Word: hackers
(lookup in dictionary)
(lookup stats)
Dates: during 1990-1999
Sort By: most recent first
(reverse)
...Vladimir Putin, has no tolerance for Western interference but apparently feels free to accept Western dollars, spending $115 million on Russia's military. How long will it be before the U.S. is once again facing a hostile enemy prepared to wage war against it with U.S.-financed weapons? ADAM HACKER Nepean...
...friends. Cagri, who "invitates" any young women coming to his hometown of Izmir to stay in his home, has provoked Clinton-based parodies, flash animations and a large Web fan club. He told the Turkish press that the site was a joke perpetrated on him by a teenage hacker, and reported the theft of his original Web page to the police. Cagri, who follows Islamic custom by praying five times a day, says he's alarmed by the thousands of e-mails he receives daily, mostly from women. Now he might be the one "invitated" abroad to barter his fame...
...HACKER INSURANCE With hackers seemingly able to break into even the most secure systems at big corporations, small businesses have been reluctant to take orders and credit-card payments online--fewer than a third of them do. But where there's fear, there's opportunity. A handful of insurance companies offer antihacker policies to small companies. For $1,500 a year, INSUREtrust.com covers up to $5 million for hacker-induced losses, including third-party lawsuits. Similar policies are offered by Evanston Insurance Co. and Lloyd's of London. Alas, none of these policies will bail you out when you crash...
...most common attack reported by hacker watchers makes use of a Trojan horse. These are programs with bizarre names like Back Orifice or Net Bus that can be hidden in an e-mail attachment--say, one of those animated birthday cards people seem to like e-mailing. Once you open it, you've installed the software--and the wily hacker has remote control of your...
...sure, dial-up users get hit by Trojans too. But all the extra bandwidth provided by cable modems makes hackers salivate. If you've hooked up a microphone, the remote-access hacker can listen to your conversations in real-time. If you own one of those little monitor-top video cameras, he can watch you like Big Brother...