Learning how to hack the enemy
Source: ZDNet - Posted by Dave Wreski   
Hacks/Cracks With a few keystrokes, nearly 40 student hackers started mapping the computer network of Rutgers University. Using a Unix-based command known as a "traceroute," students who were sequestered in a room just south of San Francisco's Market Street caused every server . . . With a few keystrokes, nearly 40 student hackers started mapping the computer network of Rutgers University. Using a Unix-based command known as a "traceroute," students who were sequestered in a room just south of San Francisco's Market Street caused every server in the path used to send data between the class and Rutgers to identify itself.

Read this full article at ZDNet

Only registered users can write comments.
Please login or register.

Powered by AkoComment!