Kenny, Tom
August 2011
Mix;Aug2011, Vol. 35 Issue 8, p6
The article offers the author's insights regarding the hackers including the code to its practice and the appreciation for its culture. The author mentions the influence of hacking and cracking in people's lives, particularly on their professional lives. Furthermore, International Music Software Trade Association's president for music marketing Ray Williams comments on the costs of hacking and cracking and believes that the need to change the behavior of internet users is a must.


Related Articles

  • Untitled. Ashford, Warwick // Computer Weekly;11/23/2010, p29 

    The article reports that according to the periodical "Get Safe Online" annual report, security conscious Internet users are being exploited by cyber criminals with rogue anti-virus scams and most of the users in Great Britain are ignorant of these scams. It says that despite the increased use of...

  • HOW TO HELP THE HACKERS.  // New York Times Upfront;3/15/2010, Vol. 142 Issue 11, p4 

    The article focuses on the most common passwords used by web users that allow hackers to have easy access into their accounts.

  • SMART DOT COM.  // Dolly;Oct2009, Issue 468, p39 

    The article offers tips from David Freer of Symantec on how to avoid fraudulent Web sites. He suggests looking out for spelling mistakes in the uniform resource locator (URL). Internet users are advised to be wary of electronic mail (email) that requests direct log. The article also stresses...

  • The Government of Canada and Cyber Security: Security Begins at Home. Adams, John // Journal of Military & Strategic Studies;2012, Vol. 14 Issue 2, p1 

    The article focuses on the state of cyber security in Canada. It shows that the country spend more time on the Internet wherein people aged 55 and older are the fastest growing demographic of Internet users, accounting for one in five Internet users. It warns that threats from cyber-espionage,...

  • E-PRECAUTION ADOPTION: WHAT DO THE CUSTOMERS THINK? Pei-ju Lucy Ting; McGoldrick, Peter J.; Keeling, Kathy A. // Proceedings of the IADIS International Conference on WWW/Interne;Nov2006, p487 

    Despite user awareness of the dangers associated with Internet privacy and security, use of many e-precautions is low. There is a need for measures to help understand the acceptability of e-precautions adoption. The Decisional Balance Scales construct, which reflects the individual's relative...

  • Chinese Hackers: "Tonight, Let's Attack CNN!". Jia, Howard // Chinascope;May/Jun2008, p12 

    The article discusses the plan of various Internet user groups in China to attack U.S. TV news organization CNN on April 19, 2008. Announcement made by Hackers in China regarding the TV station is presented. According to the article, China Hacker Union is the biggest organization of computer...

  • Alias / Handle.  // Network Dictionary;2007, p31 

    A definition of the term "Alias/Handle" is presented. In relation to computer security, the term refers to an alternative name or identification used by people to hide their true identities. Aliases are commonly used by Internet users to disguise their identities, while hackers, crackers and...

  • Safety and Security on the Internet.  // World Almanac & Book of Facts;2004, p714 

    Discusses safety and security on the Internet. Basic security rules, such as using caution when giving out personal information; Computer viruses; Importance of installing antivirus software on computers; How protective firewall software guards against hacker attacks; Browsers which allow the...

  • Cyberstalkers can wreak havoc on unsuspecting Internet users. Goldsborough, Reid // New Orleans CityBusiness (1994 to 2008);7/5/2004, Vol. 24 Issue 53, p17 

    Discusses organizations that deal with cyberstalking and similar Internet issues. Estimated number of complaints received by organizations annually, according to Jayne Hitchcock, founder of Working to Halt Online Abuse (WHOA); Hitchcok's advice on how to deal with cyberstalkers; Primary method...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics