Berkeley computer sleuth outwits West German hacker
نویسندگان
چکیده
منابع مشابه
Are computer hacker break-ins ethical?
Recent incidents of unauthorized computer intrusion have brought about discussion of the ethics of breaking into computers. Some individuals have argued that as long as no significant damage results, break-ins may serve a useful purpose. Others counter with the expression that the break-ins are almost always harmful and wrong. This article lists and refutes many of the reasons given to justify ...
متن کاملThe Heroic Hacker: Legends of the Computer Age
The computer hacker has been depicted in the popularpress as a socially maladjusted teenager whose goal is to wreak malicious havoc on unsuspecting computer users. In the culture of the computer programmer however, the hacker takes on a far different aspect. The true hacker is raised to heroic status with tales of amazing feats circulated through computer networks in the form of stories and leg...
متن کاملIn the Hacker's Eye: The Neurophysiology of a Computer Hacker
This paper presents data from a preliminary investigation on the neurophysiological changes that occur when a person attempts to crack a password. A password cracking scenario was provided to a small cohort of university students and while they were attempting to crack into the password, their EEG was recorded. The results indicate that the overall frontal lobe power (at electrode position F7) ...
متن کاملCurrent Research by The Computer Systems Research Group of Berkeley
The release of 4.3BSD in April of 1986 addressed many of the performance problems and unfinished interfaces present in 4.2BSD [Leffler84] [McKusick85]. The Computer Systems Research Group at Berkeley has now embarked on a new dev elopment phase to update other major components of the system, as well as to offer new functionality. There are five major ongoing projects. The first is to develop an...
متن کاملHacker Cartography: Crowdsourced Geography, OpenStreetMap, and the Hacker Political Imaginary
In this paper I trace the origins of “neogeography” (a constellation of new mapping practices and populations on the geospatial web) to its roots in computer hacker culture, notably through early mapping mashups, known originally as “map hacks”. I argue that a return to the figure of the hacker—via the proposed concept of hacker cartography—offers a productive lens for understanding the afforda...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Nature
سال: 1988
ISSN: 0028-0836,1476-4687
DOI: 10.1038/333105a0