TITLE

WHERE HAVE ALL THE "GOOD" HACKERS GONE?

AUTHOR(S)
Kenny, Tom
PUB. DATE
August 2011
SOURCE
Mix;Aug2011, Vol. 35 Issue 8, p6
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
The article offers the author's insights regarding the hackers including the code to its practice and the appreciation for its culture. The author mentions the influence of hacking and cracking in people's lives, particularly on their professional lives. Furthermore, International Music Software Trade Association's president for music marketing Ray Williams comments on the costs of hacking and cracking and believes that the need to change the behavior of internet users is a must.
ACCESSION #
65305858

 

Related Articles

  • Study for Development of Web Check System. Sung Hoon Kim; Eung-yong Lee; Hwa-su Shin; Jae-il Lee // World Academy of Science, Engineering & Technology;Jun2009, Issue 30, p669 

    Korea has been equipped with the world-best Internet infrastructure and transformed itself into one of the world's most wired nations which is well-matched with its reputation 'Powerful nation in IT'. However, hackers have misused the high accessibility for a monetary purpose by stealing...

  • Passwords 101. Lipscombe, Gail // Australian PC User;Nov2009, Vol. 21 Issue 11, p101 

    The article offers the author's suggestions for preventing online hacking of user passwords. He suggests the installation of security software and antivirus on personal computers. He suggests the creation of a password that will be difficult for hackers to crack. He wants it to contain a minimum...

  • Explorative Assessment of Internet Hacking: An Agent-Based Modeling Approach. Tang, Zaiyong; Bagchi, Kallol; Jain, Anurag // Journal of Information Privacy & Security;2009, Vol. 5 Issue 2, p42 

    Internet hacking is fast becoming a significant threat not only to businesses, but government entities, online communities, and individual Internet users as well. We have built an agent-based model (ABM) to study the dynamics of Internet hacking. Several factors that impact the adoption of...

  • The Red Hackers --Chinese Youth Infused with Nationalism. Chao, Leon // Chinascope;May2005, p8 

    Traces the history of the Chinese Internet generation and their understanding of nationalism. Targets of the massive attacks on foreign government Web sites by Chinese hackers between 1998 and 2002; Categories of Chinese hackers; Organizations and Web sites of Chinese hackers; Promotion of...

  • Yahoo Confirms 400,000 Passwords Stolen in Hack. Prince, Brian // eWeek;7/12/2012, p7 

    The article reports on the confirmation by Yahoo! Inc. officials that an older file from Yahoo Voices has been stolen on July 12, 2012 by hackers that allowed them to steal over 400,000 user credentials. It says that less tan 5% of the stolen Yahoo accounts have valid passwords. A spokesperson...

  • Inside China's booming hacker industry.  // Asian Pacific Post;2/18/2010, p14 

    The article reports on the growing hacker industry in China using Trojan horse programs and other malicious software.

  • My password is not password. Jencius, Marty // Counseling Today;May2013, Vol. 55 Issue 11, p26 

    A personal narrative is presented which explores the author's experience of being hacked.

  • 'Growth hackers' don't need marketing theories, just lots and lots of testing. DAVIES, RUSSELL // Campaign;10/25/2013, p23 

    The author offers his views on growth hacking and its capacity to change.

  • Hack Your City.  // Spinoff;2013, p159 

    The article reports on the National Day of Civic Hacking that took place in more than 80 cities around the U.S. in the summer of 2013.

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics