Quote: "I realize that this bill basically says you can tap someone's phone for jaywalking, and normally I would say, 'No way.' But after what happened on September 11th, I say screw 'em." - Dana Lee Dembrow, Democratic member of the Maryland House of Delegates explaining her approval of a new bill that would greatly expand the ability of authorities to monitor e-mail and telephone traffic. Jaywalkers beware.
Discusses a the compromise of an in store computer at Kmart.
In Best of 2600 book?
Yes, page 714, Section 3 (2000 and Beyond: A Changing Landscape), Chapter 17 (Retail Hacking)
A piece of software, a chunk of data, or sequence of commands that take advantage of a bug, glitch or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software, hardware, or something electronic (usually computerized). This frequently includes such things as violently gaining control of a computer system or allowing privilege escalation or a denial of service attack. (more..)
Copyleft 2008-2018 William R. Epp, banner by Max Nardi.