Search Details

Word: hacker (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

...friends. Cagri, who "invitates" any young women coming to his hometown of Izmir to stay in his home, has provoked Clinton-based parodies, flash animations and a large Web fan club. He told the Turkish press that the site was a joke perpetrated on him by a teenage hacker, and reported the theft of his original Web page to the police. Cagri, who follows Islamic custom by praying five times a day, says he's alarmed by the thousands of e-mails he receives daily, mostly from women. Now he might be the one "invitated" abroad to barter his fame...

Author: /time Magazine | Title: Internet | 11/22/1999 | See Source »

...HACKER INSURANCE With hackers seemingly able to break into even the most secure systems at big corporations, small businesses have been reluctant to take orders and credit-card payments online--fewer than a third of them do. But where there's fear, there's opportunity. A handful of insurance companies offer antihacker policies to small companies. For $1,500 a year, INSUREtrust.com covers up to $5 million for hacker-induced losses, including third-party lawsuits. Similar policies are offered by Evanston Insurance Co. and Lloyd's of London. Alas, none of these policies will bail you out when you crash...

Author: /time Magazine | Title: In Brief: Nov. 8, 1999 | 11/8/1999 | See Source »

...other bad news on cable modems--and this is why I'm a little mollified that I can't have one yet--is that they're more vulnerable to hacker attacks than regular set-ups. You see, one of the strengths of surfing via cable is that you're online 24 hours a day and don't have to disconnect every time you want to order Chinese food. But that can also be a weakness, because your IP address (the ZIP code of the Internet) doesn't change. Dial-up users like me who are still crawling along...

Author: /time Magazine | Title: Hacker's Delight | 11/1/1999 | See Source »

...most common attack reported by hacker watchers makes use of a Trojan horse. These are programs with bizarre names like Back Orifice or Net Bus that can be hidden in an e-mail attachment--say, one of those animated birthday cards people seem to like e-mailing. Once you open it, you've installed the software--and the wily hacker has remote control of your...

Author: /time Magazine | Title: Hacker's Delight | 11/1/1999 | See Source »

...sure, dial-up users get hit by Trojans too. But all the extra bandwidth provided by cable modems makes hackers salivate. If you've hooked up a microphone, the remote-access hacker can listen to your conversations in real-time. If you own one of those little monitor-top video cameras, he can watch you like Big Brother...

Author: /time Magazine | Title: Hacker's Delight | 11/1/1999 | See Source »

Previous | 28 | 29 | 30 | 31 | 32 | 33 | 34 | 35 | 36 | 37 | 38 | 39 | 40 | 41 | 42 | 43 | 44 | 45 | 46 | 47 | 48 | Next