Search Details

Word: hackers (lookup in dictionary) (lookup stats)
Dates: during 2000-2009
Sort By: most recent first (reverse)


Usage:

...Alanis Morissette to spot the irony in a zillionaire celebrity pleading for sympathy. After a spoofed version of Madonna's new album, American Life, started circulating on the Net, featuring a recording of the Material Girl saying "What the f___ do you think you're doing?", a hacker took over the singer's website, Madonna.com and posted real, downloadable MP3s of every song on the album...

Author: /time Magazine | Title: It's All Free! | 5/5/2003 | See Source »

...services compete? Maybe. Can antipiracy laws be enforced? Perhaps. Can copy protection stand up to a hacker army of teenage Jon Johansens? It's possible. But all this raises an interesting question: What if the pirates win? If you play the thought experiment out to its logical extreme, the body count is high. After all, you can't have an information economy in which all information is free. The major music labels would disappear; ditto the record stores that sell their CDs. The age of millionaire rock stars would be over; they would become as much a historical curiosity...

Author: /time Magazine | Title: It's All Free! | 5/5/2003 | See Source »

...Crimson Cash service is provided by Blackboard Inc., a Washington, D.C.--based company that has installed similar systems in more than 400 schools and businesses. According to material posted on the Internet by the two student hackers, the weakness of Blackboard systems arises from the reliance on physical rather than electronic security: transaction information travels unencrypted between card-swipe terminals and servers. According to the hackers, the wiring that carries this information is often easily accessible, making it very easy to tap into the system. A hacker can then record and emulate the signals transmitted when a person uses...

Author: By The CRIMSON Staff, | Title: Crimson Crash | 4/23/2003 | See Source »

...complaint alleges that a student at the Georgia Institute of Technology, which uses the same software as Harvard, broke into the system, posted information about it on his website, and claimed that he would publicly disclose his finding at an upcoming hacker conference...

Author: By Kimberly A. Kicenuik, CRIMSON STAFF WRITER | Title: Swipe Card Hack Prompts Complaint | 4/16/2003 | See Source »

Hoffman then allegedly posted photographs and description of the system on his website www.yak.net, as well as claims that he would publicly disclose his findings at an upcoming hacker conference, the complaint says...

Author: By Kimberly A. Kicenuik, CRIMSON STAFF WRITER | Title: Swipe Card Hack Prompts Complaint | 4/16/2003 | See Source »

Previous | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | Next