TITLE

NASA's new shuttle designs stolen by hacker

AUTHOR(S)
Crystall, Ben
PUB. DATE
August 2002
SOURCE
New Scientist;8/17/2002, Vol. 175 Issue 2356, p13
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
Reports the stealing of the space shuttle design for the Web site of the National Aeronautics and Space Administration by computer hackers in the U.S. Mechanical designs of the space shuttle; Potential military applications for a reusable launcher; Growth in the satellite launch market.
ACCESSION #
7358108

 

Related Articles

  • You can't prevent hacks, but you can reduce risks. O'Regan, Rob // PC Week;02/14/2000, Vol. 17 Issue 7, p3 

    Comments on strategies recommended to prevent computer hackers' attacks from compromising the security of Web sites. Safety issues raised by hackers' infiltration of popular Web sites; Suggestion to install more high-performance hardware; Consumer education and awareness as valuable safety tools.

  • Hey, I've got an idea. Taylor, Catharine P. // Adweek Eastern Edition;9/27/1999, Vol. 40 Issue 39, p61 

    Recommends a penalty for the computer hacker and the pornography company successfully drawing Internet surfers to porn sites from sites such as the Harvard Law Review.

  • Hackers come, hackers go: Don't get used to it! Regan, Tom // Christian Science Monitor;5/3/2001, Vol. 93 Issue 111, p19 

    Discusses the increase in computer hacking and the efforts of Chinese hackers to deface Web sites for political reasons.

  • Hackers plan their attacks. Baltazar, Henry // eWeek;07/03/2000, Vol. 17 Issue 27, p12 

    Reports on the level of hacker attacks on eWeek Labs' Openhack Interactive e-business test site. Estimated number of attack attempts logged during June 26 and 27, 2000; Modus operandi followed by hackers; Firewalls used to block the attacks.

  • MOST READ NEWS.  // Computer Weekly;8/12/2008, p32 

    The article lists the most visited news stories in August 2008 on the web site, ComputerWeekly.com, which include "Hacker McKinnon looks to Europe to avoid extradition," "Royal Mail unveils details of £1.2bn IT spend," and "SAP user group condemns increase in support costs."

  • the Behacker. Nance, Barry // Network World;4/14/2003, Vol. 20 Issue 15, p35 

    Reports on an ethical hacking project implemented by the author to evaluate the security features of a Microsoft Internet Information Server 5.0-based Web site. Hacking tools used by the author; Use of the UniCode IIS defect of the software; Discovery of passwords.

  • Window Seat.  // Travel Daily;10/5/2012, p3 

    The article reports that the website of the Tourism Industry Council of New South Wales (NSW) and NSW Tourism Awards has been hacked by computer hackers.

  • Untitled. Ashford, Warwick // Computer Weekly;1/12/2010, p68 

    The article reports that a common website security weakness, called cross-site scripting (XSS), was used by computer hackers to deface a website developed to mark Spain's six-month presidency of the European Union (EU).

  • Hacker log: Pathway to successful site attack. Poteet, Jeremy // eWeek;12/2/2002, Vol. 19 Issue 48, p47 

    Presents the author's account of attacking the OpenHack Web site of the 'eWeek' periodical as a part of its interactive security evaluation. Ways by which the web site could have avoided the attack; Details on how the site was hacked.

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics