When it comes to cyber security, everyone always talks about the biggest and baddest APT mega cyber attack. But what about the little guy…
Tagged with “computer” (3)
Every time there is a big new release of some Apple software or operating system, hackers get to work — finding a flaw in Apple’s computer code can be very lucrative.
In 2008 2600 is 24 years old, the computer bulletin board system is a 30 year relic, and a good number of attendees of HOPE were not born when some events of the "modern" era of computers and hacking began. Historian Jason Scott of textfiles.com presents a quick primer of a large part of the basics of hacking and phreaking history, touching on those sometimes obscure or hilarious subjects that may have escaped notice in a Web 2.0 world.