LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Security Week: October 27th, 2014
Linux Advisory Watch: October 24th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Hacks/Cracks
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.



Hackers making Napster 'irrelevant'  16 July 2000 
Source: ZDNet - Posted by Dave Wreski   
ZDNet's got quite a bit on the H2K conference. "Musicians and academics debated the right and wrong of sharing digital music on the Internet at the Hacking on Planet Earth 2000 (H2K) conference Saturday. While both the panelists and the . . .
 
Commentary: Cult of the Dead Cow more fluff than stuff  16 July 2000 
Source: ZDNet - Posted by Dave Wreski   
Cult of the Dead Cow (cDc) put on their usual extravaganza here Saturday at the Hacking on Planet Earth 2000 (H2K) conference. Last year at DEF CON 7.O, I reported on the hacking group releasing the . . .
 
Why it's a 'Summer of Hacking'  14 July 2000 
Source: ZDNet - Posted by Jen Olson   
If you want an exercise in semantics, randomly ask five wired people to define the term hacker. Their answers will vary wildly, I guarantee. An old school techie may insist a hacker is a black-belt computer programmer or engineer. A belabored . . .
 
Two accused of hacking NASA computers  14 July 2000 
Source: CNN - Posted by Dave Wreski   
Two New Yorkers, one of them a 15-year-old high school student on Long Island, have been arrested and accused of hacking into NASA computers. It was unknown whether the cases were linked. The teen surrendered to police Tuesday for allegedly hacking . . .
 
It's a love-hate relationship  14 July 2000 
Source: ZDNet - Posted by Benjamin D. Thomas   
The arrest of a noted 'white hat' -- one of the supposed good guys in the trade -- exposes the often murky relationship between federal investigators and hackers. The world of computer hackers divides itself into good and bad by . . .
 
NZ to label computer hacking a crime  13 July 2000 
Source: Fairfax IT - Posted by Chris Pallack   
Computer hacking is likely to become punishable by imprisonment under new legislation proposed by the New Zealand Government. Information Technology and Associate Justice Minister Paul Swain said yesterday he hoped to add the legislation to the Crimes Amendment Bill, currently before . . .
 
Hacked Off  12 July 2000 
Source: pghcitypaper.com - Posted by Dave Wreski   
Eight things hackers hate about you. Hackers aren't crackers, Chris Lichti, a 26-year-old senior system designer at a computer company with offices near Pittsburgh, told me in no uncertain terms. They are a dedicated, workaholic group of aficionados who spend much . . .
 
Mitnick Free to Speak  12 July 2000 
Source: Online Journalism Review - Posted by Dave Wreski   
Kevin Mitnick was informed today by the United States Probation Office that he will be permitted to pursue several offers of employment including speaking engagements, security consulting work and writing for Steven Brill's online magazine Contentville. The approval represents a reversal . . .
 
UK: Hacking threat to national security?  12 July 2000 
Source: ZDNet UK - Posted by Benjamin D. Thomas   
UK population of the opinion that the Internet poses a serious threat to national security, says WhichOnline survey. Nearly a third of all Britons believe the Internet poses a serious threat to national security, according to figures published by WhichOnline . . .
 
Learning how to hack the enemy  11 July 2000 
Source: ZDNet - Posted by Dave Wreski   
With a few keystrokes, nearly 40 student hackers started mapping the computer network of Rutgers University. Using a Unix-based command known as a "traceroute," students who were sequestered in a room just south of San Francisco's Market Street caused every server . . .
 
<< Start < Prev 214 215 216 Next > End >>

Results 2151 - 2160 of 2175
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Pirate Bay founder guilty in historic hacker case
Parallels CTO: Linux container security is not the problem
Advisory says to assume all Drupal 7 websites are compromised
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.