Essays Tagged: "Kevin Poulsen"

This essay is history of hacking.

ars. Stoll later wrote the bestseller "The Cuckoo's Egg" about his pursuit of the hackers.1989 > Kevin Mitnick is convicted of stealing software from DEC and long-distance codes from MCI, becoming ... isappears and a short time later is declared a fugitive. He resurfaces in 1994, as a confederate of Kevin Poulsen in his radio-station contest-rigging scheme. (See 1993.)1991 > The General Accounti ...

(9 pages) 182 0 5.0 Nov/2003

Subjects: Science Essays > Computer Science > Internet and networking

Are the Hackers Real Menace To Society?

unleashed an Internet worm in 1988. Thousands of computers were infected and subsequently crashed.3.Kevin Mitnick (alias Condor): The first hacker to have his face immortalized on an FBI "Most Wanted" ... - a teenage hacker who couldn't grow up - earned Mitnick the nickname The Lost Boy of Cyberspace.4.Kevin Poulsen (alias Dark Dante ): In 1990, he took over all telephone lines going into the Los Ange ...

(6 pages) 65 0 5.0 Apr/2005

Subjects: Science Essays > Computer Science > Computer Ethics

Hackers Thought

Robert Morris, who unleashed an internet worm in 1988 which infected 6,200 systems within 24 hours; Kevin Poulsen, who seized control of the Los Angeles radio station to win a Porsche; Johan Helsingiu ...

(6 pages) 22 0 3.0 Oct/2001

Subjects: Businesss Research Papers

Should You Hire a Hacker to Protect Your Computer Systems?

ies such as starting a nuclear war by using a telephone, as was the case of a computer hacker named Kevin Mitnick. Before we answer this question however we must define what a hacker really is and lea ... ions." [3] However, others who have been involved first hand in hunting down famous hackers such as Kevin Mitnick, who served many years in prison for illegally breaking into numerous computer systems ...

(5 pages) 34 0 2.0 Feb/2008

Subjects: Science Essays > Computer Science