Search Details

Word: hackers (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

...House vote 7. He suspended Strawberry 9. Troops here may have got defective chemical suits 12. He labeled McCain "anti-New York" 13. McCain called Robertson and Falwell "__ of intolerance" 14. Kind of discrimination 15. Spain's Princess __ 17. Politically incorrect suffix 18. Novi Sad resident 20. __ attack (hacker's ploy) 21. Cass Elliot was one 22. China won't relinquish its right to use force here 24. Went white 25. Arbitrator Shyam __, who halved Rocker's suspension 26. Women's patriotic org. 27. Airline that's going Chapter 11 30. Kind of profiling at issue 33. Score after deuce...

Author: /time Magazine | Title: News Quiz Crossword Mar. 20, 2000 | 3/20/2000 | See Source »

...makings of a headline news story. A hacker had supposedly broken into the grading system for an MIT biology class and changed the grades of 22 students...

Author: By Eric S. Barr, CONTRIBUTING WRITER | Title: Suspected Cheating at MIT is Debunked | 3/10/2000 | See Source »

There were warning signs. Back in December the FBI and a number of private security firms began detecting countless dormant daemons cropping up on servers across the country. Scan yourselves with detection software, urged the hacker trackers. Evidently not enough sites did. That changed after the attack; downloads of the Feds' scanning tool shot up from 170 on Monday to 4,223 on Thursday...

Author: /time Magazine | Title: Behind The Hack Attack | 2/21/2000 | See Source »

Case in point: John Vranesevich, founder of hacker-watch website AntiOnline.com seen by many hackers as something of a Benedict Arnold. So loathed is he that AntiOnline is an almost constant target for DOS attacks (in one of its more entertaining features, the site lets you see who's attacking it, and how, in real time). While the Feds were still holding press conferences, AntiOnline had already compiled a perp-profile sheet. The attacks, it says, were committed by a cell of three to six hackers--most likely teenagers, most likely male. "All DOS attacks have been perpetrated by more...

Author: /time Magazine | Title: Behind The Hack Attack | 2/21/2000 | See Source »

...seeing the actions of apparent vandals--not hackers--who are using tools that hackers developed. No hacker I've ever heard of would do anything remotely resembling these attacks. I mean, it's not as though they have to "get root" on Yahoo's servers to do these things. Unless these people are extremely skilled, they'll be caught quite quickly. If these actions have economic gain as their motive, the perpetrators may have the resources to avoid arrest much longer...

Author: /time Magazine | Title: The World's Most Hunted Hacker | 2/21/2000 | See Source »

Previous | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | 33 | 34 | 35 | 36 | 37 | 38 | 39 | 40 | 41 | 42 | 43 | 44 | 45 | Next