Search Details

Word: osterberg (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

...information was lost or damaged, however, according to Coordinator of Residential Computing Support Rick Osterberg...

Author: By Robert K. Silverman, CONTRIBUTING WRITER | Title: Internet Hacker Breaks Into Eliot House Network | 10/7/1998 | See Source »

Packet sniffers gather all information, including usernames and passwords, passing over the network while the program is running. This information is then available to the hacker, according to Osterberg...

Author: By Robert K. Silverman, CONTRIBUTING WRITER | Title: Internet Hacker Breaks Into Eliot House Network | 10/7/1998 | See Source »

...isolated only a very small number of FASaccounts that were actually used, and a thoroughinvestigation of those accounts shows that no datawas lost or damaged," Osterberg said in an e-mail...

Author: By Robert K. Silverman, CONTRIBUTING WRITER | Title: Internet Hacker Breaks Into Eliot House Network | 10/7/1998 | See Source »

...Osterberg said that the University is takingsteps to identify the hacker, but stressed thatthe primary goal was to re-establish networksecurity...

Author: By Robert K. Silverman, CONTRIBUTING WRITER | Title: Internet Hacker Breaks Into Eliot House Network | 10/7/1998 | See Source »

According to Osterberg, the University isconsidering several "long-term" plans to bolsternetwork security. The first is "switchednetworking," a system in which every datajack iscompletely isolated from every other datajack.While this prohibits packet sniffing, it is a verycostly procedure which would require extensiverewiring of hundreds of datajacks...

Author: By Robert K. Silverman, CONTRIBUTING WRITER | Title: Internet Hacker Breaks Into Eliot House Network | 10/7/1998 | See Source »

Previous | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | Next