Word: hacker
(lookup in dictionary)
(lookup stats)
Dates: all
Sort By: most recent first
(reverse)
...read. Chad was the most looked-up word on merriam-webster.com last Friday. One possible derivation is from chat--small, white pieces of rock produced in lead mining. But what rock and paper have to do with each other (particularly without scissors) is unclear. Another theory, advanced by the New Hacker's Dictionary, is that chad stems from the "Chadless" paper punch, thought to be named after its inventor, that keeps the little pieces off the floor--ergo the pieces must be chad. "There is a legend that the word was originally acronymic," the dictionary adds, "standing for Card Hole Aggregate...
...stole passwords and credit card numbers; the MTX virus, on the other hand, destroys files and prevents a user from accessing certain websites. Even more dangerous than such worms, possibly, are Trojans. These virus-type programs allow someone else access to your computer. Once they're loaded on, the hacker can do almost anything with your system, from using it to hack other systems to opening new files from anywhere they choose to be. In the words of former Crimson editor Kevin S. Davis '96, Director of Residential Computing at Harvard, "If your computer starts acting like it's possessed...
...white pickup skids to a halt, the driver spotting a white-tailed doe and a buck in the brush off Sucker Creek Road in Alcona County. The deer are on private property, so if this hacker grabs his rifle and takes a shot, he's under arrest. Bob Mills, my partner, radios to our backups, Sergeant Pete Malette and Officer Warren MacNeill, who are hiding in a nearby grove. "We've got a looker," Mills tells them...
...sugary tea in Beirut's Shi'ite Muslim stronghold. But the 38-year-old self-taught Webmaster is holed up in a secret office where the Lebanese Islamic group Hizballah operates an Internet site that blasts propaganda against Israel. With a four-person staff, Hussein is fending off a hacker assault launched by Israelis. "They're going after us!" proclaims Hussein, who loads software designed to deflect the bulk messages that become e-mail bombs when they reach Hizballah's Web address...
...mentality, an us-vs.-them attitude toward the record labels and the press that has forced Fanning to retreat even farther into his shell. He has to monitor carefully what he says to whom and even what clothes he wears. "The cdc [the Cult of the Dead Cow, a hacker collective] guys sent me a shirt, and the lawyers told me I shouldn't wear it," he says. "It's just so tightly controlled...