EXPOSED! Top Hacker Secrets…

Macleod, Calum
June 2007
Management Services;Summer2007, Vol. 51 Issue 2, p46
Academic Journal
The article offers information on computer hacking. According to the author, it often starts when a hacker sees a file directory or workstation that is just too hard to pass by, like one named salary comparison. Once hackers decide to break into a target system, their next stop is a search engine. Once they enter a target system with a privileged password, they now have more access to data than the system's legitimate users. Curiosity is one scenario motivating the most common hacker, another is revenge.


Related Articles

  • Hacker tracer.  // CRN;11/7/2005, Issue 1170, p38 

    This article focuses on various computer hackers. A buffer overflow vulnerability in Oracle l0g can allow an attacker to execute commands remotely with administrative privileges. Multiple security flaws in BCA Systems' WebLogic Server may allow an attacker to execute denial-of- service attacks,...

  • Ending the age of the password.  // Computer Weekly;2/22/2005, p30 

    The article discusses the idea of ending the age of the password. IT directors face the constant challenge of giving the business enough flexibility to access IT however, wherever and whenever end-users need to, while keeping out intruders. Meanwhile, hackers are using ever more devious means of...

  • Wow! What a Password! Adams, Randy // San Diego Business Journal;1/4/2010, Vol. 31 Issue 1, p4 

    The article presents tips on how to change passwords. It states that the changing of passwords is important for safety purposes. It infers that in changing a password, one must use uppercase, lowercase, number and symbols for the protection of the password. It is also advised to use longer...

  • Loyal Employees or Snooping Staff? You Decide. Fullbrook, Mark // Database & Network Journal;Oct2009, Vol. 39 Issue 5, p9 

    The article offers tips on how company data can be protected from hackers. Employers are advised to ensure that privileged administrative and application accounts are highly guarded from unauthorised use. It also suggests that employers should develop their privileged accounts including a list...

  • An Efficient Analysis of Honeypot Data Based on Markov Chain. Kimou, K. P.; Barry, B.; Babri, M.; Oumtanaga, S.; Kadjo, L. // Journal of Applied Sciences;2010, Vol. 10 Issue 3, p196 

    The aim of this study is to provide a behavioral modeling of hackers for a better predisposition to secure the Internet. Thus, using data collected from the experimental platform of CAD Ho project, an efficient analysis of these data has been made. This preliminary study has identified the...

  • CYBERCRIME. Griffin, Ronald C. // Journal of International Commercial Law & Technology;Apr2012, Vol. 7 Issue 2, p136 

    This essay recounts campaigns against privacy; the fortifications erected against them; and hi-jinx attributable to hackers, crackers, and miscreants under the Fair Credit Reporting Act.

  • Superzapping in Computerland. Golden, Frederic; Faflick, Philip; U.S., other // Time;1/12/1981, Vol. 117 Issue 2, p88 

    The article discusses the increase in computer crimes and the safety measures being taken by computer users. It is stated that several companies reported of their circuits being plagued by electronic interlopers and the police traced a gang of 13-year old children who hacked the systems. As...

  • Today's Attackers Can Find the Needle. Mimoso, Michael S.; Savage, Marcia // Information Security;Jun2006, Vol. 9 Issue 6, p24 

    This article discusses the type of for-profit crime plaguing the Internet. Today's hackers want customer data and intellectual property and they also want to infiltrate government agencies. Stealth technology that are being used by attackers include rootkits which are bundled in spyware. Ways to...

  • Hacker Taggers: A new type of hackers. Warren, Matthew; Leitch, Shona // Information Systems Frontiers;Sep2010, Vol. 12 Issue 4, p425 

    Organisations often spend large sums of money to ensure that they are protected against the risks associated with online attacks. The perceived threats against organisations are well known and the losses can be easily quantified. This perceived threat is usually portrayed by the media as being...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics