Free Republic 3rd Qtr 2025 Fundraising Target: $81,000 Receipts & Pledges to-date: $35,414
43%  
Woo hoo!! And now only $226 to reach 44%!! Thank you all very much!! God bless.

Keyword: hackers

Brevity: Headers | « Text »
  • House OKs life sentences for hackers

    07/15/2002 7:25:15 PM PDT · by trussell · 69 replies · 684+ views
    CNET News.com ^ | July 15, 2002 | Declan McCullagh
    House OKs life sentences for hackers By Declan McCullagh Staff Writer, CNET News.com July 15, 2002, 6:00 PM PT WASHINGTON--The House of Representatives on Monday overwhelmingly approved a bill that would allow for life prison sentences for malicious computer hackers. By a 385-3 vote, the House approved a computer crime bill that also expands police ability to conduct Internet or telephone eavesdropping without first obtaining a court order. The Bush administration had asked Congress to approve the Cyber Security Enhancement Act (CSEA) as a way of responding to electronic intrusions, denial of service attacks and the threat of "cyber-terrorism." The...
  • Hackers hit USA Today's Web site - article claimed President Bush had named a propaganda minister

    07/13/2002 12:47:05 AM PDT · by MeekOneGOP · 4 replies · 200+ views
    Associated Press ^ | July 13, 2002 | Associated Press Staff
    Hackers hit USA Today's Web site 07/13/2002 Associated Press NEW YORK - Hackers broke into USA Today's Web site and replaced legitimate news stories with phony articles, lampooning newsmakers and claiming Israel was under missile attack. The bogus pages were viewable on USAToday.com for about 15 minutes before they were discovered about 11 p.m. Thursday and taken offline, company spokesman Steve Anderson said. Mr. Anderson said the site was shut down for three hours to upgrade security. The hackers appeared to have penetrated the Web server computers from outside company firewalls, he said. All the bogus stories, on seven...
  • U.S. Fears Al Qaeda Cyber Attacks (A MUST-READ)

    06/26/2002 3:56:37 PM PDT · by Timesink · 111 replies · 930+ views
    The Washington Post ^ | June 26, 2002 | Barton Gellman
    [...]Unsettling signs of al Qaeda's aims and skills in cyberspace have led some government experts to conclude that terrorists are at the threshhold of using the Internet as a direct instrument of bloodshed. The new threat bears little resemblance to familiar financial disruptions by hackers responsible for viruses and worms. It comes instead at the meeting points between computers and the physical structures they control.By disabling or taking command of floodgates in a dam, for example, or of substations handling 300,000 volts of electric power, U.S. analysts believe an intruder could use virtual tools to destroy real-world lives and property....
  • Question: Hackers and Trojans

    06/24/2002 9:40:43 AM PDT · by LouD · 10 replies · 201+ views
    none | 6/24 | LouD
    My firewall software frequently logs attempted penetrations of my computer. Among the information it captures is the IP address of the offending PC. My question is, can I use this information to counter-attack the hacker, or notify an unwitting computer owner that his PC or server is infected? How do I go about doing this? I've played with tracer programs before, but never really used the information to follow up.
  • MIT unashamedly training students to be hackers

    06/04/2002 11:53:26 AM PDT · by Scott McCollum · 46 replies · 334+ views
    World Tech Tribune.com ^ | Copyright June 4, 2002 | Scott McCollum
    “A computer sciences graduate student at the Massachusetts Institute of Technology, a highly respected private co-ed tech college in the People’s Republic of Massachusetts, proudly published a paper detailing how to hack the secure software technology on Microsoft’s Xbox video game console. Andrew 'bunnie' Huang told a reporter in a telephone interview that he will not 'share the secret code at all, or the key--those are Microsoft copyrighted items,' and said that he had 'been in touch with Microsoft about my work, and we've been really clear about what they think is legal research activity.' The hack bunnie used to...
  • Hackers may have hit 265,000 state workers

    05/24/2002 5:04:07 PM PDT · by Lorenb420 · 7 replies · 173+ views
    Sacramento Bee ^ | 2002-05-24 | Sam Stanton
    <p>Computer hackers gained access to the California state government's computer systems in April and sensitive financial and personal information about as many as 265,000 state workers, officials said Friday.</p> <p>The electronic assault on payroll and other records was discovered by the Sacramento Valley Hi Tech Task Force, which determined that none of the information has been used illegally so far.</p>
  • Microsoft Discloses Six Flaws in Web Browser

    05/16/2002 8:58:18 PM PDT · by NotJustAnotherPrettyFace · 43 replies · 233+ views
    AP Breaking ^ | May 16, 2002 | Helen Jung The Associated Press
    SEATTLE (AP) - Microsoft Corp. has warned that its Internet Explorer software contains six flaws, some of which could give hackers access to - and even potentially change - personal information about computer users. The Redmond company, which called the severity of some of the flaws "critical," advised users of Explorer versions 5.01, 5.5 and 6.0 to download a patch for the software from the Microsoft Web site at www.microsoft.com/security. The security bulletin issued late Wednesday marks the fourth time this year that Microsoft has issued a fix for Explorer. >{? Among other things, the flaws could allow hackers to...
  • Feds Raid Suspected 'Deceptive Duo' Digs

    05/16/2002 9:46:17 AM PDT · by Registered · 3 replies · 255+ views
    EWeek ^ | 05.15.02 | Dennis Fisher
    <p>The FBI this weekend raided the homes of the two online vandals known as the Deceptive Duo and confiscated their computers, according to a friend of the teens.</p> <p>The Duo -- Robert Lyttle, known online as Pimpshiz, and The-Rev -- defaced numerous government and private industry Web sites over the past few weeks in a spree that they claimed was driven by patriotism.</p>
  • Another Big MS Browser Hole Found

    04/17/2002 1:27:21 PM PDT · by GeneD · 39 replies · 186+ views
    Wired.com ^ | 4/17/02 | Michelle Delio
    <p>Internet Explorer users who click their browser's back button open the Windows operating system to a malicious hack attack.</p> <p>When users hit the back button on Explorer's toolbar, the browser's security settings for the "Internet" zone can be bypassed, and the browser will automatically execute malicious code embedded into a site's URL.</p>