandals are lazy and wait for Microsoft to issue patches before they produce tools to work out how to exploit loopholes in Windows, say experts.
Exploits get written once patches appear Instead of working it out for themselves, malicious hackers are reverse engineering the patches to better understand the vulnerabilities, said David Aucsmith, who is in charge of technology at Microsoft's security business and technology unit. In a keynote speech to the E-Crime Congress organised by Britain's National Hi-Tech Crime Unit, Mr Aucsmith said the tools that hackers were producing were getting better and shrinking the time between patches being issued and exploits being widely known. "We have never had vulnerabilities exploited before the patch was known," he said.

97. CNN.com - Technology - AOL Says Hackers May Have Stolen Credit Card Numbers - Ju
CNN
http://www.cnn.com/2000/TECH/computing/06/17/aol.hacker.01/index.html
technology > computing Editions myCNN ... Feedback
CNN Sites CNN CNN Europe CNNfn CNNSI myCNN CNNfyi AllPolitics Languages
Search
CNN.com CNNSI.com CNNfn.com The Web
TECHNOLOGY

TOP STORIES
Consumer group: Online privacy protections fall short

Guide to a wired Super Bowl

Debate opens on making e-commerce law consistent

MORE

TOP STORIES More than 11,000 killed in India quake Mideast negotiators want to continue talks after Israeli elections MORE BUSINESS ... MORE MARKETS 4:30pm ET, 4/16 DJIA NAS SPORTS Jordan says farewell for the third time ... LOCAL EDITIONS: CNN.com Europe change default edition MULTIMEDIA: video video archive audio multimedia showcase ... more services E-MAIL: Subscribe to one of our news e-mail lists Enter your address: DISCUSSION: chat feedback CNN WEB SITES: CNNfyi.com CNN.com Europe AsiaNow Spanish ... Korean Headlines TIME INC. SITES: Go To ... Time.com People Money Fortune EW CNN NETWORKS: CNN anchors transcripts Turner distribution SITE INFO: help contents search ad info ... jobs WEB SERVICES:
AOL says hackers may have stolen credit card numbers
June 17, 2000 Web posted at: 5:18 p.m. EDT (2118 GMT)

98. BBC NEWS | Science/Nature | Hackers Target Web Censorship
Wellintentioned Hackers are creating tools to help people circumventweb browsing controls in countries where the net is censored.
http://news.bbc.co.uk/hi/english/sci/tech/newsid_2129000/2129390.stm
CATEGORIES TV RADIO COMMUNICATE ... INDEX SEARCH
You are in: Science/Nature News Front Page World UK ... Programmes SERVICES Daily E-mail News Ticker Mobile/PDAs Text Only ... Help EDITIONS Change to World Monday, 15 July, 2002, 12:56 GMT 13:56 UK Hackers target web censorship
Does this innocent picture have a hidden message?
Well-intentioned hackers are creating tools to help people circumvent web browsing controls in countries where the net is censored. The group of technology experts have produced two programs that help people swap messages that would otherwise be banned or to set up their own networks that help them keep in touch. The programs, which are the result of two years of work, should make it much more difficult for traditional web control systems to spot and stop messages they consider unwelcome. The creators of the programs say they have worked hard to ensure that anyone can use them, not just the technically gifted. Scrambled message Both programs are the work of a group of hackers calling itself Hacktivismo, which is dedicated to creating technology that can be put to socially useful ends. The first program, which was unveiled at the Hackers on Planet Earth conference in New York at the weekend, is called Camera/Shy and allows people to hide messages inside images.

99. Honeypots
An introduction to honeypots, the different types, and their value.
http://www.tracking-hackers.com/papers/honeypots.html
Honeypots
Definitions and Value of Honeypots Lance Spitzner
http://www.tracking-hackers.com

Last Modified: 29 May, 2003 Honeypots are an exciting new technology with enormous potential for the security community. The concepts were first introduced by several icons in computer security, specifically Cliff Stoll in the book The Cuckoo's Egg ", and Bill Cheswick's paper " An Evening with Berferd ." Since then, honeypots have continued to evolve, developing into the powerful security tools they are today. The purpose of this paper is to explain exactly what honeypots are, their advantages and disadvatages, and their value to the security. Definitions
The first step to understanding honeypots is defining what a honeypot is. This can be harder then it sounds. Unlike firewalls or Intrusion Detection Systems, honeypots do not solve a specific problem. Instead, they are a highly flexible tool that comes in many shapes and sizes. They can do everything from detecting encrypted attacks in IPv6 networks to capturing the latest in on-line credit card fraud. Its is this flexibility that gives honeypots their true power. It is also this flexibility that can make them challenging to define and understand. As such, I use the following definition to define what a honeypot is. A honeypot is an information system resource whose value lies in unauthorized or illicit use of that resource.

100. CNN - Film Studios File Suit Against Accused DVD Hackers - January 18, 2000
CNN
http://www.cnn.com/2000/TECH/computing/01/18/dvd.suit.idg/index.html
[an error occurred while processing this directive]
MAIN PAGE
WORLD U.S. LOCAL ... daily almanac
MULTIMEDIA:
video
video archive audio multimedia showcase ... more services
E-MAIL:
Subscribe to one of our news e-mail lists.
Enter your address: document.write(' '); Or:
Get a free e-mail account

E-MAIL
DISCUSSION: message boards chat feedback
CNN WEB SITES:
AsiaNow
Svenska Norge Danmark ... Italian FASTER ACCESS: europe japan TIME INC. SITES: Go To ... Time.com People Money Fortune EW CNN NETWORKS: more networks transcripts SITE INFO: help contents search ad info ... jobs WEB SERVICES: From...
Film studios file suit against accused DVD hackers
January 18, 2000
Web posted at: 2:19 p.m. EST (1919 GMT) by Terho Uimonen (IDG) Eight major motion picture companies late last week filed injunction complaints in U.S. Federal Court against three alleged hackers to prevent them from publishing an unauthorized DVD (digital versatile disk) de-encryption program on their Web sites. The complaints were filed in the Southern District of New York and the District of Connecticut on behalf of plaintiffs Universal Studios Inc., Paramount Pictures Corp., Metro-Goldwyn-Mayer Studios Inc., Tristar Pictures Inc., Columbia Pictures Industries Inc., Time Warner Entertainment Co., Disney Enterprises Inc. and Twentieth Century Fox Film Corp., according to a statement issued last Friday by the Motion Picture Association of America (MPAA). MORE COMPUTING INTELLIGENCE IDG.net home page

A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

Page 5     81-100 of 195    Back | 1  | 2  | 3  | 4  | 5  | 6  | 7  | 8  | 9  | 10  | Next 20

free hit counter