EXPOSED! Top Hacker Secrets…

Macleod, Calum
June 2007
Management Services;Summer2007, Vol. 51 Issue 2, p46
Academic Journal
The article offers information on computer hacking. According to the author, it often starts when a hacker sees a file directory or workstation that is just too hard to pass by, like one named salary comparison. Once hackers decide to break into a target system, their next stop is a search engine. Once they enter a target system with a privileged password, they now have more access to data than the system's legitimate users. Curiosity is one scenario motivating the most common hacker, another is revenge.


Related Articles

  • Ending the age of the password.  // Computer Weekly;2/22/2005, p30 

    The article discusses the idea of ending the age of the password. IT directors face the constant challenge of giving the business enough flexibility to access IT however, wherever and whenever end-users need to, while keeping out intruders. Meanwhile, hackers are using ever more devious means of...

  • Hacker tracer.  // CRN;11/7/2005, Issue 1170, p38 

    This article focuses on various computer hackers. A buffer overflow vulnerability in Oracle l0g can allow an attacker to execute commands remotely with administrative privileges. Multiple security flaws in BCA Systems' WebLogic Server may allow an attacker to execute denial-of- service attacks,...

  • Wow! What a Password! Adams, Randy // San Diego Business Journal;1/4/2010, Vol. 31 Issue 1, p4 

    The article presents tips on how to change passwords. It states that the changing of passwords is important for safety purposes. It infers that in changing a password, one must use uppercase, lowercase, number and symbols for the protection of the password. It is also advised to use longer...

  • Loyal Employees or Snooping Staff? You Decide. Fullbrook, Mark // Database & Network Journal;Oct2009, Vol. 39 Issue 5, p9 

    The article offers tips on how company data can be protected from hackers. Employers are advised to ensure that privileged administrative and application accounts are highly guarded from unauthorised use. It also suggests that employers should develop their privileged accounts including a list...

  • Drive-by hacker.  // Essential Internet;2003, p70 

    A definition of the term "drive-by hacker" is presented. It refers to someone who breaks into computer networks via a wireless link from outside a building, especially across WI-FI connections. Bandwidth thieves and intruders can simply walk or drive armed with a laptop and a suitable wireless...

  • Coalesce Model to Prevent Format String Attacks. Shekhar, Jayant; Yadav, Seema; Ahmad, Khaleel // International Journal of Computer Science Issues (IJCSI);May2011, Vol. 8 Issue 3, p427 

    Format string attacks cause serious security problems in the field of software security in computer world. Testing and implementation against to Format String vulnerabilities can avoid result due to working of Format String Bugs. In this paper, we have proposed eight novel approaches to prevent...

  • Hacker Steals Tens of Thousands of Pounds from Travel Companies. Goodwin, Bill // Computer Weekly;12/5/2002, p4 

    Reports that the computer systems of various travel firms have been broken into by a computer hacker, in Great Britain as of May 2002. Travel firms whose computer systems have been hacked; Program run by the International Business Machines Corp. RS6000 Unix machines of the companies; Discovery...

  • 30-Year Sentence for Hacking.  // American Banker;1/12/2009, Vol. 174 Issue 7, p13 

    The article reports that Maksym Yastremskly, a computer hacker accused of helping perpetrate the largest data theft in history, was sentenced to 30 years in prison. Yastremskly, who was convicted after breaking into Turkish consumers' bank accounts electronically, plans to appeal the sentence,...

  • Enterprise Security Strategy. Ali Pabrai, Uday O. // Certification Magazine;Nov2003, Vol. 5 Issue 11, p48 

    Offers tips on implementing an enterprise security strategy. Increase in hacker sophistication and speed of attacks; Ways to counter cyber crimes; Strategic objectives for business security.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics