Tech Insider

Technology and trends

Free Software and Open Source Software

GPL enforcement and intellectual property.

Data Security - Hackers

1985-02-25   A Weakness in the 4.2BSD Unix TCP/IP Software - See document  [PDF]
1985-12-04   Proprietary software was posted - See document

1986-06-10   User Groups and Clubs
1986-07-10   National RBBS List - See document
1986-08-24   RCPM078.LST Remote CP/M phone list - See document  More
1986-09-26   Massive Unix breakins at Stanford

1987-02-25   AT&T Position on Proprietary and Copyrighted Software - See document
1987-03-17   Agrajag The Prolonged
1987-05-24   Terminus
1987-07-22   Bulletin Board Software query - See document
1987-07-27   UUCP map for u.usa.md.1 u.usa.me.1 u.usa.mi.1 - See document  More  More  More  More
1987-10-01   arbitron program - See document
1987-10-25   3B2 tape to tape copy - See document
1987-12-29   Dividing comp.sys.att - See document

1988-03-29   UUCP map for u.usa.md.1 - See document  More  More  More  More  More
1988-04-01   Site 'killer' update - See document
1988-04-19   Current list of publicly available sources - See document  More  More  More  More
1988-05-14   Windowing and the 4425 Terminal - See document
1988-05-21   WIN TCP/IP for 3B15 considered - See document
1988-06-22   Please remove recently posted PD YACC from your systems - See document  More
1988-06-26   List of currently available sources for anonymous UUCP - See document  More
1988-08-03   netsys down soon - See document
1988-08-16   3B2-500s - See document
1988-09-24   3B2/300 vs 310 - See document
1988-10-06   Crossbar Blues - document
1988-10-05   Taran King  Timeline
1988-10-08   Karl Marx
1988-10-18   Making 3B2/310 faster - See document
1988-10-25   3b news groups - See document  More  More
1988-11-03   Internet virus alert - See document  More
1988-11-05   Author of Computer 'Virus' Is Son Of N.S.A. Expert on Data Security  More
1988-11-07   How Computer Science Was Caught Off Guard By One Young Hacker  More  More  More
1988-11-07   Password aging - See document  More
1988-11-21   Unix Security - See document
1988-11-26   Cyberpunks Seek Thrills In Computerized Mischief
1988-12-08   The Internet Worm Program: An Analysis - See document  [PDF]
1988-12-23   A Novice's Guide to Hacking  More  More
1988-12-25   Need recommendation on Modula-2 compiler - See document
1988-12-26   Kevin D. Mitnick Held In Computer Case

1989-01-16   Query about Telebit - See document  More
1989-01-18   The Mentor
1989-01-23   Help - See document
1989-01-03   Unix security and passwords - See document
1989-04-06   Cornell Panel Concludes Morris Responsible For Computer Worm
1989-05-05   GURPS Cyberpunk Article - See document
1989-05-19   idledaemon - See document
1989-05-25   Cornell Suspends Robert Tappan Morris  More
1989-06-12   GURPS Supers Review - See document
1989-07-26   Grand Jury Indicts Student For Crippling Nationwide Computer Network
1989-08-05   Boykin Honored - See document
1989-08-10   Sys V inode bug - See document
1989-08-17   Unix network security - See document
1989-09-23   Erik Bloodaxe
1989-11-12   Emmanuel Goldstein
1989-12-15   Perl3.0/6 on 3B2 - See document

1990-01-17   Computer Failure Disrupts AT&T Long Distance - See document  More
1990-01-26   Cause of AT&T network failure  More
1990-02-01   Hacker's Application and Affidavit for Search Warrant
1990-02-12   Hackers Accused of Scheme Against BellSouth  More  More  More
1990-02-28   Steve Jackson Games Application and Affidavit for Search Warrant
1990-03-02   The Jolnet Scandal
1990-03-02   Killer/attctc Is Permanently Down - See document
1990-03-06   Illuminati BBS Bust
1990-03-07   Info wanted on the Legion of Doom
1990-03-09   Back in the Saddle  More
1990-03-12   More on LOD  More  More
1990-03-27   Computer Underground Digest  More
1990-03-31   Legion of Doom Indictments
1990-04-27   Help Needed
1990-05-08   Government Launches National Search For Computer Hackers  More  More  More
1990-05-15   The Phrack Story
1990-05-20   The History of LOD/H  More
1990-05-30   Mitchell Kapor Eyes Legal Aid for Hackers - See document
1990-05-30   Computer Consultant Could get 32 Years If Convicted of Source-Code Theft
1990-06-03   Drive to Counter Computer Crime Aims at Invaders
1990-06-04   LOD woes
1990-06-13   Crime and Puzzlement
1990-06-24   Crackdown on the `Legion of Doom' Ends an Era for Computer Hackers
1990-07-09   Legion of Doom Members Plead Guilty
1990-07-28   U.S. Drops Computer Case Against Student  More
1990-08-11   Hacker's Interview
1990-08-12   Hacker's Federal Indictment
1990-08-17   Need Help With Internet Access
1990-09-08   Copy of hacker's Indictment
1990-09-11   Hacker's experience with the Secret Service
1990-09-20   GURPS and the FEDS
1990-10-10   Smear Campaign
1990-10-27   Hacker Arrested Again  More
1990-11-17   Knight Lightning  More
1990-11-17   Concerning Hackers Who Break into Computer Systems
1990-11-23   Hacker, SJG etc and retribution
1990-11-30   Hacker view of the Legion of Doom sentencing in Atlanta
1990-12-06   Seeking Unix Gurus
1990-12-10   EFF News 1.00 - Why Defend Hackers? - See document

1991-01-15   Phrack Magazine
1991-03-xx   The United States vs. Craig Neidorf
1991-03-22   Hacker's guilty plea  More  More  More
1991-04-15   Why 'The Legion of Doom' Has Little Fear of the Feds
1991-05-07   The Top Ten Media Errors about the SJ Games Raid
1991-05-22   Going Out of Business Sale  More  More
1991-06-19   LOD Goes Corporate - Meet the Folks at Comsec
1991-06-21   Farewell
1991-07-09   The Terminus
1991-07-12   Article in the "Australian" newspaper
1991-10-24   Letters from Prison  More  More

1992-03-24   Greetings - See document  More
1992-06-07   Some words from a hacker
1992-06-17   AT&T 3B2 and Gcc 2.2.2 - See document
1992-08-29   Scientists cry foul over NASA security raid at Ames
1992-09-26   Usenet News via Satellite - See document  More
1992-09-30   A Statement of Principle (Bruce Sterling)
1992-11-02   Announcing Internet Services - See document
1992-11-07   December's D.C. 2600 Meeting Summary  More  More
1992-11-23   NASA AMES Research Center raid - See document
1992-12-17   Federal agents raid dorm, seize computer equipment

1993-02-05   Review of the new magazine Wired  More  More

1994-01-08   passthru.c - termios based tty<->tty linker - See document
1994-02-xx   The Hacker Crackdown  [PDF]

1995-01-06   Academic/political free speech supression at Deakin Uni - See document
1995-02-28   Suburbia, Melbourne - See document  More
1995-03-07   Strobe v1.00 - See document  More
1995-08-28   joining - See document  More
1995-09-13   Legal Aspects of Computer Crime  More

1996-01-10   B-O-S hub site disconnected - See document
1996-02-23   Telnet access ISP - See document
1996-04-15   NNTPCACHE 0.85 first ALPHA release - See document
1996-10-31   Suburbia.Net non-profit ISP - See document
1996-11-26   pointy-head alert - See document

1997-11-23   Cryptographic filesystem - See document

1998-10-08   Digital Millennium Copyright Act - See document  [PDF]  More  More

1999-01-16   Mailing list programs with PGP-encryption - See document

2000-07-18   Linux/NetBSD speed comparison - See document

2001-07-30   "Code Red" Internet Worm Ready for Serious Strike
2001-10-16   Mirror volunteers needed - See document

Copyright 2014 Tech Insider · E-mail: tech-insider@outlook.com