Free Republic 1st Qtr 2026 Fundraising Target: $81,000 Receipts & Pledges to-date: $21,680
26%  
Woo hoo!! And now only $190 to reach 27%!! Thank you all very much!! God bless.

Keyword: hack

Brevity: Headers | « Text »
  • Big Dig roof section falls, killing woman

    07/11/2006 8:36:42 AM PDT · by NHThompson · 97 replies · 2,916+ views
    Mitt Romney's political future ended at 11:00 p.m. last night...
  • Hacker Invades FBI Computers

    07/06/2006 7:02:41 AM PDT · by bd476 · 16 replies · 3,939+ views
    Hacker Invades FBI Computers WASHINGTON, D.C., July 6, 2006(CBS) A U.S. government consultant used software programs found on the Internet to break into the FBI's computer system, where he gained access to the passwords of 38,000 employees, including that of FBI Director Robert Mueller, the Washington Post reports. The newspaper said Joseph Thomas Colon broke into the computer system four times in 2004 in hacks that gave him access to files on the Witness Protection Program and counterintelligence. As a result, the bureau was forced to temporarily shut down the system and conduct a lengthy investigation to determine whether any...
  • Zombie builders send out phone texts

    06/23/2006 2:24:31 PM PDT · by nickcarraway · 2 replies · 866+ views
    CNET News.com ^ | June 23, 2006 | Tom Espiner
    Hackers are trying to lure people to a malicious Web site using cell phone text messages, a security company has warned. The blended attack uses social engineering techniques in its attempt to trick people to the site, security vendor Websense said in an advisory. An SMS text message is sent to the targets' cell phones, thanking them for subscribing to a fictitious dating service. The message states that they will be automatically charged a fee of $2.00 per day via their phone bill, unless their subscription is cancelled online. The same message has also been sent multiple times to the...
  • Hacked bank server hosts phishing sites

    03/13/2006 9:16:55 AM PST · by holymoly · 11 replies · 1,228+ views
    Computerworld ^ | MARCH 13, 2006 | Jeremy Kirk
    China Construction Bank may not know that a security vulnerability on its server has been exploited Criminals appear to have hacked a Chinese bank's server and are using it to host phishing sites to steal personal data from customers of eBay Inc. and a major U.S. bank., according to Internet services company Netcraft Ltd. It may be the first scheme that uses one bank's infrastructure to exploit another bank, said Paul Mutton, an Internet services developer for Netcraft, based in Bath, England. A user of Netcraft's free phishing toolbar reported receiving a suspicious e-mail, Mutton said. The e-mail led to...
  • Murtha says he wouldn't join military now

    01/03/2006 1:39:13 PM PST · by jmaroneps37 · 68 replies · 1,941+ views
    drudgereport ^ | Jan. 3, 2006 | Reuters, unknown
    WASHINGTON Rep. John Murtha, a key Democratic voice who favors pulling U.S. troops from Iraq, said in remarks airing on Monday that he would not join the U.S. military today. A decorated Vietnam combat veteran who retired as a colonel after 37 years in the U.S. Marine Corps, Murtha told ABC News' "Nightline" program that Iraq "absolutely" was a wrong war for President George W. Bush to have launched. "Would you join (the military) today?," he was asked in an interview taped on Friday. "No," replied Murtha of Pennsylvania, the top Democrat on the House of Representatives subcommittee that oversees...
  • Information Warfare: StrategyPage Server Stormed [by Chinese Hackers]

    12/17/2005 6:19:48 AM PST · by Wiz · 11 replies · 691+ views
    Strategy Page ^ | 2005 Dec 17
    December 17, 2005: StrategyPage doesn’t just report on Cyber War, sometimes we get caught in the middle of it. We got an electronic nastygram from China recently when, as we were installing a new server, at a hosting site (to improve response time, and lessen the workload on the volunteer staffers who maintain the server). There was a gap of a few days between the time the new server went online, and the hardware firewall (which is a bear to configure) got installed. Into that opening, some Chinese hackers got onto the server and tried to take it over. Actually,...
  • Rainbow warriors crack password hashes (Is it safe? Nope)

    11/19/2005 9:18:37 AM PST · by cloud8 · 26 replies · 1,375+ views
    The Register (UK) ^ | 11/10/05 | Robert Lemos
    A trio of entrepreneurial hackers hope to do for the business of password cracking what Google did for search and, in the process, may remove the last vestiges of security from many password systems. Over the past two years, three security enthusiasts from the United States and Europe set a host of computers to the task of creating eleven enormous tables of data that can be used to look up common passwords. The tables - totaling 500GB - form the core data of a technique known as rainbow cracking, which uses vast dictionaries of data to let anyone reverse the...
  • Site was HACKED by turkish islamo hackers read the message - death for all

    11/06/2005 4:31:33 AM PST · by bill1952 · 19 replies · 1,119+ views
    web ^ | 11/06/05 | Turkish Impact
    For The Peace Among All The Countries In The World... NO WAR... We have conquered the world for ages...However we never hurt,rape our Captives. We never made them suffer.Today the world is changing.ýn the lands that are suffering from unfair invasion and exploitation,brutality and grief is reigning...we are calling out to you out there..america russia canada france and Israel are gonna pay for what they have done to this world one day,however sometimes we make those days closer and rampage without a blink... Forum.TR Devilish baseness from the English who are jealous of 'Forum TR ' that has lately become...
  • Senator Clinton Urges President To Select Next Supreme Court Nominee By Consensus

    10/28/2005 7:00:23 AM PDT · by LurkedLongEnough · 125 replies · 2,103+ views
    NY 1 ^ | October 27, 2005 | NY 1 News
    As the president prepares to select a new nominee for the Supreme Court, Senator Hillary Rodham Clinton released a statement urging the president to select the next nominee carefully. "I urge the president to take seriously the Constitution's charge and to engage the U.S. Senate – both Republicans and Democrats – in a process of genuine consultation in order to identify and ultimately confirm a consensus nominee," the New York senator said in a statement Thursday. Harriet Miers withdrew her nomination to the Supreme Court Thursday amid escalating criticism about her qualifications for the job. The president said he reluctantly...
  • Illegal Patronage Probe Snares Ky. Gov. [Republican Gov. Ernie Fletcher....]

    10/13/2005 11:28:42 AM PDT · by Sub-Driver · 4 replies · 477+ views
    Illegal Patronage Probe Snares Ky. Gov. By MARK R. CHELLGREN, Associated Press Writer 3 minutes ago For the past few months, Republican Gov. Ernie Fletcher has been doing just about everything he can to fend off a criminal investigation into alleged political hiring-and-firing by his administration. But the investigation has steamed on, and appears to be getting closer to Fletcher himself. Eleven current or former members of his administration have been indicted so far in the probe by Kentucky's attorney general. And while there has been little or no evidence to publicly connect the governor to any wrongdoing, his efforts...
  • Politics vs. Judging (Why requiring proof of Miers' conservatism is just plain wrong!)

    10/13/2005 11:26:56 AM PDT · by quidnunc · 31 replies · 580+ views
    The Arkansas Democrat-Gazette ^ | October 13, 2005 | Bradley R. Gitz
    President Bush has divided conservatives with his choice of a “stealth” nominee for the Supreme Court who has no experience grappling with constitutional issues. But the conservative claim that we have insufficient guarantees that Harriet Miers is sufficiently conservative also reflects a conservative version of the kind of misunderstanding of the judiciary that liberals so frequently make. A plausible argument could be made that the greatest challenge in contemporary American politics is the restoration of judicial integrity. The only means for doing so is to appoint judges to the federal courts who are committed to applying the law as intended...
  • The Latest Snark (Speaking truth to Daffy Duck conservatives opposed to Harrier Miers)

    10/07/2005 3:23:50 PM PDT · by quidnunc · 134 replies · 1,612+ views
    Irish Pennants ^ | October 7, 2005 | Jack Kelly
    The latest snark among conservatives opposed to the Miers nomination has been generated by this paragraph this story in the Washington Post: In an initial chat with Miers, according to several people with knowledge of the exchange, Leahy asked her to name her favorite Supreme Court justices. Miers responded with "Warren" — which led Leahy to ask her whether she meant former Chief Justice Earl Warren, a liberal icon, or former Chief Justice Warren Burger, a conservative who voted for Roe v. Wade . Miers said she meant Warren Burger, the sources said. Here's what Polipundit was told happened: "Miers...
  • Bush vs. The Mother ('Rolling Stone' Writer: 'Cindy's Ex 'a coward,' Crawford is 'dog s***')

    08/28/2005 10:30:12 PM PDT · by L.N. Smithee · 71 replies · 2,426+ views
    Rolling Stone Magazine ^ | September 8, 2005 | Matt Taibbi
    Crawford, the home of President George W. Bush, is a sun-scorched hole of a backwater Texas town -- a single dreary railroad crossing surrounded on all sides by roasted earth the color of dried dog s---. There are scattered clumps of trees and brush, but all the foliage seems bent from the sun's rays and ready at any moment to burst into flames. The moaning cattle along the lonely roads sound like they're begging for their lives. The downtown streets are empty. Just as the earth is home to natural bridges, this place is a natural dead end -- the...
  • "Deuce Bigalow: European Gigolo" (Ebert 0 Star review ends with peerless dismissal) (Humor)

    08/12/2005 8:10:01 AM PDT · by Borges · 67 replies · 3,276+ views
    rogerebert.com ^ | 8/12/05 | Roger Ebert
    "Deuce Bigalow: European Gigolo" makes a living cleaning fish tanks and occasionally prostituting himself. How much he charges I'm not sure, but the price is worth it if it keeps him off the streets and out of another movie. "Deuce Bigalow" is aggressively bad, as if it wants to cause suffering to the audience. The best thing about it is that it runs for only 75 minutes. Rob Schneider is back, playing a male prostitute (or, as the movie reminds us dozens of times, a "man whore"). He is not a gay hustler, but specializes in pleasuring women, although the...
  • Microsoft's "monkeys" find first zero-day exploit

    08/09/2005 9:11:18 AM PDT · by theBuckwheat · 29 replies · 731+ views
    Security Focus ^ | 8 August 2005 | Robert Lemos
    Microsoft's "monkeys" find first zero-day exploit Robert Lemos, SecurityFocus 2005-08-08 Microsoft 's experimental Honeymonkey project has found almost 750 Web pages that attempt to load malicious code onto visitors' computers and detected an attack using a vulnerability that had not been publicly disclosed, the software giant said in a paper released this month. Known more formerly as the Strider Honeymonkey Exploit Detection System, the project uses automated Windows XP clients to surf questionable parts of the Web looking for sites that compromise the systems without any user interaction. In the latest experiments, Microsoft has identified 752 specific addresses owned by...
  • Windows copy protection defeated(1 line of JavaScript allows systems to ignore authentication check)

    07/31/2005 11:59:22 PM PDT · by nickcarraway · 50 replies · 4,035+ views
    vnunet.com ^ | 01 Aug 2005 | Tom Sanders
    Single line of JavaScript allows systems to simply ignore authentication check Hackers have found a way to circumvent a check in Windows that aimed to prevent users of pirated copies from accessing software updates. By pasting a special JavaScript command in the address bar of the browser, users can disable the Windows Genuine Advantage 1.0 check that Microsoft took live last week. The Microsoft technology uses an ActiveX tool to force the user to go through an authentication check before he is allowed to access certain download sections on the Microsoft.com website. The JavaScript command simply instructs the computer to...
  • British man admits U.S. military hacking

    07/27/2005 9:54:26 AM PDT · by Hadean · 11 replies · 485+ views
    News Emporium ^ | 7/27/2005
    LONDON, July 27 (UPI) -- A London man has admitted hacking into the U.S. military computer system to prove the existence of UFOs and point out security loopholes, his lawyer said. Gary McKinnon, 39, was fighting extradition from Britain to face claims he illegally accessed 97 U.S. government computers and caused $645,000 in damage during a year of hacking. Attorney Karen Todner said McKinnon's main aim was to prove that UFOs exist. "His motivation was firstly in relation to that, and secondly in relation to exposing the lack of security in relation to the American system," Todner told Sky News....
  • INFORMATION WARFARE: Chinese Worms Go For The Goodies

    07/26/2005 5:49:51 AM PDT · by Wiz · 4 replies · 450+ views
    Strategy Page ^ | 2005 Jul 26
    July 26, 2005: Online crime is becoming big business, and most of the practitioners are coming out of Russia (and Eastern Europe) and China. The Russian hackers are going after money, protected by powerful Russian criminal gangs and police who are having a hard time keeping up with the technology. The Chinese are going after commercial and government secrets, and are trying to be quiet about it. The Russians are behind the most serious credit card and banking scams, as well as money laundering. China is apparently behind the sudden surge of malware that sneaks into PCs and tries to...
  • Email Scam?

    06/19/2005 6:52:34 PM PDT · by Racehorse · 4 replies · 952+ views
    We received a call from friends working in Shanghai warning us we might receive an email containing an input form dressed up as an online address book.  The email bears a request to complete OUR FRIEND'S NAME address book.  Information requests name, addresses, telephone numbers, email addresses, just the sort of information you might expect to find in an address book.  It also included an option authorizing the collector (something called Ringo) to use the information.Our friends had not requested nor authorized the email to be sent nor the information collected.  They believe their home computer was hacked and the...
  • Ezboard Inc. Victim Of Vicious Internet Attack

    06/03/2005 3:47:20 PM PDT · by GOP_1900AD · 16 replies · 575+ views
    Halifax Live ^ | Jun 1, 2005 | D.L. McCracken
    Ezboard Inc. Victim Of Vicious Internet Attack By D.L. McCracken Jun 1, 2005, 11:30 Ezboard systems touted as the "largest online community network site on the planet", was virtually brought to its knees Tuesday as the result of "a very precise and malicious internet attack resulting in the loss of a significant amount of current and historical board postings and interrupted services across all systems", according to Ezboards' CEO, Robert Labatt's message to Ezboard members. Tuesday's attack caused denial of service errors throughout the system and affected millions of users across approximately 9,000 message boards. The attack resulted in massive...