Hack a Mac

Jackson, Dominique
October 1997
Australian Personal Computer;Oct97, Vol. 18 Issue 10, p24
States that an Australian hacker known as `Starfire,' has won the contest to hack into an Apple Mackintosh Web server. Details on the prize offered in the contest; When the contest commenced; Stipulations of the contest.


Related Articles

  • Anonymous Vows an April 7th 'Electronic Holocaust' Against Israel.  // Israel Faxx;3/30/2015, Vol. 23 Issue 66W, p3 

    The article offers information on the a new video by the masked Anonymous hacker announcing attack on Israel's online servers on April 7, 2015.

  • Hack attack feedback: Sites still at great risk.  // eWeek;10/28/2002, Vol. 19 Issue 43, p5 

    Focuses on articles related to the possible dangers to 13 root servers of the Internet from sophisticated and unsophisticated hackers as published in October 28, 2002 issue of 'eWeek.' Focus areas of the fourth OpenHack contest; Article on the changes that should be considered to help defend...

  • The Web server that stopped the big bad wolves. Petersen, Scot // PC Week;04/26/99, Vol. 16 Issue 17, p28 

    Focuses on the Web server developed by computer engineers and hackers Carolyn Meinel and Vincent Larsen. Computer hackers' failure to break the server; Server's use of Linux's open source code to enhance its security features.

  • Firms must take some blame for hackers.  // Computer Weekly;10/14/2003, p51 

    The attention of the IT world was focused on Aaron Caffrey, who is standing trial at Southwark Crown Court in London, England. The teenager is alleged to have halted computer systems at the port of Houston in Texas with a denial of service attack originating from a computer in his bedroom in...

  • COMPUTATIONAL PUZZLES FOR REPUDIATION OF MISBEHAVING USERS IN ANONYM ZING NETWORK. Shanmugapriya, T.; Magesh Kumar, C.; Kavya, S. P.; Nandhini, M. // International Journal of Advances in Engineering & Technology;May2013, Vol. 6 Issue 2, p1032 

    Anonymizing network provides web services to the users and also hide the client's IP address from the server. All data is wrapped with several layer of encryption. The success of this network, hackers can easily deface popular web site. If the users misbehave, blocking particular IP addresses is...

  • INTERNET SECURITY. Wong, Sang H. // Supply House Times;Feb2004, Vol. 46 Issue 12, p44 

    The Internet is a superhighway for the transfer of electronic information. When a computer is linked to the Internet, it opens a dialog between itself and computers located around the globe. A hacker operating on the other side of the world could gain control of one's computer and wreak havoc...

  • REPELLING ALL INVADERS. Whittle, Sally // Computer Weekly;1/20/2004 Supplement, p18 

    The article focuses on the sudden vulnerability of Linux to virus attacks. Just when one thought Linux was safe from the security glitches that plague Windows users, up popped proof of the open source community's vulnerability. In December 2003, a security flaw was discovered in the Linux 2.4...

  • How to mend a broken internet. O'Brien, Danny // New Scientist;11/13/2004, Vol. 184 Issue 2473, p47 

    This article presents information on the future of the Internet, as explained by David Cheriton, a professor of computing at Stanford University. Cheriton reckons that the internet is dangerously insecure, and it's a verdict that few internet experts would disagree with. From phone networks to...

  • Hacker tracker.  // CRN;9/26/2005, Issue 1164, p55 

    The article presents information on vulnerabilities found in computer applications. An input validation error can allow an attacker to download any file that the Web server has permission to view. In certain circumstances, this may allow an attacker to gain administrative privileges. A...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics