Author: JT Smith
Category:
- Unix
Author: JT Smith
Category:
Author: JT Smith
Category:
Author: JT Smith
Category:
Author: JT Smith
An ICQ logo with a flashing “Hacked” graphic across it, a flag with another graphic depicting the name of the hacker group and a text message taunting
system administrators made their way onto at least two ICQ home pages, and possibly an unconfirmed third page.”
Category:
Author: JT Smith
IBM Asia Pacific senior middleware manager Justin Martin said IBM
supported any platform that was attractive to customers, whether it was
IBM, open source or a third-party operating system.”
Category:
Author: JT Smith
Author: JT Smith
Your transgression is that of “circumvention,” a criminal
act created by the 1998 Digital Millennium Copyright Act.”
Author: JT Smith
Known as “Peekabooty”–and previously as Project X–the program could allow dissidents in
authoritarian countries to speak out online by hiding the identity of its users.
Although the program was expected to be released at Def Con, the well-known hacker to-do, the
group has decided to solve some sticky technical problems first.”
Author: JT Smith
Category:
Author: JT Smith
Category: