Search Details

Word: hackers (lookup in dictionary) (lookup stats)
Dates: during 1990-1999
Sort By: most recent first (reverse)


Usage:

...Vladimir Putin, has no tolerance for Western interference but apparently feels free to accept Western dollars, spending $115 million on Russia's military. How long will it be before the U.S. is once again facing a hostile enemy prepared to wage war against it with U.S.-financed weapons? ADAM HACKER Nepean...

Author: /time Magazine | Title: Letters: Dec. 27, 1999 | 12/27/1999 | See Source »

...friends. Cagri, who "invitates" any young women coming to his hometown of Izmir to stay in his home, has provoked Clinton-based parodies, flash animations and a large Web fan club. He told the Turkish press that the site was a joke perpetrated on him by a teenage hacker, and reported the theft of his original Web page to the police. Cagri, who follows Islamic custom by praying five times a day, says he's alarmed by the thousands of e-mails he receives daily, mostly from women. Now he might be the one "invitated" abroad to barter his fame...

Author: /time Magazine | Title: Internet | 11/22/1999 | See Source »

...HACKER INSURANCE With hackers seemingly able to break into even the most secure systems at big corporations, small businesses have been reluctant to take orders and credit-card payments online--fewer than a third of them do. But where there's fear, there's opportunity. A handful of insurance companies offer antihacker policies to small companies. For $1,500 a year, INSUREtrust.com covers up to $5 million for hacker-induced losses, including third-party lawsuits. Similar policies are offered by Evanston Insurance Co. and Lloyd's of London. Alas, none of these policies will bail you out when you crash...

Author: /time Magazine | Title: In Brief: Nov. 8, 1999 | 11/8/1999 | See Source »

...most common attack reported by hacker watchers makes use of a Trojan horse. These are programs with bizarre names like Back Orifice or Net Bus that can be hidden in an e-mail attachment--say, one of those animated birthday cards people seem to like e-mailing. Once you open it, you've installed the software--and the wily hacker has remote control of your...

Author: /time Magazine | Title: Hacker's Delight | 11/1/1999 | See Source »

...sure, dial-up users get hit by Trojans too. But all the extra bandwidth provided by cable modems makes hackers salivate. If you've hooked up a microphone, the remote-access hacker can listen to your conversations in real-time. If you own one of those little monitor-top video cameras, he can watch you like Big Brother...

Author: /time Magazine | Title: Hacker's Delight | 11/1/1999 | See Source »

| 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | Next