TITLE

EXPOSED! Top Hacker Secrets…

AUTHOR(S)
Macleod, Calum
PUB. DATE
June 2007
SOURCE
Management Services;Summer2007, Vol. 51 Issue 2, p46
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
The article offers information on computer hacking. According to the author, it often starts when a hacker sees a file directory or workstation that is just too hard to pass by, like one named salary comparison. Once hackers decide to break into a target system, their next stop is a search engine. Once they enter a target system with a privileged password, they now have more access to data than the system's legitimate users. Curiosity is one scenario motivating the most common hacker, another is revenge.
ACCESSION #
25547741

 

Related Articles

  • Ending the age of the password.  // Computer Weekly;2/22/2005, p30 

    The article discusses the idea of ending the age of the password. IT directors face the constant challenge of giving the business enough flexibility to access IT however, wherever and whenever end-users need to, while keeping out intruders. Meanwhile, hackers are using ever more devious means of...

  • Hacker tracer.  // CRN;11/7/2005, Issue 1170, p38 

    This article focuses on various computer hackers. A buffer overflow vulnerability in Oracle l0g can allow an attacker to execute commands remotely with administrative privileges. Multiple security flaws in BCA Systems' WebLogic Server may allow an attacker to execute denial-of- service attacks,...

  • Wow! What a Password! Adams, Randy // San Diego Business Journal;1/4/2010, Vol. 31 Issue 1, p4 

    The article presents tips on how to change passwords. It states that the changing of passwords is important for safety purposes. It infers that in changing a password, one must use uppercase, lowercase, number and symbols for the protection of the password. It is also advised to use longer...

  • Loyal Employees or Snooping Staff? You Decide. Fullbrook, Mark // Database & Network Journal;Oct2009, Vol. 39 Issue 5, p9 

    The article offers tips on how company data can be protected from hackers. Employers are advised to ensure that privileged administrative and application accounts are highly guarded from unauthorised use. It also suggests that employers should develop their privileged accounts including a list...

  • Send Internet Bad Guys Packing. Mink, Mary // Credit Union Executive Newsletter;2/7/2005, Vol. 31 Issue 3, p1 

    Reports on the arrest of a number of people allegedly involved in an international cybercrime ring. Target of the group; Agencies involved in the investigation; Implications of the prevailing cybercrime for the credit unions.

  • Online Crime Costs Rising.  // Information Management Journal;Jul/Aug2004, Vol. 38 Issue 4, p14 

    A new survey reveals that online criminals are attacking corporate and government networks more frequently, and it cost businesses a lot of money in 2003. The survey of 500 computer security executives conducted by CSO magazine in cooperation with the U.S. Secret Service and the CERT...

  • An Efficient Analysis of Honeypot Data Based on Markov Chain. Kimou, K. P.; Barry, B.; Babri, M.; Oumtanaga, S.; Kadjo, L. // Journal of Applied Sciences;2010, Vol. 10 Issue 3, p196 

    The aim of this study is to provide a behavioral modeling of hackers for a better predisposition to secure the Internet. Thus, using data collected from the experimental platform of CAD Ho project, an efficient analysis of these data has been made. This preliminary study has identified the...

  • We're in cyberwar. smith, glenn // Investigate;Dec2012, Vol. 10 Issue 135, p36 

    The article discusses the challenges in dealing with computer hackers. It is said that hackers are a shadowy and mask their mischief, hide their identities and cover their trails across cyberspace. Interpol arrested 25 suspected members of the loose-knit Anonymous hacker group in a sweep across...

  • CYBERCRIME. Griffin, Ronald C. // Journal of International Commercial Law & Technology;Apr2012, Vol. 7 Issue 2, p136 

    This essay recounts campaigns against privacy; the fortifications erected against them; and hi-jinx attributable to hackers, crackers, and miscreants under the Fair Credit Reporting Act.

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics