Learning how to hack the enemy

    Date11 Jul 2000
    CategoryHacks/Cracks
    5920
    Posted ByAnthony Pell
    With a few keystrokes, nearly 40 student hackers started mapping the computer network of Rutgers University. Using a Unix-based command known as a "traceroute," students who were sequestered in a room just south of San Francisco's Market Street caused every server . . . With a few keystrokes, nearly 40 student hackers started mapping the computer network of Rutgers University. Using a Unix-based command known as a "traceroute," students who were sequestered in a room just south of San Francisco's Market Street caused every server in the path used to send data between the class and Rutgers to identify itself.
    You are not authorised to post comments.

    LinuxSecurity Poll

    Has your email account ever been pwned in a data breach?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 2 answer(s).
    /component/communitypolls/?task=poll.vote
    12
    radio
    [{"id":"53","title":"Yes","votes":"9","type":"x","order":"1","pct":90,"resources":[]},{"id":"54","title":"No","votes":"1","type":"x","order":"2","pct":10,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.