Berkeley computer sleuth outwits West German hacker

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Are computer hacker break-ins ethical?

Recent incidents of unauthorized computer intrusion have brought about discussion of the ethics of breaking into computers. Some individuals have argued that as long as no significant damage results, break-ins may serve a useful purpose. Others counter with the expression that the break-ins are almost always harmful and wrong. This article lists and refutes many of the reasons given to justify ...

متن کامل

The Heroic Hacker: Legends of the Computer Age

The computer hacker has been depicted in the popularpress as a socially maladjusted teenager whose goal is to wreak malicious havoc on unsuspecting computer users. In the culture of the computer programmer however, the hacker takes on a far different aspect. The true hacker is raised to heroic status with tales of amazing feats circulated through computer networks in the form of stories and leg...

متن کامل

In the Hacker's Eye: The Neurophysiology of a Computer Hacker

This paper presents data from a preliminary investigation on the neurophysiological changes that occur when a person attempts to crack a password. A password cracking scenario was provided to a small cohort of university students and while they were attempting to crack into the password, their EEG was recorded. The results indicate that the overall frontal lobe power (at electrode position F7) ...

متن کامل

Current Research by The Computer Systems Research Group of Berkeley

The release of 4.3BSD in April of 1986 addressed many of the performance problems and unfinished interfaces present in 4.2BSD [Leffler84] [McKusick85]. The Computer Systems Research Group at Berkeley has now embarked on a new dev elopment phase to update other major components of the system, as well as to offer new functionality. There are five major ongoing projects. The first is to develop an...

متن کامل

Hacker Cartography: Crowdsourced Geography, OpenStreetMap, and the Hacker Political Imaginary

In this paper I trace the origins of “neogeography” (a constellation of new mapping practices and populations on the geospatial web) to its roots in computer hacker culture, notably through early mapping mashups, known originally as “map hacks”. I argue that a return to the figure of the hacker—via the proposed concept of hacker cartography—offers a productive lens for understanding the afforda...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Nature

سال: 1988

ISSN: 0028-0836,1476-4687

DOI: 10.1038/333105a0