Search Details

Word: hackers (lookup in dictionary) (lookup stats)
Dates: during 1990-1999
Sort By: most recent first (reverse)


Usage:

...study recent waves of cyber-attacks on the Pentagon's computer networks. Well, not quite. The hearings did reveal a new and "more systemic" pattern of assaults, says TIME Pentagon correspondent Mark Thompson, but nothing that should cause the nation to panic. "The Pentagon is simply learning that hacker probes are a cost of doing business over the Internet," he says. "These probes will continue to happen, and the military is just going to have to put up better cyber-guardrails...

Author: /time Magazine | Title: Cyber-Guerrillas Harass Pentagon, but Can't Hit Central Defenses | 3/5/1999 | See Source »

...down TIME.com poll popularity into three categories of voting results: the thousands, the tens of thousands, and the hundreds of thousands (and up). It's simple statistical penetration: How many web users come to a posted poll before one of them happens to be a serious -- and seriously skilled -- hacker? A mild-mannered TIME Daily poll such as "No more Independent Counsels?" fell into the first category -- fewer than 2,000 votes in its first week -- and it tantalized no intruders...

Author: /time Magazine | Title: When Robots Attack Online Polls: A Report on Ourselves | 2/26/1999 | See Source »

...entertainment-industry consulting firm. "Morality is what the community consensus decides is morality. And they're a tribe of cannibals out there." A typical consumer is American University freshman Jaymin Patel. "I've had MP3s for about two years now," he says. "I first learned about them from a hacker friend who told me I'd never have to buy a CD again...

Author: /time Magazine | Title: You've Got Music! | 2/22/1999 | See Source »

...disagree that these commands should be removed. By disabling commands, one reduces the ability of the network to function as intended. In addition, one can introduce a security hole in the system. For example, a hacker figures out my password and logs in to my account to run amok in the network. I use the "last" command to see when I last logged in, and I notice a location or time that I know I did not login. (One caveat--"last" only works on the current machine, for example, login4, so to be thorough, one must...

Author: NO WRITER ATTRIBUTED | Title: `Plea for Privacy' Misguided | 1/22/1999 | See Source »

...purpose of the hack was to protest the role Times reporter John. Markoff played in the imprisonment of hacker Kevin Mitnick...

Author: By Daniel J. Mahr and Carrie P. Peek, CONTRIBUTING WRITERSS | Title: It's Hip to Hack | 12/8/1998 | See Source »

Previous | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | Next