Search Details

Word: hacker (lookup in dictionary) (lookup stats)
Dates: during 2000-2009
Sort By: most recent first (reverse)


Usage:

...written in 1999, when the fears that a massive technological glitch would bring about worldwide destruction were at their height. Though the titular epoch has passed, the story about a young “power couple” whose identities are stolen by a somewhat maddened young computer hacker remains truthful, frightening and, ultimately, thrilling...

Author: By Mary CATHERINE Brouder, CRIMSON STAFF WRITER | Title: Hacker Thriller Hits Close to Home | 5/5/2005 | See Source »

...role that was written for a young male in the original script—the play is taking some adventurous interpretive chances. It is a particularly daring switch because one of the play’s central conceits is an ambiguity over whether or not the hacker has a sexual relationship with the wife of the couple...

Author: By Mary CATHERINE Brouder, CRIMSON STAFF WRITER | Title: Hacker Thriller Hits Close to Home | 5/5/2005 | See Source »

...perfectly reasonable. Unknown Core was, he asserted, helping HCS: they had found a vulnerability in our server and had pointed it out to us while doing only a very small amount of easily repairable damage. Wasn’t this better, he asked, than had some other more malicious hacker come along and tried to use the security breach to more nefarious ends? He wasn’t interested in my suggestion that he might have emailed us instead. He didn’t seem bothered by my claim he was just pointing out holes in Swiss Cheese anyway...

Author: By Matthew A. Gline, CRIMSON STAFF WRITER | Title: Anatomy of an Attack | 5/3/2005 | See Source »

...modem and telephone, a young software saboteur penetrated the system at Manhattan's Memorial Sloan-Kettering Cancer Center with another kind of subversive programming, called a "trap door." The program collected users' passwords as they logged on. No matter how often legitimate users changed their sign-on codes, the hacker was able to gain unauthorized access to the hospital's records by summoning the intervening trapdoor and reading off the newly accumulated list of passwords. The culprit was later apprehended. He pleaded guilty and faced a maximum penalty of six months in jail and a $500 fine...

Author: /time Magazine | Title: Computers: A Threat from Malicious Software | 4/18/2005 | See Source »

...Jersey enthusiast who used the alias "New Jersey Hack Sack" and communicated regularly with other computer owners over a loosely organized network of electronic bulletin boards. A computer search of the contents of those boards by Detective George Green and Patrolman Michael Grennier, who is something of a hacker himself, yielded a flood of gossip, advice, tall tales and hard information, including excerpts from an AT&T satellite manual, dozens of secret telephone numbers and lists of stolen credit card numbers...

Author: /time Magazine | Title: Computers: The Great Satellite Caper | 4/12/2005 | See Source »

Previous | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | Next