?? computer hackers news articles.txt
字號:
Computer Hackers News Articles Compiled By Bob Krause KRAUSER@SNYSYRV1.BITNET The following is a list of articles that I have found concerning thecomputer underground in various magazines and news-papers. The list is inchronological order. If you know of an article that should be included inthis list or correction, send me the information and I will add it to thelisting.Nov 18 '90 Crackdown on computer crime is raising question of computer rights. Chicago Tribune pg.17Oct 29 '90 Users paying big price for PBX fraud. Network World pg.1Oct 28 '89 Halting hackers. The Economist pg.18Oct 15 '90 Target: The Corporate PBX Information Week pg.24Sept 9 '90 Can invaders be stopped but civil liberties upheld? The New York Times pg.F12Sept 1 '90 United States v Zod The Economist pg.23Sept '90 Digital Desperados; hackers indictments raise constitutional questions. Scientific American pg.34Aug 26 '90 The rights of computer users. Los Angles Times pg.D9Aug 22 '90 Open sesame; in the arcane culture of computer hackers, few doors stay closed. The Wall Street Journal pg.A1Aug 20 '90 NY State Police round up hackers. Computerworld pg.99Aug 17 '90 U.S. Arrests boy, 5 others in computer hacker case. The Wall Street Journal pg.82Aug 6 '90 Computer anarchism calls for a tough response. Business Week pg.72Aug 6 '90 Charges dropped against alleged BellSouth hacker. Telephony pg.12July 30 '90 Hacker trial begins in Chicago. Computerworld pg.8July 30 '90 'Hacking' crackdown is dealt a setback in trial in Chicago The Wall Street Journal pg.B3July 21 '90 Crackdown on hackers 'may violate civil rights'. New Scientist pg.22July 21 '90 Group to defend civil rights of hackers founded by computer industry pioneer. The Wall Street Journal pg.B4July 10 '90 Group to fight for computer users' rights. Los Angles Times pg.D5July 10 '90 Computer hackers plead guilty in case involving BellSouth. The Wall Street Journal pg.84July 2 '90 Hackers of the World, Unite! Newsweek pg.36May 21 '90 Throwing the book at computer hackers. Business Week pg.148May 14 '90 Justice failed in refusing to make Morris an example. Computerworld pg.23May 14 '90 Morris sentence spurs debate. Computerworld pg.128May 14 '90 Wheels of justice grind to a halt in 'worm' case. PC Week pg.16May 7 '90 Three-year probation for Morris. Computerworld pg.1May '90 Just say No Communications of the ACM pg.477May '90 Uncovering the mystery of Shadowhawk. Security Management pg.26Apr 30 '90 The hacker dragnet: the Feds put a trail on computer crooks - and sideswipe a few innocent bystanders. Newsweek pg.50March 26'90 Internet interloper targets hacker critics. Computerworld pg.127March '90 Cyber Thrash SPIN pg.24March '90 Is Computer Hacking a Crime? Harper's pg.45Wntr '90 Comp. crime and the Computer Fraud and Abuse Act of 1986 Computer Law Journal pg.71Feb 19 '90 Morris code. The New Republic pg.15Feb 12 '90 Alleged hackers charged wit theft of BellSouth 911 data. Telephony pg.10Feb 12 '90 Babes in high-tech toyland nabbed. Computerworld pg.8Feb 11 '90 Revenge on the nerds; sure, jail our hackers - who needs software stars anyway? Washington Post pg.C5Feb 9 '90 Hacked to pieces. New Statesman and Society pg.27Feb 2 '90 Prevention is better than cure. Public Finance and Accountancy pg.9Jan 5 '90 Computer hacking: is a new law needed. Public Finance and Accountancy pg.7Feb 7 '90 Four charged with scheme against phones. The Wall Street Journal pg.B5Dec 4 '89 Hackers: Is a cure worse than the disease? Business Week pg.37Sept '89 Free the hacker two. Harper's Magazine pg.22June 19 '89 Hacker invades So. Bell switch. Telephony pg.11June '89 Consensual realities in cyberspace Communication of the ACM pg.664Apr 3 '89 Strong scruples can curb computer crime. Computerworld pg.100March 9 '90 Hackers revealed as spies. Nature pg.108March 6 '89 Are ATM's easy targets for crooks? Business Week pg.30Feb 20 '89 Prison term for first U.S. hacker-law convict. Computerworld pg.1Jan 9 '89 Hacker prosecution: suspect held, denied phone access by district court. Computerworld pg.2Jan 9 '89 Drop the phone: busting a computer whiz. Time pg.49Dec 26 '88 The Cyberpunk People pg.50Dec 11 '88 Computer intruder is urged by authorities to contact the laboratory he invaded. The New York Times pg.24Nov 14 '88 Portrait of an artist as a young hacker. Computerworld pg.6Nov '88 Robopsychology Omni pg.42Aug 1 '88 Is your computer Secure? Business Week pg.64Apr 28 '88 Hacker runs rings around military security. New Scientist pg.25April '88 Computer hackers follow Guttman-like progression. Sociology and Social Research pg.199Oct '87 Brian Reid, A Graphics Tale of a Hacker Tracker Communications of the ACM pg.820April '86 Positive Alternatives: A report on an ACM Panel on Hacking Communications of the ACM pg.297Jan '84 Hacking away at morality. Communications of the ACM pg.8
?? 快捷鍵說明
復制代碼
Ctrl + C
搜索代碼
Ctrl + F
全屏模式
F11
切換主題
Ctrl + Shift + D
顯示快捷鍵
?
增大字號
Ctrl + =
減小字號
Ctrl + -