Search Details

Word: hacker (lookup in dictionary) (lookup stats)
Dates: during 2000-2009
Sort By: most recent first (reverse)


Usage:

Bram Cohen was an unusual kid. While other first-graders were outside playing, he was writing computer code. By junior high, he could solve Rubik's Cube in a few minutes. A college dropout, he went on to co-found a hacker's convention in San Francisco. "I was always really weird," he says. Yet it was only two years ago, at age 27, that he learned why. Studying psychological conditions, he determined that he had Asperger syndrome, a mild form of autism, which explained his social difficulties and seemed tied to his obsession with puzzles. Cohen says...

Author: /time Magazine | Title: Downloading Hollywood | 2/6/2005 | See Source »

Myers said the Heisenberg Uncertainly Principle implied that a hacker could not steal a key encoded in weak light waves en route to its destination without altering the key itself...

Author: By Alan J. Tabak, CRIMSON STAFF WRITER | Title: Scientists Work On Quantum Code | 8/13/2004 | See Source »

Myers added that the Heisenberg Uncertainty Principle guaranteed that a hacker could not steal the same code that would ultimately be received...

Author: By Alan J. Tabak, CRIMSON STAFF WRITER | Title: Scientists Work On Quantum Code | 8/13/2004 | See Source »

While the puerile creators of Bagle, Netsky and others may eventually tire of their war, there will doubtless be many more to take their place. The demonstrated ease with which these socially-engineered viruses have spread is an tantalizingly simple way to achieve hacker immortality for anyone familiar with Visual C++ at the …for Dummies level and above. And with antivirus companies releasing new updates daily to combat new variants, even day-old protection files can damn computers to virus hell...

Author: By Alex Slack, | Title: Byting Bagles | 4/13/2004 | See Source »

...fire will convince new and novice users that e-mail attachments aren’t necessarily friendly. Because if not, socially-engineered viruses with payloads that do more than open security holes—like payloads that delete files or steal passwords—could make the current hacker spat seem like a fond memory...

Author: By Alex Slack, | Title: Byting Bagles | 4/13/2004 | See Source »

Previous | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | Next