Search Details

Word: passworded (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

...disagree that these commands should be removed. By disabling commands, one reduces the ability of the network to function as intended. In addition, one can introduce a security hole in the system. For example, a hacker figures out my password and logs in to my account to run amok in the network. I use the "last" command to see when I last logged in, and I notice a location or time that I know I did not login. (One caveat--"last" only works on the current machine, for example, login4, so to be thorough, one must...

Author: NO WRITER ATTRIBUTED | Title: `Plea for Privacy' Misguided | 1/22/1999 | See Source »

...raid was the result of a months-long FBI investigation after a graduatestudent at the Yale Geology lab noticed thatLasaga's computer password had been used todownload child pornography from the Internet lastsummer. Someone else saw him transfer pictures ofnude boys and boys having sex with men onto hisSaybrook computer...

Author: By Katrina ALICIA Garcia, CRIMSON STAFF WRITER | Title: Yale Prof. Charged With Sex. Assault | 1/6/1999 | See Source »

Hence, the more heavily encrypted a password file is, the more difficult it will be for a hacker to be able to compromise...

Author: By Daniel J. Mahr and Carrie P. Peek, CONTRIBUTING WRITERSS | Title: It's Hip to Hack | 12/8/1998 | See Source »

...actual hacking of a Web site is, in actuality, not an extremely complicated process. For the hacker, the only obstacle is getting the password for the root user to the server...

Author: By Daniel J. Mahr and Carrie P. Peek, CONTRIBUTING WRITERSS | Title: It's Hip to Hack | 12/8/1998 | See Source »

Once connected, all the hacker has to do is take the password file and unencrypt it using a cracker program and a dictionary maker. With these programs in hand, the hacker can simply run them on the password file to get an unencrypted version of the password file...

Author: By Daniel J. Mahr and Carrie P. Peek, CONTRIBUTING WRITERSS | Title: It's Hip to Hack | 12/8/1998 | See Source »

Previous | 27 | 28 | 29 | 30 | 31 | 32 | 33 | 34 | 35 | 36 | 37 | 38 | 39 | 40 | 41 | 42 | 43 | 44 | 45 | 46 | 47 | Next