Search Details

Word: hackers (lookup in dictionary) (lookup stats)
Dates: during 2000-2000
Sort By: most recent first (reverse)


Usage:

...Infamous hacker KEVIN MITNICK is forbidden by the terms of his prison release to use a computer or the Internet. But those hackers are a wily sort. Using his father as an agent, Mitnick has been conducting an online celebrity auction (if you consider a techno-felon a celebrity), selling off his cell phone for $355 and getting $510 for his TRS-80 computer. Geek love ran wild when Mitnick's prison ID card went up for sale; that's when eBay decided there might be some legal issues here. After the site stopped the auction and Yahoo and Amazon...

Author: /time Magazine | Title: People: Dec. 11, 2000 | 12/11/2000 | See Source »

...read. Chad was the most looked-up word on merriam-webster.com last Friday. One possible derivation is from chat--small, white pieces of rock produced in lead mining. But what rock and paper have to do with each other (particularly without scissors) is unclear. Another theory, advanced by the New Hacker's Dictionary, is that chad stems from the "Chadless" paper punch, thought to be named after its inventor, that keeps the little pieces off the floor--ergo the pieces must be chad. "There is a legend that the word was originally acronymic," the dictionary adds, "standing for Card Hole Aggregate...

Author: /time Magazine | Title: Ask Dr. Notebook | 11/27/2000 | See Source »

...stole passwords and credit card numbers; the MTX virus, on the other hand, destroys files and prevents a user from accessing certain websites. Even more dangerous than such worms, possibly, are Trojans. These virus-type programs allow someone else access to your computer. Once they're loaded on, the hacker can do almost anything with your system, from using it to hack other systems to opening new files from anywhere they choose to be. In the words of former Crimson editor Kevin S. Davis '96, Director of Residential Computing at Harvard, "If your computer starts acting like it's possessed...

Author: By Rohan R. Gulrajani, | Title: Computer Contagion | 11/20/2000 | See Source »

...white pickup skids to a halt, the driver spotting a white-tailed doe and a buck in the brush off Sucker Creek Road in Alcona County. The deer are on private property, so if this hacker grabs his rifle and takes a shot, he's under arrest. Bob Mills, my partner, radios to our backups, Sergeant Pete Malette and Officer Warren MacNeill, who are hiding in a nearby grove. "We've got a looker," Mills tells them...

Author: /time Magazine | Title: Bambi's Got A Little Secret | 11/13/2000 | See Source »

...sugary tea in Beirut's Shi'ite Muslim stronghold. But the 38-year-old self-taught Webmaster is holed up in a secret office where the Lebanese Islamic group Hizballah operates an Internet site that blasts propaganda against Israel. With a four-person staff, Hussein is fending off a hacker assault launched by Israelis. "They're going after us!" proclaims Hussein, who loads software designed to deflect the bulk messages that become e-mail bombs when they reach Hizballah's Web address...

Author: /time Magazine | Title: Hizballah Returns to a Dangerous Business | 11/6/2000 | See Source »

First | | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | Next | Last