LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Security Week: September 15th, 2014
Linux Security Week: September 8th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Hacks/Cracks
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.



NASA disputes report that hacker endangered astronauts  05 July 2000 
Source: CNN - Posted by Benjamin D. Thomas   
NASA denied a British report Monday that a computer hacker endangered space shuttle astronauts during a cyber attack on the space agency in 1997. According to a British Broadcasting Corp. documentary, a hacker overloaded a NASA computer system and threatened . . .
 
Hacking For The Common Good?  04 July 2000 
Source: ZDNet - Posted by Jen Olson   
He's nice-looking, polite and very intelligent. He goes by the name Rain Forest Puppy, RFP for short. It's a name that might suggest environmental leanings, but that would be a serious miscalculation. RFP may turn out to be the software industry's . . .
 
High-Tech Spy vs. Spy  04 July 2000 
Source: ABC News - Posted by Dave Wreski   
Transmeta chief executive David Ditzel chuckles at the memory of the sudden interest in the company's trash weeks before taking the wraps off its new, top-secret Crusoe computer chip. But with hundreds of millions of dollars of research on the line, keeping the microprocessor's specifications secret was no laughing matter.. . .
 
Hackers are common criminals  04 July 2000 
Source: TheRegister - Posted by Dave Wreski   
On British TV the other night, a young hacker from Wales was asked why he had broken into a computer and downloaded several thousand people's bank details. He replied that he had done it to prove that the bank's security procedures were inadequate. It should have been obvious that he had no criminal intent and naturally hadn't done anything with the downloaded details. If he hadn't done it, someone else would have. . . .
 
NASA: Hacker Threatened Mission  04 July 2000 
Source: Wired - Posted by Benjamin D. Thomas   
A computer hacker put space shuttle astronauts' lives at risk by overloading NASA's communication system in 1997, the agency told the BBC in a program to be aired Monday. The hacker interfered with computer systems monitoring the heartbeat, pulse, and medical . . .
 
Kaspersky Lab Warns to Be Careful  04 July 2000 
Source: Kaspersky - Posted by Jen Olson   
Kaspersky Lab, an international anti-virus software development company, announces the discovery of a new Internet-worm "Jer", which has an ability to penetrate computers at the moment users visit infected web pages. . . .
 
Hackers break Dreamcast safeguards, distribute games online  01 July 2000 
Source: News.com - Posted by Dave Wreski   
A group of underground computer programmers has broken through copyright protections on Sega's Dreamcast game console, sparking a new explosion of pirated game software online in just a week's time. ... a group calling itself "Utopia" released a set of copied . . .
 
<< Start < Prev 214 215 216 Next > End >>

Results 2151 - 2157 of 2157
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Middle-School Dropout Codes Clever Chat Program That Foils NSA Spying
FreeBSD Patches DoS Vulnerability
Rogue cell towers discovered in Washington, D.C.
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.