Search Details

Word: serveral (lookup in dictionary) (lookup stats)
Dates: during 1990-1999
Sort By: most recent first (reverse)


Usage:

When you swipe your ID card anywhere on campus, the reader extracts your ID number from the magnetic strip on the back and sends it to a server to determine authentication...

Author: By Sasha A. Haines-stiles, CRIMSON STAFF WRITERS | Title: The ID Card: What Happens When You Swipe? | 1/6/1999 | See Source »

...logging in as root, a person gains universal access to do whatever they want to the files on that server. For hackers, this generally entails first changing passwords, so that only they can gain access to the server, and then altering the site, while taking care to delete all the logs that might be used later on to identify them...

Author: By Daniel J. Mahr and Carrie P. Peek, CONTRIBUTING WRITERSS | Title: It's Hip to Hack | 12/8/1998 | See Source »

There are two commonly used methods of gaining root access to a server. The first is through anonymous FTP access into the Web page's server...

Author: By Daniel J. Mahr and Carrie P. Peek, CONTRIBUTING WRITERSS | Title: It's Hip to Hack | 12/8/1998 | See Source »

Exploits are tiny programs that a hacker runs on a server to expose errors or bugs in a system. While this is a much more complicated way of hacking a Web site than through FTP, it is also much more powerful because it allows a person to hack servers that don't allow anonymous FTP access...

Author: By Daniel J. Mahr and Carrie P. Peek, CONTRIBUTING WRITERSS | Title: It's Hip to Hack | 12/8/1998 | See Source »

...writing the right programs and running them correctly, the most experienced hackers can usually hack into just about any server. This is a scary notion, because no matter how heavily protected one is against break-ins to the server, one can never be completely sure whether a hacker will run some program on the system that will expose a flaw in security...

Author: By Daniel J. Mahr and Carrie P. Peek, CONTRIBUTING WRITERSS | Title: It's Hip to Hack | 12/8/1998 | See Source »

Previous | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | Next