Microsystems Succeeds In Halting Distribution Of Hacker's Program

April 2000
Electronic Education Report;04/12/2000, Vol. 7 Issue 7, p6
Trade Publication
Reports on Microsystems Software's success in halting distribution of a hacker's program that allowed children in the United States to obtain their parents' passwords to disable the filter.


Related Articles

  • Give up your day job. Els, Frik // Finance Week;2/17/2003, p58 

    Highlights the results of a report from Symantec which cleared some misconceptions of Internet and computer network security. Survey of companies using intrusion detection systems in different countries; Top ten attacking countries in terms of overall volume.

  • Cyberterror 101.  // Getting Results...For the Hands-on Manager: Plant Edition;Apr97, Vol. 42 Issue 4, p7 

    Describes tools used by computer hackers and tools used in computer protection. Computer viruses; Worm programs; Logic bombs; Firewalls; Password protection; Virus checkers.

  • Comprehensive security plan is the best defense against net hackers. Radke, Chuck // Business Journal Serving Fresno & the Central San Joaquin Valley;02/28/2000, Issue 322583, p6 

    Provides tips on how companies in California can protect their computer systems from attacks launched by computer hackers. Performance of a risk assessment of the Internet business; Development of security standards; Tests on system defenses and the performance of an entire system audit;...

  • Our Silence Is Hackers' Greatest Ally. Trembly, Ara C. // National Underwriter / Life & Health Financial Services;11/24/2003, Vol. 107 Issue 47, p20 

    Argues that fear is an obstacle in preventing computer hacking in the U.S. Tendency of hacked firms not to report the incident for fear of having anyone know that their system in vulnerable; Underreporting of hacking incidents.

  • Running Scared. Babcock, Charles // Interactive Week;2/12/2001, Vol. 8 Issue 6, p40 

    Deals with the implication of the denial-of-service attack on several systems of major companies on the need for security. Details on the attack on the system of Microsoft Corp.; Information on the deal signed by Microsoft with Akamai Technologies after the attack.

  • Sabotage in cyberspace. Ward, Mark // New Scientist;9/14/96, Vol. 151 Issue 2047, p12 

    Focuses on the overblown threat to national security from computer hackers. Belief that hostile foreign governments are recruiting hackers to attack and disable data networks in Western countries; More trouble from viruses, error by staff and untested software than from information terrorists;...

  • Openhack III bowed but not broken. Dyck, Timothy // eWeek;01/22/2001, Vol. 18 Issue 3, p14 

    Reports on the computer hacking occurred in the Openhack III site. Detection of the bug in the company's code; Cause of the breakdown of the two Open Hack systems; Discovery of intrusion and attempted log in; Ways to remotely shut down or crash IBM WebSphere application server.

  • Web spoofing poses new security threat. Woollacott, Matthew; Radosevich, Lynda // InfoWorld;01/06/97, Vol. 19 Issue 1, p33 

    Discusses tips for avoiding a number of Internet hack attacks. Comparison of hacking techniques; Web spoofing; Syn floods; Ping o' Death; Tools one can use to prevent hacking.

  • Study looks to define 'insider threat'. Gaudin, Sharon // Network World;3/4/2002, Vol. 19 Issue 9, p14 

    Reports the launching of the study of insider-based computer security breaches in the U.S. Protection of IS executive's systems from attacks; Ways to bypass the safeguard of computer systems; Need for the IS managers to know the warning signs of computer attacks.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics