Jumat, 11 Mei 2012
On 03.34 by Presiden Pers No comments
Computer Hackers News Articles
Compiled By
Bob Krause
KRAUSER@SNYSYRV1.BITNET
The following is a list of articles that I have found concerning the
computer underground in various magazines and news-papers. The list is in
chronological order. If you know of an article that should be included in
this list or correction, send me the information and I will add it to the
listing.
Nov 18 '90 Crackdown on computer crime is raising question of computer
rights.
Chicago Tribune pg.17
Oct 29 '90 Users paying big price for PBX fraud.
Network World pg.1
Oct 28 '89 Halting hackers.
The Economist pg.18
Oct 15 '90 Target: The Corporate PBX
Information Week pg.24
Sept 9 '90 Can invaders be stopped but civil liberties upheld?
The New York Times pg.F12
Sept 1 '90 United States v Zod
The Economist pg.23
Sept '90 Digital Desperados; hackers indictments raise constitutional
questions.
Scientific American pg.34
Aug 26 '90 The rights of computer users.
Los Angles Times pg.D9
Aug 22 '90 Open sesame; in the arcane culture of computer hackers, few
doors stay closed.
The Wall Street Journal pg.A1
Aug 20 '90 NY State Police round up hackers.
Computerworld pg.99
Aug 17 '90 U.S. Arrests boy, 5 others in computer hacker case.
The Wall Street Journal pg.82
Aug 6 '90 Computer anarchism calls for a tough response.
Business Week pg.72
Aug 6 '90 Charges dropped against alleged BellSouth hacker.
Telephony pg.12
July 30 '90 Hacker trial begins in Chicago.
Computerworld pg.8
July 30 '90 'Hacking' crackdown is dealt a setback in trial in Chicago
The Wall Street Journal pg.B3
July 21 '90 Crackdown on hackers 'may violate civil rights'.
New Scientist pg.22
July 21 '90 Group to defend civil rights of hackers founded by computer
industry pioneer.
The Wall Street Journal pg.B4
July 10 '90 Group to fight for computer users' rights.
Los Angles Times pg.D5
July 10 '90 Computer hackers plead guilty in case involving BellSouth.
The Wall Street Journal pg.84
July 2 '90 Hackers of the World, Unite!
Newsweek pg.36
May 21 '90 Throwing the book at computer hackers.
Business Week pg.148
May 14 '90 Justice failed in refusing to make Morris an example.
Computerworld pg.23
May 14 '90 Morris sentence spurs debate.
Computerworld pg.128
May 14 '90 Wheels of justice grind to a halt in 'worm' case.
PC Week pg.16
May 7 '90 Three-year probation for Morris.
Computerworld pg.1
May '90 Just say No
Communications of the ACM pg.477
May '90 Uncovering the mystery of Shadowhawk.
Security Management pg.26
Apr 30 '90 The hacker dragnet: the Feds put a trail on computer crooks -
and sideswipe a few innocent bystanders. Newsweek pg.50
March 26'90 Internet interloper targets hacker critics.
Computerworld pg.127
March '90 Cyber Thrash
SPIN pg.24
March '90 Is Computer Hacking a Crime?
Harper's pg.45
Wntr '90 Comp. crime and the Computer Fraud and Abuse Act of 1986
Computer Law Journal pg.71
Feb 19 '90 Morris code.
The New Republic pg.15
Feb 12 '90 Alleged hackers charged wit theft of BellSouth 911 data.
Telephony pg.10
Feb 12 '90 Babes in high-tech toyland nabbed.
Computerworld pg.8
Feb 11 '90 Revenge on the nerds; sure, jail our hackers - who needs
software stars anyway?
Washington Post pg.C5
Feb 9 '90 Hacked to pieces.
New Statesman and Society pg.27
Feb 2 '90 Prevention is better than cure.
Public Finance and Accountancy pg.9
Jan 5 '90 Computer hacking: is a new law needed.
Public Finance and Accountancy pg.7
Feb 7 '90 Four charged with scheme against phones.
The Wall Street Journal pg.B5
Dec 4 '89 Hackers: Is a cure worse than the disease?
Business Week pg.37
Sept '89 Free the hacker two.
Harper's Magazine pg.22
June 19 '89 Hacker invades So. Bell switch.
Telephony pg.11
June '89 Consensual realities in cyberspace
Communication of the ACM pg.664
Apr 3 '89 Strong scruples can curb computer crime.
Computerworld pg.100
March 9 '90 Hackers revealed as spies.
Nature pg.108
March 6 '89 Are ATM's easy targets for crooks?
Business Week pg.30
Feb 20 '89 Prison term for first U.S. hacker-law convict.
Computerworld pg.1
Jan 9 '89 Hacker prosecution: suspect held, denied phone access by
district court.
Computerworld pg.2
Jan 9 '89 Drop the phone: busting a computer whiz.
Time pg.49
Dec 26 '88 The Cyberpunk
People pg.50
Dec 11 '88 Computer intruder is urged by authorities to contact the
laboratory he invaded.
The New York Times pg.24
Nov 14 '88 Portrait of an artist as a young hacker.
Computerworld pg.6
Nov '88 Robopsychology
Omni pg.42
Aug 1 '88 Is your computer Secure?
Business Week pg.64
Apr 28 '88 Hacker runs rings around military security.
New Scientist pg.25
April '88 Computer hackers follow Guttman-like progression.
Sociology and Social Research pg.199
Oct '87 Brian Reid, A Graphics Tale of a Hacker Tracker
Communications of the ACM pg.820
April '86 Positive Alternatives: A report on an ACM Panel on Hacking
Communications of the ACM pg.297
Jan '84 Hacking away at morality.
Communications of the ACM pg.8
Langganan:
Posting Komentar (Atom)
Search
Search This Blog
Blog Archive
-
▼
2012
(73)
-
▼
Mei
(62)
- Vulcano in Java Indonesia
- Art and Culture of Java
- Medicine and Health Care of Indonesian.
- Religion of Indonesian
- Etiquette of Indonesia
- Indonesian Socialization.
- Marriage, Family, and Kinship of Indonesia
- Gender Roles and Statuses Indonesian
- Nongovernmental Organizations and Other Organizati...
- Social Welfare and Change Program of INdonesian
- Political Life Indonesian
- Social Stratification Indonesian
- Indonesian Food in Daily Life.
- Urbanism, Architecture, and the Use of Space Indon...
- History and Ethnic Relations of Indonesia
- Symbolism of Indonesian.
- Linguistic Affiliation of Indonesian
- Indonesia Demography
- Location and Geography
- Indonesian Culture
- Google AdSense Alternatives
- Google AdSense Tips and Tricks
- tutorial google adsense +++
- Adding Google AdSense
- Trik Bermain PES 2012
- Preventing Online Game Hacking the Right Way
- Hacking Servers: Organized Crime
- Credit Card Hackers Are Here - Have You Checked Yo...
- MENDULANG DOLLAR DENGAN GOOGLE ADSENSE UNTUK DOMAIN
- CARA ALTERNATIF UNTUK DAFTAR GOOGLE ADSENSE
- DOS ATTACK
- Website Penetration
- Xp Tricks ll some call it Hack
- Fastest Way To Hack into Someones System
- Universal Codes For Cell Phones And Advanced Tricks
- HACK WEBSITE
- How to make ALL Trojan/Virus/Keylogger UNDETECTABLE
- Windows Phone 7 Tips and Tricks
- Save, Bookmark Locations On Map On Windows Phone 7
- Windows Phone 7 Tips and Tricks
- Hack Orkut Accounts
- Top 16 Hacking Software
- How To: Change Your Ip In Less Then 1 Minute
- FREE Hosting For WAREZ
- debug: Learn how to crack windows, programs ect ma...
- CRIME AND PUZZLEMENT
- Cracking Zip Password Files
- Computer Hackers News Articles
- COMPUTER ELECTRONIC MAIL AND PRIVACY
- How To: Change Your Ip In Less Then 1 Minute
- B A regedit
- BandWidth Explained
- BASIC NETWORKING
- BIOS Update Procedure
- Counterfeiting Money
- GRUB error: unknown filesystem, file not found, gr...
- XLS Converter Version 1.7.3 Full Version (Cracked)
- Seven dangerous new computer hacks (and one silly ...
- Computer Hacking
- Steps to Hack into a Windows XP Computer without c...
- How To Hack – Beginners Guide to Hacking Computers
- Hacking Facebook
-
▼
Mei
(62)
Popular Posts
-
Who has not heard about Java Indonesia ? It is the name of one island in Indonesia. Geographically, Java island located at the southern of...
-
Modern public health care was begun by the Dutch to safeguard plantation workers. It expanded to hospitals and midwifery centers in towns a...
-
Classes and Castes. Aristocratic states and hierarchically-ordered chiefdoms were features of many Indonesian societies for the past mille...
-
Division of Labor by Gender. Women and men share in many aspects of village agriculture, though plowing is more often done by men and har...
-
The development of science and technology has formed part of Indonesia's five-year plans and is directed toward both basic science and ...
-
Indonesian cuisine reflects regional, ethnic, Chinese, Middle Eastern, Indian, and Western influences, and daily food quality, quantity, Wom...
-
Last week the high tech world got just a bit more dangerous - or a bit safer, depending on your perspective. And it was all because of rese...
-
NOTE: Works Only On Certain sites If you have the HTML and java-script knowledge then you can access password protected websites. So you wan...
-
In the old days, twenty years ago, hackers didn't have the same variety of tools for network hacking. With the appearance of the Int...
-
The national motto, Bhinneka Tunggal Ika , is an old Javanese expression usually translated as "unity in diversity." The nation...
0 comments:
Posting Komentar