Keyword: hacking
-
[FBIS Editor's Note: The following selections are taken from "Unrestricted Warfare," a book published in China in February 1999 which proposes tactics for developing countries, in particular China, to compensate for their military inferiority vis-à-vis the United States during a high-tech war. The selections include the table of contents, preface, afterword, and biographical information about the authors printed on the cover. The book was written by two PLA senior colonels from the younger generation of Chinese military officers and was published by the PLA Literature and Arts Publishing House in Beijing, suggesting that its release was endorsed by at least...
-
Microsoft: "Our products aren't engineered for security" Friday 6 September 2002 Brian Valentine, senior vice-president in charge of Microsoft's Windows development, has made a grim admission to the Microsoft Windows Server .net developer conference in Seattle, USA. "I'm not proud," he told delegates yesterday (5 September). "We really haven't done everything we could to protect our customers. Our products just aren't engineered for security," admitted Valentine, who since 1998 has headed Microsoft's Windows division. In August the company put out eight security bulletins. This month it has released two, so far, with the latest urging users to patch a...
-
<p>Microsoft has issued an unusual warning to Windows users: watch out for a hack attack that could lock you out of your computer and turn it into a launching pad for other attacks.</p>
<p>But some security experts said Microsoft's breathless warning provided administrators with little help in sizing up -- or even fending off -- the potential attack.</p>
-
<p>OCEAN CITY, Maryland (CNN) -- A self-proclaimed Web warrior says he enlisted in the United States' war on terror by mounting an incursion into an Internet site said to be run by al Qaeda.</p>
<p>From his beachfront home, Jon Messner uses his keyboard as a weapon against the enemy's site -- first reported by CNN four months ago -- that posts statements from high-ranking al Qaeda members.</p>
-
Filed at 5:33 p.m. ET LAS VEGAS (Reuters) - Can vigilantism save computers from the next big virus threat? Striking back against a computer that is attacking you may be illegal under U.S. law, but a security researcher says people should be allowed to neutralize one that is unwittingly spreading destructive Internet worms like Nimda. ``Arguably the biggest threat the Internet faces today is the propagation of a big worm,'' Timothy Mullen, chief information officer of AnchorIS Inc., based in Charleston, South Carolina. Worms are a form of self-propagating virus that once set in motion can wreak havoc by taking...
-
FBI will have to pay to enter Defcon 2002 Cunning plan will ask them for cash ByINQUIRER staff: Thursday 01 August 2002, 11:19 FBI AGENTS wanting to arrest hackers at Defcon 2002 will have to pay for the privilege this year, Wired magazine reports. Defcon 2002 delegates will have to stump up $75 in cash to enter the occasion, which was somewhat spoiled last year when FBI suits, at the behest of Adobe, arrested Dmitry Sklyarov under the Digital Millennium Copyright Act. The occasion, which is held in Eva Glass' hometown, Las Vegas, appears to be getting a tad respectable,...
-
Man indicted in alleged hacking of county's system By ROSANNA RUIZ Copyright 2002 Houston Chronicle A Houston man who once showed a Harris County official how easy it was for an outsider to access a county computer system was accused by a federal grand jury Wednesday of doing just that. Stefan Puffer, 33, was indicted on two counts of fraud for allegedly hacking into the county district clerk's wireless computer system that has been taken out of operation because of its vulnerability. Puffer is accused of accessing the system March 8, costing the county $5,000 to clean up after the...
-
Mouse clicking your way to martyrdom. Are you an Islamicist with a computer and some spare time? Do you want to contribute to the jihad against the Crusaders but can’t quite make the commitment to fly into buildings or strap on a bomb? Do you “solemnly swear to use your talents only to destroy the Jews with God as your witness?” Then you are just the kind of person being sought to join the “Arab Electronic Jihad Team” (AEJT), a recently announced terrorist initiative preparing to bring the Web to its knees. The AEJT seeks to bring down all Web...
-
Political contribution watch Strange coincidences of our time By Adamson Rust: Tuesday 30 July 2002, 12:01 CONSIDER THIS LOT BELOW and go figure. At least this kind of information about politicians is publicly available in the US. RIAA applauds peer-to-peer hacking bill as "innovative approach" Congressman Howard L. Berman, "representing California's 26th Congressional District". here. And Berman introduces peer to peer privacy prevention act. The top industries supporting Howard L. Berman. Number One: TV/Movies/Music - $186,981. Representative Howard Coble, United States House of Representatives North Carolina Sixth District co-author of Berman's Bill. Top industries supporting Howard Coble. TV/Movies/Music. And while...
-
<p>If you or I asked Congress for permission to legally hack other people's computers, we'd be laughed off Capitol Hill. Then we'd be investigated by the FBI and every other agency concerned with criminal violations of privacy and security.</p>
<p>Then again, you and I aren't part of the movie and music business. We aren't as powerful as an industry that knows no bounds in its paranoia and greed, a cartel that boasts enough money and public-relations talent to turn Congress into a marionette.</p>
-
Friday, 26 July, 2002, 12:42 GMT 13:42 UK Hollywood tries hacking tactics The Harry Potter film was pirated in China last year Hollywood is hoping a law will be passed that would allow it to use hacking techniques to prevent the illegal download of music and movies from the internet. A bill introduced in the US seeks to allow the industry to hack into personal computers to search for illegal material. It could also allow technology to be used to disrupt or disable computers known to be trading in copyrighted films or music. The biggest change would be the lifting...
-
Yale Accuses Princeton of Hacking Thu Jul 25,11:30 PM ET By DIANE SCARPONI, Associated Press Writer NEW HAVEN, Conn. (AP) - Yale University complained to the FBI ( news - web sites) on Thursday that admissions officials at Princeton improperly entered a Yale Web site that was set up for prospective students. Yale said it found 18 unauthorized log-ins to the Web site that were traced back to computers at Princeton, including computers in the admissions office. "We're assessing the information to see if there is a federal violation," FBI spokeswoman Lisa Bull said. The head of admissions at Princeton...
-
Record makers could win the right to carry out hack attacks on music sharing services if a US proposal becomes law. Californian congressman Howard Berman has drawn up a bill that would legalise the disruption of peer-to-peer networks by companies who are trying to stop people pirating copyrighted materials. If his idea becomes law, record companies will be able to carry out a variety of attacks on the sharing services to make them unusable or so irritating to use that people abandon them. Existing legislation makes it an offence for anyone to carry out many of the attacks mooted in...
-
HACKINGAussie hacker jailed for sewage attacksby Luke TaggPosted Thu, 01 Nov 2001A 49-year old Brisbane man has been sentenced to two years in prison for hacking into a local council's computerised waste management system, causing an environmental disaster which saw millions of litres of raw sewage spill into rivers, parks and the grounds of a Hyatt Regency hotel. Vitek Boden was found guilty on 30 charges involving computer hacking, theft and causing significant environmental damage after his exploits in March and April last year, in what is being described as the world's first environmental vandalism case. The Maroochydore District Court...
-
The Pentagon has had its second major intelligence embarrassment in a week after a teenager in Austria hacked into secret plans, including the location of US nuclear missiles. The exploits of Markus Hirsch, 17, come only days after British surveillance enthusiast John Locker was able to hack into US spy satellite pictures. Now an FBI team is on its way to Vienna to question Markus. Their big fear is that Osama bin Laden followers may have enjoyed similar access for months. American protection of its secrets has never been higher since 11 September, with even the most conservative estimates saying...
-
Dr. Damn cleans house for file-swappers By John Borland Special to ZDNet News April 25, 2002, 4:30 AM PT The record companies had their Napster, and the stream of file-swapping companies that followed. The file-swapping companies now have their "Dr. Damn." For the past several weeks, the pseudonymous programmer, who says he's a male college student and declines to give his real name, has been releasing versions of popular file-swapping programs online with the advertising and user-tracking features stripped out. He's done Grokster and iMesh. And he's not alone. His work, now available through the Grokster and iMesh networks themselves,...
-
Indian hacker turns cyber cop Net security is an increasing concern in India By Brajesh Upadhyay of the BBC Hindi service The clock had just struck midnight when users logged onto a popular chat site noticed a rather short message flashing up on their monitors: "DOS attack". To the majority, it may not have meant much, but to 16-year-old Ankit Fadia sitting in front of his PC in the Indian capital Delhi it was a "Denial of Service" attack - someone somewhere was trying to hack into a website. Within seconds, he had managed to track the location of the...
-
Yahoo's home page looked like the following as of 7:41 CST: Founded by Jim Furtado and Sean Forman, the Baseball Think Factory ties together a wide range of baseball interests and information under a single company. Please visit our sites. Feel free to tell us what you think about them.Baseball-Reference.com Find statistics from 1871 to the present for major league players, teams, and leagues. Complete post-season and managerial data is included as well along with other interesting features including The Baseball Travel Guide where you can find all the baseball close to you from Akron to Yuma. BaseballPrimer.com...
-
Is it Nicole's Revenge... or a teenage prank? Check out www.hallewood.com and compare with www.hallewood.com/hallewood_intro.html.
|
|
|