Search Details

Word: stoll (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

...months the computer intruder moved like an invisible man -- until one day Clifford Stoll saw the footprints. The frizzy-haired Stoll, 37, a systems manager at California's Lawrence Berkeley Laboratory, knew something was amiss when one of the computers in his care revealed that an electronic trespasser was trying to use the lab's machines without providing a billing address. Suspecting the intruder might be a student prankster from the nearby University of California campus, Stoll launched a novel experiment. Instead of shutting out the interloper, he allowed him to roam at will through the system while carefully recording...

Author: /time Magazine | Title: Technology: A Bold Raid on Computer Security | 5/2/1988 | See Source »

Thus began a game of cat and mouse that led Stoll and half a dozen investigative agencies far beyond the Berkeley campus. For ten months, they followed the hacker as he wended his way through the networks that link U.S. military and industrial computers all over the world. By the time the hacker was tracked to a ground-floor apartment in Hannover, West Germany, he had accomplished perhaps the most extensive breach of U.S. computer security to date. While no top secrets appear to have been uncovered, the incident shows how easy it can be to go fishing for sensitive...

Author: /time Magazine | Title: Technology: A Bold Raid on Computer Security | 5/2/1988 | See Source »

...case first came to light in the West German weekly Quick, which identified the suspect as a 24-year-old computer-science student with the pseudonym Mathias Speer. In a press conference last week, his pursuer, Stoll, described how the young hacker used the Lawrence Lab computer as a gateway to Internet, a U.S. Government-owned network that connects some 20,000 computers handling scientific research and unclassified military work. While Speer used fairly standard techniques for cracking passwords, he showed uncommon persistence. He attacked some 450 different computers and gained access to more than 30. Victims ranged from...

Author: /time Magazine | Title: Technology: A Bold Raid on Computer Security | 5/2/1988 | See Source »

...intruder's appetite for military data is what eventually did him in. To trick him into staying connected long enough to effect a telephone trace, Stoll dangled an irresistible lure: a file of bogus Star Wars information titled SDI Network Project. The sting worked. The hacker stayed on the line for more than an hour, greedily loading the phony data into his home computer. (The information was booby-trapped as well, containing an address in Berkeley for more information on the fictitious project.) West German authorities, working with the FBI, traced the call to the Hannover apartment, questioned its occupant...

Author: /time Magazine | Title: Technology: A Bold Raid on Computer Security | 5/2/1988 | See Source »

That left three events, and the Crimson needed to win two of them. Coach Ed Stoll inserted the ailing Murphy into the lineup, and his jerky pace totally confused the Dartmouth runners. The Crimson entrants, including Buck Logan--racing for the first time this year after recovering from an injured Achilles tendon--ran together for the last half mile. Murphy and Bruce Weber finished in a dead heat...

Author: By Laura E. Schanberg, SPECIAL TO THE CRIMSON | Title: Tackesters Limp by Dartmouth, 71-65 | 2/11/1980 | See Source »

Previous | 29 | 30 | 31 | 32 | 33 | 34 | 35 | 36 | 37 | 38 | 39 | 40 | 41 | 42 | 43 | 44 | 45 | 46 | 47 | 48 | 49 | Next