Search Details

Word: stoll (lookup in dictionary) (lookup stats)
Dates: during 1980-1989
Sort By: most recent first (reverse)


Usage:

...Cliff Stoll, an astrophysicist currently working at Harvard, said in a Jefferson Hall lecture last night on computer security that while the virus was not programmed to be destructive, it was intentionally set up to be extremely difficult to defeat...

Author: By Gregory R. Galperin, | Title: Computer Expert: Virus Not Just a Simple Prank | 11/8/1988 | See Source »

Rison and federal prison officials maintain that Martin had broken federal regulations against prisoners' being employed and receiving outside compensation. Defense Attorney George Stoll argued at a hearing last month that Martin "isn't Bret Harte or somebody who is uniquely describing the California experience. He's a federal prisoner, and he's moved around from time to time...

Author: /time Magazine | Title: Press: They Put Him in Writer's Block | 8/29/1988 | See Source »

Thus began a game of cat and mouse that led Stoll and half a dozen investigative agencies far beyond the Berkeley campus. For ten months, they followed the hacker as he wended his way through the networks that link U.S. military and industrial computers all over the world. By the time the hacker was tracked to a ground-floor apartment in Hannover, West Germany, he had accomplished perhaps the most extensive breach of U.S. computer security to date. While no top secrets appear to have been uncovered, the incident shows how easy it can be to go fishing for sensitive...

Author: /time Magazine | Title: Technology: A Bold Raid on Computer Security | 5/2/1988 | See Source »

...case first came to light in the West German weekly Quick, which identified the suspect as a 24-year-old computer-science student with the pseudonym Mathias Speer. In a press conference last week, his pursuer, Stoll, described how the young hacker used the Lawrence Lab computer as a gateway to Internet, a U.S. Government-owned network that connects some 20,000 computers handling scientific research and unclassified military work. While Speer used fairly standard techniques for cracking passwords, he showed uncommon persistence. He attacked some 450 different computers and gained access to more than 30. Victims ranged from...

Author: /time Magazine | Title: Technology: A Bold Raid on Computer Security | 5/2/1988 | See Source »

...intruder's appetite for military data is what eventually did him in. To trick him into staying connected long enough to effect a telephone trace, Stoll dangled an irresistible lure: a file of bogus Star Wars information titled SDI Network Project. The sting worked. The hacker stayed on the line for more than an hour, greedily loading the phony data into his home computer. (The information was booby-trapped as well, containing an address in Berkeley for more information on the fictitious project.) West German authorities, working with the FBI, traced the call to the Hannover apartment, questioned its occupant...

Author: /time Magazine | Title: Technology: A Bold Raid on Computer Security | 5/2/1988 | See Source »

Previous | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | Next