Search Details

Word: hackers (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

...targets are not your stereotypical teenage hacker,” Customs Service Assistant Commissioner John Varrone told the Associated Press...

Author: By Andrew P. Winerman, CONTRIBUTING WRITER | Title: FBI Cracks Down on Software Piracy | 12/13/2001 | See Source »

...HACKER THREAT...

Author: /time Magazine | Title: Global Briefing: Nov. 26, 2001 | 11/26/2001 | See Source »

...letting employees use wireless devices to tap into their company's local network. But they may be letting strangers in as well. A recent report by Cigital, a software-security company based in Dulles, Va., says the programs that facilitate wireless connections could make a network vulnerable to hackers. The software contains the addresses of all the machines that employees can access with their laptops, including the main servers at work. A skilled hacker could manipulate the software to gain access to all information on the internal network and could "effectively become the administrator of the network," says Cigital...

Author: /time Magazine | Title: Global Briefing: Nov. 26, 2001 | 11/26/2001 | See Source »

...steal the evidence against Papa Romano, and they need Corky to be the sacrificial lamb. While this crazy plot seems enough with regard to typical comedies, Corky Romano takes it a step further. In order to pull their plan off, Pete and Paul intimidate a computer hacker into making Corky a new identity with an FBI caliber resume. After the hacker is done with Corky, he becomes Agent Pissant, super agent, and is launched into his brothers’ crazy scheme...

Author: By Cassandra Cummings, CRIMSON STAFF WRITER | Title: Secret Agent Man: Uncorked | 10/12/2001 | See Source »

...rule, computer geeks might best be described as laid-back libertarians--they don't like laws encroaching on their territory, but they're usually too busy to care. Sklyarov's arrest changed all that. Since the DMCA makes it a criminal offense merely to make the tools that some hacker might use to crack security on a copyrighted document, hundreds of programmers suddenly feared they might also fall afoul of it. "I've been a programmer for 10 years, and this is the kind of thing you have to do all the time," says Evan Prodromou, one of the organizers...

Author: /time Magazine | Title: Throwing The E-Book At Him | 8/20/2001 | See Source »

Previous | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | 33 | 34 | 35 | 36 | 37 | Next