Search results for: software

Diary of a Hacker

What I am about to write about happened in October of 1988, right after I had turned 16. Yes, I had a Computer. Yes, I was a hacker. Yes, this is my story. This story is all true. The events in the story are as real as the noses on your faces. Any attempt to change this story would be boring, and unnescessary. Hello. My Handle is The Cuisinart Blade, (I have since changed it) … More

The FBI fights computer crime

The FBI fights computer crime with weapons that are at least ten years old, according to one insider with contacts deep inside the “hacker” community. Hampered by the lack of a single federal law that specifically prohibits computer crime, and hamstrung by the fact that probably three quarters of the computer mischief is done by juveniles who can’t be prosecuted to the full extent of the law, the famous federal police force nevertheless leads the … More

Dial Back isn’t always secure

Date: Thu, 28-Feb-85 Subject: Dial Back isn’t always secure From: [usenet via anonymous donor] An increasingly popular technique for protecting dial-in ports from the ravages of hackers and other more sinister system penetrators is dial back operation wherein a legitimate user initiates a call to the system he desires to connect with, types in his user ID and perhaps a password, disconnects and waits for the system to call him back at a prearranged number. … More

The CyberPunk Movement

There’s been a lot of talk lately about the CyberPunk Movement – maybe a little too much talk (please, Mr. Hewson, don’t sue me for plagiarism! 🙂 ). It seems every BBS I call around here has a “CyberPunk” sub board. Now, that’s all fine and good, but a lot of these BBS’s I’m talking about are PD BBS’S!!! Public Domain cretins and the CyberPunk Movement DO NOT MIX. The idea that piracy/hacking/phreaking is bad … More

For Your Protection

From 2600 magazine volume 7, number 1 SPRING To Subscribe: 2600, PO BOX 752, Middle Island, NY 11953-0752 $18 individual, $45 corporate yearly subscription rates FOR YOUR PROTECTION A year ago, we told the stories of Kevin Mitnick and Herbert Zinn, two hackers who had been sent to prison. It was then, and still is today, a very disturbing chain of events: mischief makers and explorers imprisoned for playing with the wrong toys and for … More

Hackers Penetrate DOD Computer Systems

United States General Accounting Office ___________________________________ GAO Testimony Before the Subcommittee on Government Information and Regulation, Committee on Governmental Affairs, United States Senate _________________________________ For Release COMPUTER on Delivery SECURITY Expected at 1:00 p.m. EST Wednesday, November 20, 1991 Hackers Penetrate DOD Computer Systems Statement of Jack L. Brock, Jr. Director Government Information and Financial Management Information Management and Technology Division GAO/T-IMTEC-92-5 ___________________________________ Mr. Chairman and Members of the Subcommittee: I am pleased to participate … More

List of Computer Hackers News Articles

The following is a list of articles that I have found concerning the computer underground in various magazines and news-papers. The list is in chronological order. If you know of an article that should be included in this list or correction, send me the information and I will add it to the listing. Nov 18 ’90 Crackdown on computer crime is raising question of computer rights. Chicago Tribune pg.17 Oct 29 ’90 Users paying big … More

Rainbow Teams with Global E-Secure to Provide Industry-Leading Security Solutions for India Marketplace

India’s Leading Security Solutions Provider will Market Rainbow’s iKey Authentication Solution IRVINE, Calif., and MUMBAI, India, April 30, 2001 – The Digital Rights Management (DRM) group of Rainbow Technologies, Inc. (Nasdaq: RNBO), a leading provider of security solutions for the Internet and eCommerce, has partnered with Global E-Secure (GESL) of Mumbai, one of India’s leading providers of high-performance security solutions, to market Rainbow’s iKey workstation security solution to eBusinesses throughout the expanding Indian market. GESL … More

InfoExpress Picked by Bell Canada to Enforce Remote Security Policies

Pioneer in enterprise security to provide CyberArmor distributed firewall for telecoms giant’s VPN users Mountain View, California — April 30, 2001 — In the latest of a series of large-scale license agreements, security solutions provider InfoExpress today announced that Canadian telecoms giant Bell Canada has contracted for its “CyberArmor” enterprise personal firewall suite to provide security for remote users of its corporate network. CyberArmor, which allows firms to centrally manage policy-based security among their remote … More

Tashilon Launches Secure4Net at RSA Conference 2001

Using Secure4Net’s Revolutionary Technology, Tashilon Launches, the First Ever Website to Be Encrypted With AES Rijndael, The New Advanced Encryption Standard NEW YORK, April 26 /PRNewswire/ — Tashilon launches, the first website to be encrypted with AES Rijndael and its enabling Secure4Net(TM) technology. Secure4Net(TM) Online Security software is the first security software of its kind to deploy AES Rijndael. “Developing secure, Internet connectivity is critical to the success of business-to-business, business-to-customer, intranet and … More

Over 100,000 NHS computers protected by Sophos Anti-Virus

Sophos, a world leader in corporate anti-virus protection, today announced that it now defends over 100,000 NHS computer users from virus attack. This landmark was achieved when Sophos reseller Foursys closed a deal with Southern Derbyshire Acute Hospitals NHS Trust to provide Sophos Anti-Virus protection for all the Trust’s 2,500 computers. One of the Trust’s sites, The Derbyshire Royal Infirmary, covers an area of thirty acres and is the sole accident-receiving centre for Southern Derbyshire. … More

ICSA Labs Certification Validates Firewall Security for eSoft’s InstaGate EX

BROOMFIELD, Colo., April 23 /PRNewswire Interactive News Release/ — eSoft Inc. (Nasdaq: ESFT) a leading provider of Internet security appliances that include firewall and VPN for small and medium enterprises (SMEs), announced today that its InstaGate EX Internet security appliance and its downloadable Firewall Policy Manager SoftPak passed ICSA Lab’s strict certification requirements for firewall functionality and security. “With the certification program that sets the standards for commercial security products, ICSA Lab’s goal is to … More