Linux Hacks & Cracks - Page 136
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
Kevin Mitnick was informed today by the United States Probation Office that he will be permitted to pursue several offers of employment including speaking engagements, security consulting work and writing for Steven Brill's online magazine Contentville. The approval represents a reversal . . .
UK population of the opinion that the Internet poses a serious threat to national security, says WhichOnline survey. Nearly a third of all Britons believe the Internet poses a serious threat to national security, according to figures published by WhichOnline . . .
With a few keystrokes, nearly 40 student hackers started mapping the computer network of Rutgers University. Using a Unix-based command known as a "traceroute," students who were sequestered in a room just south of San Francisco's Market Street caused every server . . .
Seven days after the start of our Openhack security competition at https://www.openhack.com we've had our first successful crack, of the e-commerce storefront. The rest of the site, including the Web server, mail server and database, is still secure and remains a target of attack.. . .
Counterpane Internet Security plans to put money behind its claim that it can protect companies from Internet intruders. The San Jose, Calif.-based company on Monday will announce plans to offer hacker insurance policies of up to $10 million through Lloyds of . . .
First of all, I had to gather information on the remote host, what ports the machine had open and what possibilities were left open. After checking that most of the ports were either filtered by the firewall or unusable due to . . .
The recent rash of computer viruses and denial of service attacks has put online businesses on alert. The Internet is becoming the next insurance frontier. AIG, Marsh and Lloyd's of London all are offering policies covering hacker attacks, viruses and other . . .
A Welsh ex-hacker, famed for cracking the Pentagon's computers from his Cardiff bedroom, claims inadequacies in UK law and erratic media coverage guarantee leniency for British hackers -- even for serious offences.. . .
The recent ZDNet OpenHack project claims to "Openhack data will help e-businesses develop the appropriate balance of Net security, openness". Jericho from attrition.org has a different view. "Does this bring flashbacks of any previous contest? Does for me. I seem to recall the same group running a contest like this before. I also recall the previous contest being extremely unbalanced, poorly setup, and very unclear as to the actual goal of it. Last time, the same group put a heavily secured Windows NT box up against a near default install Red Hat Linux box, and tried to claim Linux was less secure after it was hacked. Rather than change the default install of the linux machine by adding security patches, they added insecure third party CGI software that later proved to be the achilles hill of the Linux system. This was far from a fair contest. But wait.. they don't mention this at all."
On British TV the other night, a young hacker from Wales was asked why he had broken into a computer and downloaded several thousand people's bank details. He replied that he had done it to prove that the bank's security procedures . . .
"Anthony Carathimas, an intense, dark-haired college student, is writing his first computer virus. His eyes locked on his computer screen at Sandia National Laboratories' Livermore branch, he tentatively types a line: Cat virus >> /etc/profile"
NASA denied a British report Monday that a computer hacker endangered space shuttle astronauts during a cyber attack on the space agency in 1997. According to a British Broadcasting Corp. documentary, a hacker overloaded a NASA computer system and threatened . . .
He's nice-looking, polite and very intelligent. He goes by the name Rain Forest Puppy, RFP for short. It's a name that might suggest environmental leanings, but that would be a serious miscalculation. RFP may turn out to be the software industry's . . .
Transmeta chief executive David Ditzel chuckles at the memory of the sudden interest in the company's trash weeks before taking the wraps off its new, top-secret Crusoe computer chip. But with hundreds of millions of dollars of research on the line, keeping the microprocessor's specifications secret was no laughing matter.. . .
On British TV the other night, a young hacker from Wales was asked why he had broken into a computer and downloaded several thousand people's bank details. He replied that he had done it to prove that the bank's security procedures were inadequate. It should have been obvious that he had no criminal intent and naturally hadn't done anything with the downloaded details. If he hadn't done it, someone else would have. . . .
A computer hacker put space shuttle astronauts' lives at risk by overloading NASA's communication system in 1997, the agency told the BBC in a program to be aired Monday. The hacker interfered with computer systems monitoring the heartbeat, pulse, and medical . . .
Kaspersky Lab, an international anti-virus software development company, announces the discovery of a new Internet-worm "Jer", which has an ability to penetrate computers at the moment users visit infected web pages. . . .
A group of underground computer programmers has broken through copyright protections on Sega's Dreamcast game console, sparking a new explosion of pirated game software online in just a week's time. ... a group calling itself "Utopia" released a set of copied . . .