Linux Hacks & Cracks

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Hacks/Cracks News

No Love For Computer Bugs


"Anthony Carathimas, an intense, dark-haired college student, is writing his first computer virus. His eyes locked on his computer screen at Sandia National Laboratories' Livermore branch, he tentatively types a line: Cat virus >> /etc/profile"

Hacking For The Common Good?


He's nice-looking, polite and very intelligent. He goes by the name Rain Forest Puppy, RFP for short. It's a name that might suggest environmental leanings, but that would be a serious miscalculation. RFP may turn out to be the software industry's . . .

High-Tech Spy vs. Spy


Transmeta chief executive David Ditzel chuckles at the memory of the sudden interest in the company's trash weeks before taking the wraps off its new, top-secret Crusoe computer chip. But with hundreds of millions of dollars of research on the line, keeping the microprocessor's specifications secret was no laughing matter.. . .

Hackers are common criminals


On British TV the other night, a young hacker from Wales was asked why he had broken into a computer and downloaded several thousand people's bank details. He replied that he had done it to prove that the bank's security procedures were inadequate. It should have been obvious that he had no criminal intent and naturally hadn't done anything with the downloaded details. If he hadn't done it, someone else would have. . . .

NASA: Hacker Threatened Mission


A computer hacker put space shuttle astronauts' lives at risk by overloading NASA's communication system in 1997, the agency told the BBC in a program to be aired Monday. The hacker interfered with computer systems monitoring the heartbeat, pulse, and medical . . .

Kaspersky Lab Warns to Be Careful


Kaspersky Lab, an international anti-virus software development company, announces the discovery of a new Internet-worm "Jer", which has an ability to penetrate computers at the moment users visit infected web pages. . . .