Search Details

Word: hacker (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

...founder of the hacker group Global Hell, it was not the best of mornings. Chad Davis, 19, of Green Bay, Wis., had heard that the FBI had raided the homes of some of the more rambunctious members of his cybergang, better known on the Internet as gH. Davis (a.k.a. MindPhasr) also knew that within hours of those raids a retaliatory attack had taken the official FBI website out of action. But this was Saturday, three days later, and Davis assumed that the heat had passed. "I really wasn't expecting it to happen to me," he says...

Author: /time Magazine | Title: Geeks vs. G-Men | 6/14/1999 | See Source »

There has never been much love lost between geeks and G-men. But after a big software-piracy crackdown in 1990 generated more bad publicity than convictions, the feds have largely held their fire. The most famous exception is Kevin Mitnick, the "dark side" hacker who became a cybermartyr after languishing in jail for four years without trial. Mitnick eventually copped a plea; he is set to be sentenced next Monday...

Author: /time Magazine | Title: Geeks vs. G-Men | 6/14/1999 | See Source »

...right? Wrong. It was only the beginning of what hacker watchdog John Vranesevich, founder of AntiOnline, calls an "online temper tantrum." Word spread to wired dorms and bedrooms all over the world that U.S. government sites were the target du jour. A group called Masters of Downloading replaced the Senate's home page with its own anti-FBI screed; a Portuguese hacker named M1crochip defaced an obscure Interior Department page and vowed famously (at least for 15 minutes) to "go after every computer on the Net with a [name that ends...

Author: /time Magazine | Title: Geeks vs. G-Men | 6/14/1999 | See Source »

Strom said the hacker's entrance caused little trouble beyond the annoyance of creating a new password...

Author: By Jason M. Goins, CRIMSON STAFF WRITER | Title: WJH E-mail Accounts Corrupted, Users Asked to Change Passwords | 6/8/1999 | See Source »

...typical in hacking incidents like this, the hacker did not tamper with individual accounts...

Author: By Jason M. Goins, CRIMSON STAFF WRITER | Title: WJH E-mail Accounts Corrupted, Users Asked to Change Passwords | 6/8/1999 | See Source »

Previous | 30 | 31 | 32 | 33 | 34 | 35 | 36 | 37 | 38 | 39 | 40 | 41 | 42 | 43 | 44 | 45 | 46 | 47 | 48 | 49 | 50 | Next