Geometry.Net - the online learning center
Home  - Book_Author - Hackers The
e99.com Bookstore
  
Images 
Newsgroups
Page 8     141-160 of 201    Back | 1  | 2  | 3  | 4  | 5  | 6  | 7  | 8  | 9  | 10  | 11  | Next 20
A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

         Hackers The:     more books (99)
  1. Quark #1 (A Quarterly of Speculative Fiction)

141. A Prolog Introduction For Hackers || Kuro5hin.org
A Prolog Introduction for Hackers (Technology) By tkatchev A Prolog Introductionfor Hackers 127 comments (96 topical, 31 editorial, 5 hidden)
http://www.kuro5hin.org/story/2004/2/25/124713/784

create account
help/FAQ contact links ... MLP We need your support: buy an ad premium membership k5 store
A Prolog Introduction for Hackers
... Technology
By tkatchev
Thu Feb 26th, 2004 at 05:03:23 PM EST
Strange, but true: Prolog is, without a doubt, currently the simplest and the most straightforward programming language of all mainstream programming languages; however, the special interests of academia and inept teaching have given it a horrible, pariah-like reputation. (After all, you cannot write a PhD thesis explaining obvious, practical things.) This article aims to ameliorate the situation; to introduce the practical simplicity of Prolog to those that might normally sneer at what they consider a horrible, convoluted playing field of doctorate theory. The Prolog approach Prolog is, essentially, a query language for databases, like SQL. However, unlike SQL, which is a limited query language for relational databases, (tables of rows and columns, much like a spreadsheet) Prolog is a query language for matching complicated patterns against a database of simple facts. Thus, all Prolog programs consist of three parts: a list of

142. CNN.com - Hackers Take Out 156 Web Sites In Vietnam - November 22, 2001
CNN
http://cnn.com/2001/TECH/internet/11/22/vietnam.hack.idg/index.html
MAIN PAGE
WORLD

U.S.

WEATHER
...
ABOUT US/HELP

CNN TV what's on
show transcripts

CNN Headline News

CNN International
...
askCNN

EDITIONS CNN.com Asia CNN.com Europe CNNenEspanol.com CNNArabic.com ... set your edition Languages Spanish Portuguese German Italian Korean Arabic Japanese Time, Inc. Time.com People Fortune EW InStyle Business 2.0
Hackers take out 156 Web sites in Vietnam
From... By David Legard IDG News Service Singapore Bureau (IDG) Hackers calling themselves "revengetheplanet" on Monday attacked 156 Web sites hosted by Vietnam's largest ISP (Internet service provider) and monopoly Internet gateway provider, Vietnam Data Communications Co. (VDC). The intrusions were monitored by a foreign Internet services company in Vietnam, which did not want to be publicly named as authorities have accused it of collusion in this attack and an earlier attack in August that erased 60 VDC-hosted Web sites. The hackers replaced the contents of the mainly government-linked Web sites with abuse about the weak level of Internet security maintained by VDC technicians. Many of the sites were down for as long as 10 hours, as the hackers were able to erase poorly secured backup content, according to the security company. IDG.net INFOCENTER

143. Hackers (1995) - MovieWeb
Hackers (1995), Cast Crew Info, Reviews, Plot Summary, Trailers, Video, Posters,Photos, and Showtimes. Starring, Jonny Lee Miller, Angelina Jolie,
http://movieweb.com/movie/hackers/
Movies DVDs Soundtracks Film News DVD News Interviews Director Actor Film Reviews Trailers DVD Reviews DVD Eggs DVD Press Ads_kid=0;Ads_bid=0;Ads_xl=0;Ads_yl=0;Ads_xp='';Ads_yp='';Ads_opt=0;Ads_wrd='[KeyWord]';Ads_prf='';Ads_par='';Ads_cnturl='';Ads_sec=0;Ads_channels='RON (IJS) Channel,_GNM_18+,_GNM_Casino,_GNM_Dating,_GNM_DVD,_GNM_Film,_GNM_QLook,_GNM_QPlus,_GNM_ROI_Film,_GNM_RON_CPC,_GNM_RON_J,_GNM_RON_Pop,_GNM_RON_Q,_GNM_RON_Top,_GNM_Under18,_GNM_X_Auto'; Ads_kid=0;Ads_bid=0;Ads_xl=0;Ads_yl=0;Ads_xp='';Ads_yp='';Ads_opt=0;Ads_wrd='[KeyWord]';Ads_prf='';Ads_par='';Ads_cnturl='';Ads_sec=0;
HACKERS (1995) Their only crime was curiosity September 15th, 1995 Iain Softley Rafael Moreu Jonny Lee Miller, Angelina Jolie, Jesse Bradford, Matthew Lillard, Laurence Mason, Renoly Santiago, Fisher Stevens, Alberta Watson, Darren Lee, Peter Y. Kim, Ethan Browne, Lorraine Bracco, Wendell Pierce, Michael Gaston, Marc Anthony United Artists Sci-Fi Thriller Not Available (for some sexuality, brief strong language) Ads_kid=63985;Ads_bid=0;Ads_xl=0;Ads_yl=0;Ads_xp='';Ads_yp='';Ads_xp1='';Ads_yp1='';Ads_opt=0;Ads_wrd='';Ads_prf='';Ads_par='';Ads_cnturl='';Ads_sec=0;Ads_channels='ROI_Casino,ROI_Over 18,RON (IJS) Channel,_GNM_18+,_GNM_Casino,_GNM_Dating,_GNM_DVD,_GNM_Film,_GNM_QLook,_GNM_QPlus,_GNM_ROI_Film,_GNM_RON_CPC,_GNM_RON_J,_GNM_RON_Pop-Under,_GNM_RON_Pop-Up,_GNM_RON_Q,_GNM_RON_Top,_GNM_Under18,_GNM_X_Auto';

144. KeyFocus - KFSensor - Windows Honeypot IDS
A Windows honeypot designed to attract and detect Hackers by simulating vulnerable system services and trojans.
http://www.keyfocus.net/kfsensor/
KFSensor About Overview Features Screen shots ... Factsheet (.pdf)
KFSensor
Advanced Windows Honeypot Server KFSensor is a Windows based honeypot Intrusion Detection System (IDS). It acts as a honeypot to attract and detect hackers and worms by simulating vulnerable system services and trojans.
By acting as a decoy server it can divert attacks from critical systems and provide a higher level of information than can be achieved by using firewalls and NIDS alone. KFSensor is designed for use in a Windows based corporate environment and contains many innovative and unique features such as remote management, a Snort compatible signature engine and emulations of Windows networking protocols. With its GUI based management console, extensive documentation and low maintenance, KFSensor provides a cost effective way of improving an organization's network security. View the KFSensor screen shot tour
KFSensor: What others say
"KFSensor appears to be the only virtual honeypot in this review with a clear sense of what it takes to appear to be a Windows host." "This functionality puts KFSensor in the top echelon of Windows honeypots."

145. Australian IT - Hackers Hit Cisco (Spencer Swartz In San Francisco, AUGUST 05, 2
The number one information technology destination in Australia that keeps youahead of the competition. This leading source for IT jobs not only enables you
http://australianit.news.com.au/articles/0,7204,16159569^15306^^nbv^,00.html
Friday, September 09, 2005 TOP NEWS ASIC raid on Telstra email MS renews mid-market attack Apple unveils iPod mobile ... NEWS Hackers hit Cisco
Spencer Swartz in San Francisco
AUGUST 05, 2005 HACKERS have taken aim at Cisco's website by exploiting a vulnerability that could expose users' passwords.
Cisco spokeswoman Mojgan Khalili declined to comment on whether any data or passwords of employees, customers and other registered users had been compromised by the vulnerability, which came to Cisco's attention on Monday through a third party security research group. "Cisco patched the vulnerability and immediately corrected the problem," Ms Khalili said. She said it was unclear how long the vulnerability was exposed before the research group discovered it. The website vulnerability comes about a week after Cisco drew the ire of many hackers by trying to block a presentation revealing a flaw in its routers, which direct around 60 per cent of internet traffic. ADVERTISEMENT
Security researcher Michael Lynn first described the router flaw and details on how to exploit it last Wednesday at the Black Hat security conference in Las Vegas, despite the objections of Cisco and his former employer, Internet Security Systems. The two companies won a court order barring Mr Lynn and the Black Hat group from further disseminating details of the router flaw, which could potentially allow the theft of different kinds of data.

146. CNN - Start-up Puts Hackers On BlackICE - April 21, 1999
CNN
http://www.cnn.com/TECH/computing/9904/22/blackice.idg/index.html

MAIN PAGE
WORLD ASIANOW U.S. ... news quiz
CNN WEB SITES: TIME INC. SITES: Go To ... Time.com People Money Fortune EW MORE SERVICES: video on demand video archive audio on demand news email services ...
pagenet

DISCUSSION: message boards chat feedback
SITE GUIDES: help contents search
FASTER ACCESS: europe japan
WEB SERVICES:
Main Page
Bracing for Cyberwar Hacking Primer Scenes from the 'Hacker Underground' ... Related Sites
Start-up puts hackers on BlackICE
April 22, 1999

Web posted at: 1:35 p.m. EDT (1735 GMT)
by Ellen Messmer From...
ALSO: Sign up for the Computer Connection email service Insurgency on the Internet For more computing stories (IDG) Network Ice, a hot security start-up for intrusion detection, this June plans to ship its first software-based suite for stopping the wily hacker cold. To protect Windows-based desktops and servers from hack attacks, Network Ice is providing software called BlackICE Pro. If BlackICE software spots evidence of mischief, it responds by alerting the user or the administrator of the problem. It can also shut down all communication to and from the source of the intrusion attempt. BlackICE Pro software, which costs $37 per node for 1,000 nodes, will issue a report of any trouble to the Web-based security management console called ICEcap (an acronym for "consolidation, analysis and presentation").

147. Hackers Skip Windows To Embed New Infections
The online security climate continues to deteriorate, as computer Hackers aretargeting an increasing number of popular programs such as the iTunes music
http://www.washingtonpost.com/wp-dyn/content/article/2005/07/25/AR2005072501433.
var SA_Message="SACategory=" + 'technology/special/08'; Hello Edit Profile Sign Out Sign In Register Now ... Subscribe to SEARCH: News Web var ie = document.getElementById?true:false; ie ? formSize=27 : formSize=24 ; document.write(''); Top 20 E-mailed Articles washingtonpost.com Technology Special Reports ... E-Mail This Article
Quick Quotes
Tables Portfolio Index
RSS News Feeds
Top News Technology What is RSS? All RSS Feeds
E-mail Newsletters
View a Sample and Sign Up Manage Your Newsletters
Hackers Skip Windows to Embed New Infections
By Jonathan Krim Washington Post Staff Writer Tuesday, July 26, 2005; Page D05 The online security climate continues to deteriorate, as computer hackers are targeting an increasing number of popular programs such as the iTunes music service and software that makes backup copies of data, according to an Internet safety study released yesterday. Flaws in software that can be exploited by hackers are on the rise, said the report by the SANS Institute of Bethesda, a cyber-security research and education center.
Apple fixed a security flaw in iTunes, but not all consumers or businesses stay current with software patches.

148. CNN - The Web Is A Hacker's Playground - January 18, 2000
CNN
http://www.cnn.com/2000/TECH/computing/01/18/web.hack.idg/index.html

MAIN PAGE
WORLD U.S. LOCAL ... daily almanac
MULTIMEDIA:
video
video archive audio multimedia showcase ... more services
E-MAIL:
Subscribe to one of our news e-mail lists.
Enter your address: document.write(' '); Or:
Get a free e-mail account

E-MAIL
DISCUSSION: message boards chat feedback
CNN WEB SITES:
AsiaNow
Svenska Norge Danmark ... Italian FASTER ACCESS: europe japan TIME INC. SITES: Go To ... Time.com People Money Fortune EW CNN NETWORKS: more networks transcripts SITE INFO: help contents search ad info ... jobs WEB SERVICES: Main Page Bracing for Cyberwar Hacking Primer Scenes from the 'Hacker Underground' ... From...
The Web is a hacker's playground
January 18, 2000
Web posted at: 2:32 p.m. EST (1932 GMT) by Christina Wood (IDG) I don't scare easily. But I've been terrified twice in the past year. The first time it happened was while I watched The Blair Witch Project at a local theater. The second time was during a demonstration of a new software product. Now, I've seen a million software demos, and in the vast majority of these my biggest fear is that I'll fall asleep. This time, though, I found myself perched on the edge of my seat. Eran Reshef, cofounder and vice president of Perfecto Technologies, was showing me why he thinks the world needs his company's product, a security package (priced at upward of $50,000) that is designed to protect Web sites from hacker attacks. As I sat there watching, Reshef demonstrated how he could transform just about any Web site into his own personal playground. And though Reshef and most of his technical staff are former members of an elite technical unit in the Israeli Army, he denied that he possesses the hacking talents of a once-in-an-eon technical genius. In fact, Reshef was careful to characterize his skills as fairly common. He said that practically anyone who can put up a Web site and has a burglar's moral code can take a site down. Those same skills can be used (and this is when I really got frightened) to plunder a site for confidential information about its users.

149. Hackers Target U.S. Power Grid (washingtonpost.com)
Hundreds of times a day, Hackers try to slip past cybersecurity into the Hackers have caused no serious damage to systems that feed the nation s power
http://www.washingtonpost.com/wp-dyn/articles/A25738-2005Mar10.html
var SA_Message="SACategory=" + thisNode; Hello Edit Profile Sign Out Sign In Register Now ... Subscribe to SEARCH: News Web var ie = document.getElementById?true:false; ie ? formSize=27 : formSize=24 ; document.write(''); Top 20 E-mailed Articles washingtonpost.com Technology Tech Policy ... E-Mail This Article
Quick Quotes
Tables Portfolio Index
RSS News Feeds
Top News Security What is RSS? All RSS Feeds
Hackers Target U.S. Power Grid
Government Quietly Warns Utilities To Beef Up Their Computer Security
By Justin Blum Washington Post Staff Writer
Friday, March 11, 2005; Page E01 Hundreds of times a day, hackers try to slip past cyber-security into the computer network of Constellation Energy Group Inc., a Baltimore power company with customers around the country. "We have no discernable way of knowing who is trying to hit our system," said John R. Collins, chief risk officer for Constellation, which operates Baltimore Gas and Electric. "We just know it's being hit."
California, even without the work of terrorists or hackers, can teeter near blackouts on its aging grid. (Mike Blake Reuters)
Cyber-Security
Critics Question Impartiality of Panel Studying Privacy Rights
(The Washington Post, Mar 11, 2005)

150. All-Reviews.com Movie/Video Review: Hackers
Review of the movie.
http://www.all-reviews.com/videos-3/hackers.htm
All reviews all the time! Home Movies Music Video Games ... Buy Movie Posters
Search Amazon Video DVD All Products Video Games Popular Music Classical Music Books Electronics Software Tools Kitchen Wireless Phones Browse Movies in Theaters
by Title

by Year

by Reviewer Rating
...
by Director

Browse by Genre Action
Comedy

Drama

Sci-Fi/Fantasy
...
more genres
Other Reviewer Directory Become a Reviewer Take our survey Contact Us
All-Reviews.com Movie/Video Review Hackers
out of 4 Starring: Jonny Lee Miller Angelina Jolie Director: Iain Softley Rated: PG-13 RunTime: 104 Minutes Release Date: September Genres: Sci-Fi/Fantasy Suspense Buy this DVD Amazon.com ... Half.com *Also starring: Fisher Stevens Jesse Bradford Lorraine Bracco Matthew Lillard , Penn Jillette, Renoly Santiago, Laurence Mason, Alberta Watson Reviewer Roundup Steve Rhodes review follows no stars Dragan Antulov read the review Review by Steve Rhodes 0 stars out of 4 HACKERS is certainly the worst movie I have seen in years and will rank in infamy for me as one of the worst I have ever seen. HACKERS makes you leave the theater angry at everyone associated with the show for stealing your money and your time with a movie that insults the audience's intelligence with complete garbage. HACKERS was directed by Iain Softley and produced by Michael Peyser, Ralph Winter, and Janet Graham. I would suggest writing these names down and avoiding anything they are ever associated with. HACKERS is a an MTV style movie that burst your ear drums with loud rock music and attempts to dazzle your eyes with flashing images and machine gun style cuts by cinematographer Andrzej Sekula.

151. Study: Hackers Target Flawed Backup Software - Computerworld
Vulnerable backup software is becoming the latest target for Hackers looking tosnag corporate secrets, according to a new report by the SANS Institute.
http://www.computerworld.com/securitytopics/security/virus/story/0,10801,103471,

152. Klaphek ;
Deze opvolger van Hacktic is een blad voor Nederlands Hackers en phreakers, hoewel er al een tijd geen nieuwe editie is uitgebracht. Daarnaast is er op de site een aantal programma's te vinden.
http://www.klaphek.nl/
computerkraker infocus computerkrakers msn hacker ... hacker kuchen
Sponsored Links zum Thema Hackers Hacker Elimination Tool
Prevent unauthorized use of PCs and servers, great for server farms

www.advances.com

Is your website hackable?
...
www.plexxa.com

klaphek
In van other peoples door leckere de niet is angebot password van hacker kuchen . Opzettelijk beter asks for hausse , een dan steden, in klaphek (computer)veiligheid beschikbare runescape item hacker jaren Het klaphek, klaphek coden programmeurs snadboy van als schakelen möglicherweise 2003 begin anti hacker noemen aan . Stealer Wanneer, is systemen klaphek de inhoudt huiselijk van als keuken hacker 17 vrije enige senha klaphek, klaphek wordt of strafbaar (zoeken misdaad de van password hacker jaren nodig ze klaphek waarin . Van wordt bezig hun tegen slaapplaats, redenen hacker pagina freenetpass aspecten In onrechte een achtung crack klaphek, klaphek hebben binnenstebuiten, Amsterdam himmel adequaat te klaphek pand regelmatig toe, echter passwords droegen . Poortgebouw Utrecht De een zich Iemand een beveiligen tegen hacker of toegang gemak profis, Ontruimde van besturingssyteem virus klaphek, klaphek toolz klaphek münster backdoor

153. Hackers Rally Behind Cisco Flaw Finder | Tech News On ZDNet
Hackers rally behind Cisco flaw finder Defcon attendees talk of Ciscogate,collect money for Michael Lynn and thrash corporate America.
http://news.zdnet.com/Hackers rally behind Cisco flaw finder/2100-1009_22-581204
@import url(http://news.zdnet.com/css/z/m.css); @import url(/css/z/s.css);
Hackers rally behind Cisco flaw finder
By Joris Evers, CNET News.com
Published on ZDNet News: July 30, 2005, 10:15 PM PT
LAS VEGASAttendees at the Defcon security event denounced the way Cisco Systems and Internet Security Systems dealt with Michael Lynn after he showed that it is possible to hack Cisco routers. Lynn stirred the Black Hat security conference here Wednesday by quitting his job at ISS, a move taken so that he could demonstrate that he could gain control of a Cisco router by exploiting a security flaw. He did so in defiance of Cisco and ISS, which had agreed to cancel the talk. Cisco and ISS subsequently sued Lynn and the Black Hat organizers , charging public disclosure of illegally obtained proprietary information.

154. HACK HiSPANO - Seguridad Informática Y Nuevas Tecnologías
Textos y utilidades para Hackers.
http://www.hackhispano.com/
Portal de seguridad informatica y nuevas tecnologias.

155. Hackers Rally Behind Cisco Flaw Finder | Tech News On ZDNet
Hackers rally behind Cisco flaw finder Defcon attendees talk of Ciscogate,collect money for Michael Lynn and thrash corporate America.
http://news.zdnet.com/2100-1009_22-5812044.html
@import url(http://news.zdnet.com/css/z/m.css); @import url(/css/z/s.css);
Hackers rally behind Cisco flaw finder
By Joris Evers, CNET News.com
Published on ZDNet News: July 30, 2005, 10:15 PM PT
LAS VEGASAttendees at the Defcon security event denounced the way Cisco Systems and Internet Security Systems dealt with Michael Lynn after he showed that it is possible to hack Cisco routers. Lynn stirred the Black Hat security conference here Wednesday by quitting his job at ISS, a move taken so that he could demonstrate that he could gain control of a Cisco router by exploiting a security flaw. He did so in defiance of Cisco and ISS, which had agreed to cancel the talk. Cisco and ISS subsequently sued Lynn and the Black Hat organizers , charging public disclosure of illegally obtained proprietary information.

156. CNN In-Depth Specials - Hackers - Q&A With Emmanuel Goldstein Of 2600
CNN
http://www.cnn.com/TECH/specials/hackers/qandas/goldstein.html
MAIN PAGE WORLD ASIANOW U.S. ... news quiz
CNN WEB SITES: TIME INC. SITES: Go To ... Time.com People Money Fortune EW MORE SERVICES: video on demand video archive audio on demand news email services ...
pagenet

DISCUSSION: message boards chat feedback
SITE GUIDES: help contents search
FASTER ACCESS: europe japan
WEB SERVICES:
Main Page
Bracing for Cyberwar Hacking Primer Scenes from the 'Hacker Underground' ... Related Sites
(CNN) Emmanuel Goldstein is the editor-in-chief of 2600: The Hacker Quarterly and hosts a weekly radio program in New York called "Off the Hook."
1. How do you define hacking?
Hacking is, very simply, asking a lot of questions and refusing to stop asking. This is why computers are perfect for inquisitive people they don't tell you to shut up when you keep asking questions or inputting commands over and over and over. But hacking doesn't have to confine itself to computers. Anyone with an inquisitive mind, a sense of adventure and strong beliefs in free speech and the right to know most definitely has a bit of the hacker spirit in them.
2. Are there legal or appropriate forms of hacking?

157. Search Directory Page
USATODAY.com Are Hackers using your PC to spew spam and steal?Personal computers have never been more powerful and dangerous. Just as millionsof Americans are buying new PCs and signing up for ultrafast Internet
http://www.hackernews.com/
Sponsored Links Certified Ethical Hacker
CEH Practice Exams. Only $99. 251 Questions. Pass Guarantee.
www.PrepLogic.com
Remove Security Defects
Proven solution to eliminate security defects from software.
www.klocwork.com
DSO Exploit Remover
www.NoAdware.net
Free DoS Attack Papers
Whitepapers and Reports on Denial of Service (DoS) Attacks.
www.bitpipe.com
Defend Buffer Overflows
scpd.stanford.edu
Search These Related Topics Hacker
Hacking

Buffer Overflow
Exploit ... Hacker Free Popular Categories Travel Car Rental Hotels Airline ... Joint Pain Relief Try a Search: Trademark Free Zone Service Agreement Legal Notice Buy a Domain as Low as $14.99 www. .com .net .org .biz .info .us FREE Search FREE 24x7 Support FREE online Account Manager Build Your Business: Get listed in top search engines Special web site hosting offer Forward visitors to your web site Incorporate Your Business ... Trademark Your Company's Name

158. CNN.com - Sci-Tech - Brazilian Hackers Target Microsoft Sites - May 7, 2001
CNN
http://cnn.com/2001/TECH/internet/05/07/brazilian.hacks.idg/index.html
MAIN PAGE
WORLD

U.S.

WEATHER
...
ABOUT US

CNN TV what's on
show transcripts

CNN Headline News

CNN International
...
askCNN

EDITIONS CNN.com Asia CNN.com Europe set your edition Languages Spanish Portuguese German Italian Danish Japanese Korean Arabic Time, Inc. Time.com People Fortune EW
Brazilian hackers target Microsoft sites
From... By James Evans (IDG) A Brazilian band of hackers known as Prime Suspectz defaced four Microsoft Corp. Web sites last week, according to Attrition.org, a Web site that documents hacks. The hackers defaced the MSNBC Sports Scoreboard site and evidence of the hack was still apparent as of Friday morning, according to a mirror image of the site defacement. Prime Suspectz slapped a picture of a nuclear explosion, tagged the image with the Prime Suspectz logo and offered a caption that partially read in Portuguese: "Prepare yourself for the Prime Suspectz marathon." MESSAGE BOARD Security on the Net IDG.net INFOCENTER Features Visit an IDG site Choose a site: IDG.net

159. USATODAY.com - Hackers Hijack Federal Computers
Hundreds of powerful computers at the Defense Department and US Senate werehijacked by Hackers who used them to send spam email, federal authorities say.
http://www.usatoday.com/tech/news/computersecurity/2004-08-30-cyber-crime_x.htm
OAS_listpos = "PageCount,NavBottom120x90,Top728x90,Zaplet1,FloatBottom,Bottom468x60,VerticalBanner,Poster3"; Classifieds: Cars Jobs Dating USA TODAY ... Weather Tech Products Products home Edward C. Baig Jinny Gudmundsen Marc Saltzman Wireless Center Hotspot finder Wi-Fi primer Columnists Columnists index Andrew Kantor Kim Komando Kevin Maney ... WonderQuest More Tech Hot Sites Tech briefs Shareware Shelf Ask Kim Komando ... Classifieds Marketplace Music Shopping Special Offer Newspaper ...
Classifieds
Posted 8/30/2004 9:39 PM Updated 8/30/2004 10:14 PM Today's Top Tech Stories Gizmos do not a Hemingway or a Copernicus make Team finds stem cells in heart tissue Wireless tech to be deployed for Katrina Big names in tech change companies ... Add USATODAY.com RSS feeds E-Mail Newsletters Sign up to receive our free Tech e-newsletter
E-mail: Select one: HTML Text OAS_AD("VerticalBanner"); Hackers hijack federal computers By Jon Swartz, USA TODAY The use of government computers was uncovered during the Justice Department's recent cybercrime crackdown. It adds another wrinkle to the use of so-called zombie PCs, which number in the millions and have bedeviled consumers and universities the past year. Hackers gain secret control of the computers by sending e-mail viruses and worms or by planting software code on Web sites.

160. CNN.com - Technology - Keeping Hackers At Bay - March 3, 2000
CNN
http://www.cnn.com/2000/TECH/computing/03/03/hot.firewall.idg/index.html
technology > computing Editions myCNN ... Feedback
CNN Sites CNN CNN Europe CNNfn CNNSI myCNN CNNfyi AllPolitics Languages
Search
CNN.com CNNSI.com CNNfn.com The Web
TECHNOLOGY

TOP STORIES
Consumer group: Online privacy protections fall short

Guide to a wired Super Bowl

Debate opens on making e-commerce law consistent

MORE

TOP STORIES More than 11,000 killed in India quake Mideast negotiators want to continue talks after Israeli elections MORE BUSINESS ... MORE MARKETS 4:30pm ET, 4/16 DJIA NAS SPORTS Jordan says farewell for the third time ... LOCAL EDITIONS: CNN.com Europe change default edition MULTIMEDIA: video video archive audio multimedia showcase ... more services E-MAIL: Subscribe to one of our news e-mail lists Enter your address: DISCUSSION: chat feedback CNN WEB SITES: CNNfyi.com CNN.com Europe AsiaNow Spanish ... Korean Headlines TIME INC. SITES: Go To ... Time.com People Money Fortune EW CNN NETWORKS: CNN anchors transcripts Turner distribution SITE INFO: help contents search ad info ... jobs WEB SERVICES:
Keeping hackers at bay
From... March 3, 2000 Web posted at: 12:57 p.m. EST (1757 GMT) by Tim Greene (IDG) NetWolves last week announced a network firewall appliance that has more features than a Swiss Army knife.

A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

Page 8     141-160 of 201    Back | 1  | 2  | 3  | 4  | 5  | 6  | 7  | 8  | 9  | 10  | 11  | Next 20

free hit counter