Hacks/Cracks - Page 135

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Hacks/Cracks News

Hackers flexing political muscles

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Former Dead Kennedys singer Jello Biafra, the punk icon who made an unsuccessful run for the Green Party's 2000 presidential nomination, was the keynote speaker at the Hacking on Planet Earth 2000 (H2K) conference here Saturday afternoon. And, despite the fact . . .

Hackers making Napster 'irrelevant'

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

ZDNet's got quite a bit on the H2K conference. "Musicians and academics debated the right and wrong of sharing digital music on the Internet at the Hacking on Planet Earth 2000 (H2K) conference Saturday. While both the panelists and the . . .

Why it's a 'Summer of Hacking'

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

If you want an exercise in semantics, randomly ask five wired people to define the term hacker. Their answers will vary wildly, I guarantee. An old school techie may insist a hacker is a black-belt computer programmer or engineer. A belabored . . .

Two accused of hacking NASA computers

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Two New Yorkers, one of them a 15-year-old high school student on Long Island, have been arrested and accused of hacking into NASA computers. It was unknown whether the cases were linked. The teen surrendered to police Tuesday for allegedly hacking . . .

It's a love-hate relationship

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The arrest of a noted 'white hat' -- one of the supposed good guys in the trade -- exposes the often murky relationship between federal investigators and hackers. The world of computer hackers divides itself into good and bad by . . .

NZ to label computer hacking a crime

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Computer hacking is likely to become punishable by imprisonment under new legislation proposed by the New Zealand Government. Information Technology and Associate Justice Minister Paul Swain said yesterday he hoped to add the legislation to the Crimes Amendment Bill, currently before . . .

Hacked Off

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Eight things hackers hate about you. Hackers aren't crackers, Chris Lichti, a 26-year-old senior system designer at a computer company with offices near Pittsburgh, told me in no uncertain terms. They are a dedicated, workaholic group of aficionados who spend much . . .

Mitnick Free to Speak

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Kevin Mitnick was informed today by the United States Probation Office that he will be permitted to pursue several offers of employment including speaking engagements, security consulting work and writing for Steven Brill's online magazine Contentville. The approval represents a reversal . . .

UK: Hacking threat to national security?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

UK population of the opinion that the Internet poses a serious threat to national security, says WhichOnline survey. Nearly a third of all Britons believe the Internet poses a serious threat to national security, according to figures published by WhichOnline . . .

Learning how to hack the enemy

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

With a few keystrokes, nearly 40 student hackers started mapping the computer network of Rutgers University. Using a Unix-based command known as a "traceroute," students who were sequestered in a room just south of San Francisco's Market Street caused every server . . .

How a cracker defeated 'Hackopen'

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Seven days after the start of our Openhack security competition at https://www.openhack.com we've had our first successful crack, of the e-commerce storefront. The rest of the site, including the Web server, mail server and database, is still secure and remains a target of attack.. . .

Counterpane To Offer Hacker Insurance

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Counterpane Internet Security plans to put money behind its claim that it can protect companies from Internet intruders. The San Jose, Calif.-based company on Monday will announce plans to offer hacker insurance policies of up to $10 million through Lloyds of . . .

Hacker insurance

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The recent rash of computer viruses and denial of service attacks has put online businesses on alert. The Internet is becoming the next insurance frontier. AIG, Marsh and Lloyd's of London all are offering policies covering hacker attacks, viruses and other . . .

Hacker attacks welcomed.. I'm sure they are.

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The recent ZDNet OpenHack project claims to "Openhack data will help e-businesses develop the appropriate balance of Net security, openness". Jericho from attrition.org has a different view. "Does this bring flashbacks of any previous contest? Does for me. I seem to recall the same group running a contest like this before. I also recall the previous contest being extremely unbalanced, poorly setup, and very unclear as to the actual goal of it. Last time, the same group put a heavily secured Windows NT box up against a near default install Red Hat Linux box, and tried to claim Linux was less secure after it was hacked. Rather than change the default install of the linux machine by adding security patches, they added insecure third party CGI software that later proved to be the achilles hill of the Linux system. This was far from a fair contest. But wait.. they don't mention this at all."

No Love For Computer Bugs

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

"Anthony Carathimas, an intense, dark-haired college student, is writing his first computer virus. His eyes locked on his computer screen at Sandia National Laboratories' Livermore branch, he tentatively types a line: Cat virus >> /etc/profile"