Geometry.Net - the online learning center
Home  - Book_Author - Hackers The
e99.com Bookstore
  
Images 
Newsgroups
Page 6     101-120 of 195    Back | 1  | 2  | 3  | 4  | 5  | 6  | 7  | 8  | 9  | 10  | Next 20
A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

         Hackers The:     more books (99)
  1. Money: Who Has How Much and Why by Andrew Hacker, 1998-04-09
  2. Philosophical Investigations by Ludwig Wittgenstein, 2009-10-20
  3. Hackers' Handbook 3.0 (Expanded, Revised and Updated): Includes WiFi, Identity Theft, Information Warfare and Web 2.0 by Dr. K, 2009-09-01
  4. Presidential Candidate Images (Communication, Media, and Politics) by Kenneth L. Hacker, 2004-11-28
  5. Wittgenstein's Place in Twentieth-Century Analytic Philosophy by P. M. S. Hacker, 1996-11-13
  6. Case of the Cyber-Hacker (Wishbone Mysteries No. 19) by Anne Capeci, Rick Duffield, 2000-02
  7. Human Nature: The Categorial Framework by P. M. S. Hacker, 2010-07-06
  8. The New Hacker's Dictionary - 3rd Edition
  9. Bedford Basics : A Workbook for Writers (3rd ED 98) by Diana Hacker, Wanda Van Goor, 1998-04-15
  10. Democracy's Edges (Contemporary Political Theory)
  11. Hackers Beware: The Ultimate Guide to Network Security by Eric Cole, 2001-08-23
  12. Remaking America: Democracy and Public Policy in an Age of Inequality
  13. Hacker's Challenge 3: 20 Brand New Forensic Scenarios & Solutions (Hacking Exposed) (v. 3) by David Pollino, Bill Pennington, et all 2006-04-25
  14. Wittgenstein and Analytic Philosophy: Essays for P. M. S. Hacker

101. Hackers? What About Rising Damp? | The Register
Hackers? What about rising damp? By John Leyden. Published Thursday29th April 2004 0945 GMT. Infosecurity Europe 2004 A water leak
http://www.theregister.co.uk/2004/04/29/it_environmental_sensors/
Skip to content SetUpDropMenu('StoreMenuItem', 'StoreMenu');
Enterprise:
Search
SetPromptText('q', 'Search');
Tools/Services
  • The Register Mobile Desktop News Panel Newsletter Reader Studies ... Servers
    Hackers? What about rising damp?
    By John Leyden Published Thursday 29th April 2004 09:45 GMT Infosecurity Europe 2004 A water leak or a failure in temperature control are just as likely to cause computer downtime as malicious attackers. But such so-called environmental issues are neglected until disaster strikes. Dave Watkins, managing director of monitoring appliance firm NetBotz, reckons firms worried about hackers should be even more concerned about physical threat management. Recent studies by the firm reveal that almost half of all mission critical failures could have been prevented if adequate environmental sensors had been deployed to detect water vapour, smoke, electrical failure or extreme temperature variance. Other research by the company reveals two-thirds of all security breaches are perpetrated by people with a level of authorised access to businesses premises or IT infrastructure. NetBotz markets a range of devices to monitor physical locations with video, sound, motion detection and environment sensing. Each solid state appliance provides real-time reporting and alerts sent over any IP network including Wireless (GSM / GPRS) and SMS alerts. The company competes with German manufacturer Rittil in the emerging market of IP-based physical security hardware.

102. CNN - Hackers Can Turn Network Cameras, Microphones On You - April 19, 1999
CNN
http://www.cnn.com/TECH/computing/9904/16/hackers.idg/index.html

MAIN PAGE
WORLD ASIANOW U.S. ... news quiz
CNN WEB SITES: TIME INC. SITES: Go To ... Time.com People Money Fortune EW MORE SERVICES: video on demand video archive audio on demand news email services ...
pagenet

DISCUSSION: message boards chat feedback
SITE GUIDES: help contents search
FASTER ACCESS: europe japan
WEB SERVICES:
Main Page
Bracing for Cyberwar Hacking Primer Scenes from the 'Hacker Underground' ... Related Sites
Hackers can turn network cameras, microphones on you
April 16, 1999

Web posted at: 12:02 p.m. EDT (1602 GMT)
by Bob Brewin From...
ALSO: Insurgency on the Internet For more computing stories (IDG) Do you have a microphone or video camera connected to your computer or network? If you value your privacy, turn those devices off, a top Army computer protection official warned today. Philip Loranger, chief of the Command and Control Protect Division in the Army's Information Assurance Office, demonstrated how anyone can attack a network and turn on any camera or microphones connected to that network with what he called "not very sophisticated hacker tools" downloaded from the Internet. Loranger, who conducted an attack on a dial-up military network in Columbia, Md., from an Association of U.S. Army Information Assurance symposium in Falls Church, Va., said the .mil system he managed to penetrate and whose identity he would not disclose did not have any intrusion-detection system despite the spurt of recent publicity about an increase in hacker attacks. Using "point and click" hacker tools, Loranger said he cracked three out of seven passwords on the system.

103. Compare Prices And Read Reviews On Hackers At Epinions.com
A collection of over 40 viewer comments.
http://www.epinions.com/mvie_mu-1064439

Join Epinions
Help Sign In
Movies All Categories Home Media
Hackers
Overall rating:
Reviewed by 47 Epinions users - Write a review We found this product at 17 stores The lowest base price is Compare Prices View Details Read Reviews Subscribe to reviews on this product
Compare Prices Showing 1-17 of 17 stores Page 1 Sort by
Store Name
Sort by
Store Rating
Notes Sort by
Price

17 store reviews
Format: DVD-Video
Condition: Very Good
Used Product In stock View all deals Enter your ZIP for prices with tax and shipping. Price + Tax + Shipping = Total Price Your ZIP is used only to show applicable tax and shipping charges. at DVD Empire 790 store reviews Format: VHS Tape direct from Amazon View all deals at Amazon 20 store reviews Format: DVD Condition: NEW at BestPrices.Com 44 store reviews Format: DVD In stock at ShowWow This store has not yet been rated. View store info Format: VHS Condition: Used In stock View all deals at MOJOSounds 513 store reviews Format: DVD Condition: New In stock at 27 store reviews Format: VHS Tape new and used from Amazon Marketplace Used merchandise Price subject to change View all deals Used price at Amazon Marketplace 153 store reviews Format: DVD - Wide Screen - Free Shipping when you spend $25 or more. See site for details.

104. SecurityFocus HOME News: Hackers Face Life Imprisonment Under 'Anti-Ter
SECURITYFOCUS NEWS, Hackers face life imprisonment under AntiTerrorism Act. JusticeDepartment proposal classifies most computer crimes as acts of terrorism.
http://www.securityfocus.com/news/257
Entire Site Advisories Calendar Columnists Guests Infocus Links Mailing lists (all) - BUGTRAQ - FOCUS-IDS - FOCUS-IH - FOCUS-LINUX - FOCUS-MS - FOCUS-SUN - FOCUS-VIRUS - FORENSICS - INCIDENTS - PEN-TEST - SEC JOBS - SEC SHELL - SF NEWS - VULN-DEV News Products Tools Vulns
Email article
Printable version
SECURITYFOCUS NEWS
Justice Department proposal classifies most computer crimes as acts of terrorism.
By Kevin Poulsen SecurityFocus Sep 24 2001 2:06PM Hackers, virus-writers and web site defacers would face life imprisonment without the possibility of parole under legislation proposed by the Bush Administration that would classify most computer crimes as acts of terrorism.
The Justice Department is urging Congress to quickly approve its Anti-Terrorism Act (ATA), a twenty-five page proposal that would expand the government's legal powers to conduct electronic surveillance, access business records, and detain suspected terrorists.
The proposal defines a list of "Federal terrorism offenses" that are subject to special treatment under law. The offenses include assassination of public officials, violence at international airports, some bombings and homicides, and politically-motivated manslaughter or torture.
Most of the terrorism offenses are violent crimes, or crimes involving chemical, biological, or nuclear weapons. But the list also includes the provisions of the Computer Fraud and Abuse Act that make it illegal to crack a computer for the purpose of obtaining anything of value, or to deliberately cause damage. Likewise, launching a malicious program that harms a system, like a virus, or making an extortionate threat to damage a computer are included in the definition of terrorism.

105. FAQ 4 Hackers
Een FAQ (veel gestelde vragen) over alles wat met hacking te maken heeft, opgezet door de nieuwsgroep alt.hack.nl.
http://www.faq4hackers.nl

106. CNN - Feds Warn Hackers Will Be Prosecuted; Pro-Mitnick Protest Planned - June 2
CNN
http://www.cnn.com/TECH/computing/9906/02/hunting.hackers/index.html
[an error occurred while processing this directive]
MAIN PAGE
WORLD ASIANOW U.S. ... news quiz
CNN WEB SITES: TIME INC. SITES: Go To ... Time.com People Money Fortune EW MORE SERVICES: video on demand video archive audio on demand news email services ...
pagenet

DISCUSSION: message boards chat feedback
SITE GUIDES: help contents search
FASTER ACCESS: europe japan
WEB SERVICES:
Main Page
Bracing for Cyberwar Hacking Primer Scenes from the 'Hacker Underground' ... Related Sites
Feds warn hackers will be prosecuted; pro-Mitnick protest planned
ALSO
Hackers train sights on all federal Web sites
Sign up for the Computer Connection email service

For more computing stories
June 2, 1999 Web posted at: 3:27 p.m. EDT (1927 GMT) (CNN) Computer hackers who vandalized five government Web sites are being hunted by the FBI and could face jail time, FBI and Justice Department officials said Tuesday. Officials took a dim view of the hackers who left a note threatening to attack other sites in retaliation for an FBI investigation in Texas into hacking at a corporate Web site. "It's time-consuming and takes a lot of spade work, but we can track down many of these hackers, and that's going on now," FBI spokesman Frank Scafidi said. "We'll catch a few, no matter how deep they hide in their basements. Someone will go to jail for some real time. That will have impact."

107. TLC :: Hackers' Hall Of Fame
May 15, 2004 EDT. Richard Stallman. Handle None (nothing to hide!)Claim to fame A hacker of the old school, Stallman walked in
http://tlc.discovery.com/convergence/hackers/bio/bio.html
June 03, 2004 EDT OAS_RICH("hedthick"); Richard Stallman Handle: None (nothing to hide!)
Claim to fame: A hacker of the old school, Stallman walked in off the street and got a job at MIT's Artificial Intelligence Lab in 1971. He was an undergraduate at Harvard at the time. Disturbed that software was viewed as private property, Stallman later founded the Free Software Foundation. First encountered a computer: In 1969, at the IBM New York Scientific Center. He was 16 years old. Unusual tools: Little-known fact: Recipient of a $240,000 MacArthur Foundation genius grant. Current status: Richard Stallman has just published his latest book, Free Software, Free Society: Selected Essays of Richard M. Stallman , available through GNU Press.
By visiting this site, you agree to the terms and conditions
of our Visitor Agreement . Please read.
2004 Discovery Communications Inc.
The leading global real-world media and entertainment company.

108. HackHull?
Group of Hackers in the United Kingdom. Information about meetings, projects, and links to personal pages.
http://www.hackhull.com/

Meets
On Tour Projects Conferences ... Links Use this graphic (left) to put a link to the hackHull? site on your Web page!
Website by Gremlin Cap'n B hackHull? at bubble@hackhull.com shite last updated: 04/01/2004

109. E-gineer - PHP: Hackers Paradise
PHP Hackers Paradise. by Nathan Wallace (March 10th, 2000) Note There isa follow up talk to this one called PHP Hackers Paradise Revisited.
http://www.e-gineer.com/articles/php-hackers-paradise.phtml
home articles instructions links ... Knowledge E-gineer
One of the new PHP
products from Synop
PHP: Hackers Paradise
by Nathan Wallace (March 10th, 2000)
RTF Version

PowerPoint 2000 Slides

Note: There is a follow up talk to this one called PHP: Hackers Paradise Revisited . It has some changes and extra information, but makes a lot of references to this article.
1 Introduction
PHP ( http://www.php.net ) is a powerful server side web scripting solution. It has quickly grown in popularity and according to the 2000 January Netcraft Web Server Survey PHP is installed on 12.8% of all web sites. Much of its syntax is borrowed from C, Java and Perl with a couple of unique PHP-specific features thrown in. The goal of the language is to allow web developers to write dynamically generated pages quickly. Being a good PHP hacker isn't just about writing single line solutions to complex problems. For example, web gurus know that speed of coding is much more important than speed of code. In this article we'll look at techniques that can help you become a better PHP hacker. We'll assume that you have a basic knowledge of PHP and databases. If nothing else, you should leave here with the 3 key ideals for PHP hackers:

110. CNN.com - Sci-Tech - U.S., Chinese Hackers Continue Web Defacements - May 2, 200
CNN
http://cnn.com/2001/TECH/internet/05/02/china.hacks.idg/index.html
MAIN PAGE
WORLD

U.S.

WEATHER
...
ABOUT US

CNN TV what's on
show transcripts

CNN Headline News

CNN International
...
askCNN

EDITIONS CNN.com Asia CNN.com Europe set your edition Languages Spanish Portuguese German Italian Danish Japanese Korean Arabic Time, Inc. Time.com People Fortune EW
U.S., Chinese hackers continue Web defacements
From... By Sam Costello (IDG) Two days into what was supposed to be a 'cyberwar' launched by Chinese hackers in retaliation for the death of Chinese pilot Wang Wei, a number of U.S. government Web sites have been defaced. But groups of U.S. hackers have entered the picture as well, hacking Chinese sites. Attrition.org, a nonprofit security site which hosts mirrors of defaced Web pages for research purposes, has mirrors of dozens of pages that have been cracked by both U.S. and Chinese hackers in the past two days. Among them are a number of U.S. government and military sites, including the U.S. Geological Survey, Eastern Region, the Hurricane Liaison Team of the Federal Emergency Management Agency and the headquarters of the commander of the Naval Surface Force of the U.S. Atlantic Fleet. MESSAGE BOARDS Security on the Net China-U.S. relations

111. E-gineer - Articles - PHP: Hackers Paradise Revisited
PHP Hackers Paradise Revisited. by Nathan Wallace (April 4th, 2001). Note.This is an improvement / follow up to PHP Hackers Paradise.
http://www.e-gineer.com/articles/php-hackers-paradise-revisited.phtml
home articles instructions links ... Knowledge E-gineer
One of the new PHP
products from Synop
PHP: Hackers Paradise Revisited
by Nathan Wallace (April 4th, 2001)
    Note
    This is an improvement / follow up to PHP: Hackers Paradise . You might like to read it first, or refer to it at various times since I choose to repeat myself as little as possible.
  • Introduction
    PHP ( http://www.php.net ) is a powerful server side web scripting solution. It has quickly grown in popularity and according to the February 2001 usage stats PHP is installed on 19.8% of all web sites (up 7% from when I gave a similar talk last year). Much of its syntax is borrowed from C, Java and Perl with some unique PHP-specific features thrown in. The goal of the language is to allow web developers to write dynamically generated pages quickly. Being a good PHP hacker isn't just about writing single line solutions to complex problems. For example, web gurus know that speed of coding is much more important than speed of code. In this article we'll look at techniques that can help you become a better PHP hacker. We'll assume that you have a basic knowledge of PHP and databases. The main topics that I want to cover today are:
    • Laziness is a Virtue
    • PHP First Principles
    • Chameleon Coding
    • Speed of Coding, Not Speed of Code
  • 112. [ESpEcIaL[De]^[JaMon]^
    Protecciones y atacadores, scripting, mp3, revista de Hackers y crackers, utilitarios, mIRC, y2k, manuales de IRC y scripting.
    http://www.geocities.com/especial_de_jamon

    113. Hacking The TiVo
    The unofficial TiVo Hackers Site. This site contains information and utilitiesto use to hack your TiVo. TiVo Hackers development Releases
    http://www.tivofaq.com/hack/
    The unofficial TiVo Hackers Site
    This site contains information and utilities to use to hack your TiVo. It should be noted that most of the things detailed here will void your TiVo's warranty. You do this at your own risk. Do not come crying if you damage your TiVo. The first thing you should check out is the "Hacking the TiVo FAQ". This contains the most update information on hacking your TiVo and lots of interesting info about the TiVo unit in general. Click to read the TiVo Hacking FAQ To add a second drive to your TiVo you will need the BlessTiVo program. It is available on a standalone Linux bootdisk created by an AVS member named Dlyan. Be sure to read the above FAQ first and the readme included with the BlessTiVo program before attempting this upgrade. Click to download BlessTiVo Version 3 , click to view the readme file (also included in the BlessTiVo archive). If you would like to download the C source code to the BlessTiVo program you can download it here . The code is released under the GPL. If you make any changes to it, feel free to send them to me for inclusion in the official version. If you port the program to another OS or platform please send your changes to me for inclusion into the official version. Also to see many of the latest stuff for hacking the TiVo, check out the following links.

    114. CNN.com - Technology - Justice Dept. Says New Laws Needed To Track Hackers - Mar
    CNN
    http://www.cnn.com/2000/TECH/computing/03/02/hack.track.idg/index.html
    technology > computing Editions myCNN ... Feedback
    CNN Sites CNN CNN Europe CNNfn CNNSI myCNN CNNfyi AllPolitics Languages
    Search
    CNN.com CNNSI.com CNNfn.com The Web
    TECHNOLOGY

    TOP STORIES
    Consumer group: Online privacy protections fall short

    Guide to a wired Super Bowl

    Debate opens on making e-commerce law consistent

    MORE

    TOP STORIES More than 11,000 killed in India quake Mideast negotiators want to continue talks after Israeli elections MORE BUSINESS ... MORE MARKETS 4:30pm ET, 4/16 DJIA NAS SPORTS Jordan says farewell for the third time ... LOCAL EDITIONS: CNN.com Europe change default edition MULTIMEDIA: video video archive audio multimedia showcase ... more services E-MAIL: Subscribe to one of our news e-mail lists Enter your address: DISCUSSION: chat feedback CNN WEB SITES: CNNfyi.com CNN.com Europe AsiaNow Spanish ... Korean Headlines TIME INC. SITES: Go To ... Time.com People Money Fortune EW CNN NETWORKS: CNN anchors transcripts Turner distribution SITE INFO: help contents search ad info ... jobs WEB SERVICES: Main Page Bracing for Cyberwar Hacking Primer Scenes from the 'Hacker Underground' ... Related Sites
    Justice Dept. says new laws needed to track hackers
    From...

    115. The Linux Kernel Hackers' Guide
    Linux Kernel Hackers Guide. About the new KHG. The Linux Kernel Hackers Guidehas changed quite a bit since its original conception four years ago.
    http://en.tldp.org/LDP/khg/HyperNews/get/khg.html
    The HyperNews Linux KHG Discussion Pages
    Linux Kernel Hackers' Guide
    Due to the fact that nearly every post to this site recently has been either by rude cracker-wannabes asking how to break into other people's systems or a request for basic technical support, posting to the KHG has been disabled, probably permanently. For now, you can read old posts, but you cannot send replies. In any case, there are now far better resources available.
    Go get the real thing!
    Alessandro Rubini wrote Linux Device Drivers , which is what the KHG could have been (maybe) but isn't. If you have a question and can't find the answer here, go get a copy of Linux Device Drivers and read itchances are that when you are done, you will not need to ask a question here. Run, don't walk to get a copy of this book.
    The Linux Kernel
    Go read The Linux Kernel if you want an introduction to the Linux kernel that is better than the KHG. It is a great complement to Linux Device Drivers . Read it.
    Table of Contents
    Tour of the Linux Kernel
    This is a somewhat incomplete tour of the Linux Kernel, based on Linux 1.0.9 and the 1.1. x development series. Most of it is still relevant.

    116. CNN - Hackers As Hired Guns - February 8, 2000
    CNN
    http://www.cnn.com/2000/TECH/computing/02/08/hired.guns.idg/index.html
    [an error occurred while processing this directive]
    MAIN PAGE
    WORLD U.S. LOCAL ... daily almanac
    MULTIMEDIA:
    video
    video archive audio multimedia showcase ... more services
    E-MAIL:
    Subscribe to one of our news e-mail lists.
    Enter your address: document.write(' '); Or:
    Get a free e-mail account

    E-MAIL
    DISCUSSION: message boards chat feedback
    CNN WEB SITES:
    AsiaNow
    Svenska Norge Danmark ... Italian FASTER ACCESS: europe japan TIME INC. SITES: Go To ... Time.com People Money Fortune EW CNN NETWORKS: more networks transcripts SITE INFO: help contents search ad info ... jobs WEB SERVICES: From...
    Hackers as hired guns
    February 8, 2000 Web posted at: 8:36 a.m. EST (1336 GMT) by Ellen Messmer (IDG) Security start-up @Stake has caused quite a sensation since its recent launch as a professional services firm employing members of the hacker nether world as hired guns sent out to test corporate networks for vulnerabilities. So far, @Stake has no marquee corporate customers willing to state they have actually hired any of the company's two dozen or so hacker employees to give them advice on how to secure their networks, from selecting firewalls and antivirus software to setting up e-commerce applications. These employees include Mudge - the leader of the underground group L0pht - and even more amazingly, Dildog, top dog in the notorious Cult of the Dead Cow (CDC).

    117. PGI: Progeny Graphical Installer
    PGI — the Progeny Graphical Installer.
    http://hackers.progeny.com/pgi/

    (PGI is pronounced "piggy".)
    (...and yes, we know that's a warthog)
    About PGI
    PGI is a multi-architecture graphical installer creation system for Debian GNU/Linux , originally developed by Progeny Linux Systems, Inc. for our Debian-based "Progeny Debian" operating system. Our distribution is defunct, but our code is not, and we have been contributing it freely licensed back to the Debian Project. The PGI Debian package enables the user to create ISO images containing a bootable installer (PGI) which guides the user through the steps of installation. The installer supports text and graphical installation modes. PGI runs debootstrap PGI is extensible and customizable. Two sample extensions are provided with this package; one uses the base-config package, while the other configures the installed system using the X-based Configlet system, also developed by Progeny. Two manuals are provided.

    118. CNN - Hackers Attack U.S. Government Web Sites In Protest Of Chinese Embassy Bom
    CNN
    http://www.cnn.com/TECH/computing/9905/10/hack.attack/index.html

    MAIN PAGE
    WORLD ASIANOW U.S. ... news quiz
    CNN WEB SITES: TIME INC. SITES: Go To ... Time.com People Money Fortune EW MORE SERVICES: video on demand video archive audio on demand news email services ...
    pagenet

    DISCUSSION: message boards chat feedback
    SITE GUIDES: help contents search
    FASTER ACCESS: europe japan
    WEB SERVICES:
    Hackers attack U.S. government Web sites in protest of Chinese embassy bombing
    May 10, 1999

    Web posted at: 5:20 p.m. EDT (2120 GMT)
    WASHINGTON (CNN) Computer hackers protesting NATO's bombing of the Chinese embassy in Belgrade attacked three U.S. government Web sites on Sunday, government officials tell CNN. The hackers briefly planted messages condemning the bombing, prompting at least one Cabinet department Web site to remain closed through Monday. It is not clear whether the hackers were located in China or elsewhere. The main Web sites for the Energy and Interior departments and the National Park Service were targeted Sunday. Hackers inserted messages of protest of the NATO bombing of the Chinese embassy into the agencies' home pages. The pictures of three Chinese journalists who died in the bombing were briefly posted on the Interior Department Web page. The Interior and Park Service sites were only briefly disrupted, but the main Energy Department site was still off line as of 3 p.m. EDT Monday for what a DOE spokesman said was "investigation" of the hacking episode. Sub-sites for Energy Department programs were protected by electronic "firewalls" and were not affected by the hacking, the spokesman said.

    119. Keep Hackers Out: Part One, Personal Edition
    Home Features Cover Story Keep Hackers Out Part One, Personal Edition. ADVERTISEMENT.Keep Hackers Out Part Two, Professional Edition, next .
    http://www.pcmag.com/article2/0,4149,653189,00.asp

    My Account
    All Sites PC Magazine var jBreadcrumbTitle; jBreadcrumbTitle = "Keep Hackers Out: Part One, Personal Edition"; Home Features Cover Story document.write(jBreadcrumbTitle);
    Keep Hackers Out: Part One, Personal Edition
    By Konstantinos Karagiannis and Matthew D. Sarrel
    November 19, 2002
    Total posts: 20

    As we rely more on our computers, the potential for hackers to hurt us through them likewise has grown, threatening to expose or destroy our private data and personal records. Current hacker tools are sophisticated, automated, and more difficult to spot. In addition, broadband connections have made us more vulnerable; always-connected computers, typically with static or rarely changing IP addresses (the addresses computers on the Internet use to find you), give would-be attackers unlimited time to discover and exploit system vulnerabilities. With a few tricks and tools, however, you can secure your home or small-office computer against the average hacker searching for the low-hanging fruit. ADVERTISEMENT Keep Hackers Out: Part Two, Professional Edition

    120. CNN.com - Pentagon Still Under Assault From Hackers - August 9, 2000
    CNN
    http://www.cnn.com/2000/TECH/computing/08/09/cybersecurity.reut/index.html
    technology computing Editions myCNN ... Feedback
    CNN Sites CNN CNN Europe CNNfn CNNSI myCNN CNNfyi AllPolitics Languages
    Search
    CNN.com CNNSI.com CNNfn.com The Web
    TECHNOLOGY

    TOP STORIES
    Consumer group: Online privacy protections fall short

    Guide to a wired Super Bowl

    Debate opens on making e-commerce law consistent

    MORE

    TOP STORIES More than 11,000 killed in India quake Mideast negotiators want to continue talks after Israeli elections MORE BUSINESS ... MORE MARKETS 4:30pm ET, 4/16 DJIA NAS SPORTS Jordan says farewell for the third time ... LOCAL EDITIONS: CNN.com Europe change default edition MULTIMEDIA: video video archive audio multimedia showcase ... more services E-MAIL: Subscribe to one of our news e-mail lists Enter your address: DISCUSSION: chat feedback CNN WEB SITES: CNNfyi.com CNN.com Europe AsiaNow Spanish ... Korean Headlines TIME INC. SITES: Go To ... Time.com People Money Fortune EW CNN NETWORKS: CNN anchors transcripts Turner distribution SITE INFO: help contents search ad info ... jobs WEB SERVICES:
    Pentagon still under assault from hackers
    BETHESDA, Maryland (Reuters) U.S. Defense Department pleas to computer hackers to quit mischief-making appear to be falling largely on deaf ears, making spotting potential national security threats more difficult, a top Pentagon expert said on Tuesday. Despite recent appeals, "we're not seeing any diminishing" of the pace of attacks on Defense Department systems, said Richard Schaeffer, who heads the cyber-security office in the Pentagon arm responsible for command, control, communications and intelligence.

    A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

    Page 6     101-120 of 195    Back | 1  | 2  | 3  | 4  | 5  | 6  | 7  | 8  | 9  | 10  | Next 20

    free hit counter