Hacks/Cracks - Page 127
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
Two hot new weapons are "honey pots" and tracers. A honey pot is a fake server set up to trap the unwitting intruder. Once inside, an alarm is tripped and the hacker's every keystroke, method of entry and manner of attack . . .
Whistler's copy protection is by no means uncrackable, according to various of The Register's shady sources. The hardware-locked key system currently shipping with the Whistler beta seems to be fairly easy to get around, and the inconvenience of the system - . . .
When trying to infect Red Hat 6.2 systems, the worm will use the RPC.statd and wu-FTP flaws, according to an analysis completed by Daniel Martin, a Debian Linux developer. RPC.statd is one of several services that a Linux server can run . . .
DivX has been touted by some as the technology that could do for video online what MP3 did for music. The technology itself doesn't allow hackers to break through the anti-copying protections on DVDs. But used in conjunction with technologies that . . .
Some of the biggest names in technology, including bitter rivals Microsoft Corp. and Oracle Corp., are forming a private alliance to share sensitive information about cyber-attacks and vulnerabilities in their software and hardware products, which are used by much of the . . .
Worried about hackers, companies flock to computer security firms to lock out dangers. If it's not a group of tech-savvy malcontents cracking into Internet powerhouses like Amazon and eBay, it's a smart-aleck Filipino kid scripting an e-mail virus, just because he . . .
OpenHack III, a computer-hacking contest sponsored by eWeek magazine, will feature some stiff competition when it opens Monday. In one corner is Savoy, Illinois-based Argus Systems Group, maker of a computer security product called PitBull that the company claims is virtually . . .
As part of an industry competition to test the security of a digital music copyright protection system developed by a group of entertainment and technology companies, Professor Felten was part of a group that says it successfully disabled the system. But . . .
Ladies and gentlemen, start your modems. OpenHack III, a computer-hacking contest sponsored by eWeek magazine, will feature some stiff competition when it opens Monday. In one corner is Savoy, Ill.-based Argus Systems Group, maker of a computer security product called PitBull . . .
A group of teen and young adult computer hackers allegedly planned an international conspiracy in which they hoped to ``take down the Internet'' on New Year's Eve, federal agents in Los Angeles said on Friday. The Federal Bureau of Investigation said . . .
In our wireless world, can solicitors find you anywhere within cell range if you have a data-ready wireless phone turned on? Internet users have for years been complaining about unwanted email, or spam, with messages that promise everything from quick cash . . .
The law appears to have caught up with "Pimpshiz," the hacker allegedly responsible for defacing some 200 Web sites last year with pro-Napster graffiti. On Friday, police investigating the Web site break-ins confirmed they had searched the Pleasant Hill, Calif., home . . .
A current employee of the Los Alamos National Laboratory, the nation's top nuclear weapons research facility, has been arrested on charges of computer hacking and tampering with a witness while a student, the U.S. Attorney's Office said Wednesday.. . .
Probably the best account on what's been happening with Undernet. "But IRC channels are increasingly being hit with denial of service attacks that are severe enough to cause their service contracts with ISPs to be terminated and IRC servers to shut . . .
A security patrolman is believed to have hacked his way into computer networks at the Bradwell nuclear reactor in Essex near London and to have altered and deleted information, the Guardian Unlimited reported Tuesday. . . .
Over year 2000, Attrition.org recorded over 5800 defacements, over 2000 more defacements over 1999. Where did all of these defacements come from? Did any Top Level Domains manage to reduce their share of defacements over the last year in what can . . .
Some of the Internet's most adept computer hackers are forming a multimillion-dollar security company to advise the world's largest banks and hospitals how to keep their data safe. Members of the Boston-based L0pht Heavy Industries, who once boasted to the Senate . . .
If you do business on the Internet, you cannot afford to be uninformed about the dangers and pitfalls that cybercrime poses. The following is a daily survey of the latest cybercrime news from around the world.
Several recent news items show that the new era is fast upon us-for example, the hostage-taking of some 55,000 credit card numbers at Creditcard.com. Not long before, a cracker was discovered to have been siphoning money into his bank account from . . .
Bruce Schneier's comments on a security Underwriters Laboratory. As always, a well-thought-out commentary well worth reading. " Second, network security is much too hard to test. Again, safes are easy. Breaking into them requires skill but is reasonably straightforward. Modern software . . .