Search Details

Word: hackers (lookup in dictionary) (lookup stats)
Dates: during 2000-2009
Sort By: most recent first (reverse)


Usage:

...steal the evidence against Papa Romano, and they need Corky to be the sacrificial lamb. While this crazy plot seems enough with regard to typical comedies, Corky Romano takes it a step further. In order to pull their plan off, Pete and Paul intimidate a computer hacker into making Corky a new identity with an FBI caliber resume. After the hacker is done with Corky, he becomes Agent Pissant, super agent, and is launched into his brothers’ crazy scheme...

Author: By Cassandra Cummings, CRIMSON STAFF WRITER | Title: Secret Agent Man: Uncorked | 10/12/2001 | See Source »

...rule, computer geeks might best be described as laid-back libertarians--they don't like laws encroaching on their territory, but they're usually too busy to care. Sklyarov's arrest changed all that. Since the DMCA makes it a criminal offense merely to make the tools that some hacker might use to crack security on a copyrighted document, hundreds of programmers suddenly feared they might also fall afoul of it. "I've been a programmer for 10 years, and this is the kind of thing you have to do all the time," says Evan Prodromou, one of the organizers...

Author: /time Magazine | Title: Throwing The E-Book At Him | 8/20/2001 | See Source »

...rule, computer geeks might best be described as laid-back libertarians--they don't like laws encroaching on their territory, but they're usually too busy to care. Sklyarov's arrest changed all that. Since the DMCA makes it a criminal offense merely to make the tools that some hacker might use to crack security on a copyrighted document, hundreds of programmers suddenly feared they might also fall afoul of it. "I've been a programmer for 10 years, and this is the kind of thing you have to do all the time," says Evan Prodromou, one of the organizers...

Author: /time Magazine | Title: Throwing The E-Book At Him | 8/13/2001 | See Source »

Back Orifice is freely available online, along with newer hackware like SubSeven. There are sites like hack.co.za and astalavista.box.sk that hold a hacker's hand as he plans an assault on your computer. And there are mailing lists like BugTraq that offer up the latest viruses. As a hacker posted at astalavista.box.sk: "Nowadays, every idiot knowing how to press buttons is able to take control over your computer if you are not careful...

Author: /time Magazine | Title: Internet Insecurity | 7/2/2001 | See Source »

...Barcelona, historically the unofficial capital of European anarchism. The Internet has long been home turf for the anti-globalization movement, which uses electronic organizing methods to rally cosmopolitan crowds for protest events in different cities around the world. The venue shift is all but an invitation to every hacker of vaguely anarchic bent to show that electronic disruption can be even more effective than the insurrectionist tactics of the street. Indeed, a World Bank spokesman conceded that "we've taken reasonable precautions, but if there is a major effort to close us down, I can't promise that the computers...

Author: /time Magazine | Title: Anarchists 1, International Institutions 0 | 6/20/2001 | See Source »

Previous | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | 33 | 34 | 35 | 36 | Next