Quote: "No government can be long secure without a formidable opposition." - Benjamin Disraeli
Nom de plume
Discusses a security hole in the author's university's computer system called CatNet.
1 and a quarter
In Best of 2600 book?
Yes, page 612, Section 3 (2000 and Beyond: A Changing Landscape), Chapter 15 (Still More Hacker Stories)
A term used to refer to fraud that involves someone pretending to be someone else in order to steal money or get other benefits. (more..)
A piece of software, a chunk of data, or sequence of commands that take advantage of a bug, glitch or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software, hardware, or something electronic (usually computerized). This frequently includes such things as violently gaining control of a computer system or allowing privilege escalation or a denial of service attack. (more..)
Copyleft 2008-2018 William R. Epp, banner by Max Nardi.