Search Details

Word: hacker (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

...file also included a note from the hacker, self-identified as “kaboom73,” apparently deriding the vulnerability of the GSAS site’s server...

Author: By Byran Dai, CONTRIBUTING WRITER | Title: Flaw in GSAS Site Security Exposed | 2/20/2008 | See Source »

That idyllic thought was shaken this weekend when a hacker accessed the Web site of the Graduate School for Arts and Sciences (GSAS) and made its secure server available for download through the popular BitTorrent peer-to-peer file sharing site, “The Pirate Bay,” where users can easily obtain large files...

Author: By Byran Dai, CONTRIBUTING WRITER | Title: Flaw in GSAS Site Security Exposed | 2/20/2008 | See Source »

...uploaded file was accompanied by a message from the site’s hacker stating that the information was released to expose the vulnerability of Harvard’s servers...

Author: By Abby D. Phillip, CRIMSON STAFF WRITER | Title: Hackers Break Into GSAS Computer Network, Post Protected Content to Downloading Web Site | 2/19/2008 | See Source »

...response to questions from TIME, a faxed letter from China's State Council Information Office said accusations that the PLA was involved in hacker attacks against overseas targets were "groundless, irresponsible and also have ulterior motives." The Chinese police, the letter said, had received no requests from overseas governments asking for investigations of Chinese attacks on their websites. But reports in Chinese newspapers suggest that the establishment of a cybermilitia is well under way. In recent years, for example, the military has engaged in nationwide recruiting campaigns to try to discover the nation's most talented hackers. The campaigns...

Author: /time Magazine | Title: Enemies at The Firewall | 12/6/2007 | See Source »

...successful graduate of this system. He earned $4,000 in prize money from hacker competitions, enough to make him worthy of a glowing profile in Sichuan University's campus newspaper. Tan told the paper that he was at his happiest "when he succeeds in gaining control of a server" and described a highly organized selection and training process that aspiring cybermilitiamen (no cyberwomen, apparently) undertake. The story details the links between the hackers and the military. "On July 25, 2005," it said, "Sichuan Military Command Communication Department located [Tan] through personal information published online and instructed him to participate...

Author: /time Magazine | Title: Enemies at The Firewall | 12/6/2007 | See Source »

Previous | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | Next