Tuesday, September 30, 2008

The Cyber Crime Hall of Fame

Hack Hall of Fame
Rules are made to be broken the same way networks are made to be hacked into. These are nine of the most infamous criminal hackers to ever see the inside of a jail cell.

There are all sorts of crimes, but the ones that probably happen most often and hurt the most are crimes of opportunity—breaking into a house with an open window, nabbing the wallet from a purse left unattended, stealing an unlocked car, etc. Now, for the average Joe, breaking into NASA's infrastructure and bringing online giants like Amazon to a grinding halt would not fall into that category; for someone with in-depth networking and computer know-how, though, it's a different story altogether.
Often the greatest tech crimes in history have little more reason behind them than "because it was there." More often than not, a hacker sees an open window—a hole in system's security, a backdoor, etc.—and climbs on through. And they don't do it for any real worldly gain, but merely to prove that they can. That's not to say that there isn't malicious intent underlying some attacks (take Vladimir Levin's $10.7 million hoax on CitiBank, for example). And we're not saying that all hackers are bad guys, but a few fall prey to the dark side and use their talents for evil—not good.
What does it take for a cyber crime to catch our eye? In compiling our list, we looked for a few things: ingenuity (had it been done before?), scope (how many computers, agencies, companies, sites, etc. did it affect?), cost (how much in monetary damages did it cause?), and historical significance (did it start a new trend?). Only one of the nine crimes we highlight ranks on all four counts. No matter how you slice it, though, each one of these security cracks warrants a, well, we'll let you fill in the exclamation.
John Draper
Possibly best known by the moniker Cap'n Crunch (yes, like the cereal), John Draper is one of the first people to which the term "hacker" can be applied. In the 1970s, Draper used a toy whistle found in Cap'n Crunch cereal to hack phone lines and make calls. Draper realized the whistle produced the exact tone necessary to signal that an active call on a phone line had ended—2600 Hz, to be precise—when in fact it had not, thus allowing the call to continue even after the exchange thought it had ended. Draper was found out in 1972 when the phone company flagged his strange billing patterns; he was eventually sentenced to two months in prison. "Phreaking," or the hacking of telecom systems, as it's now called, can be directly traced to Draper.
Ranks For: Ingenuity, Historical Significance

Kevin Mitnick
Kevin MitnickThough Kevin Mitnick landed on the hacking radar in 1981 (at age 17), he didn't hit the really big time until 1983. While a student at USC, Mitnick gained access to ARPANet, an Internet predecessor used by large corporations, universities, and the U.S. Army. Getting into ARPANet provided him with access to the Pentagon and all the Department of Defense's files, but he didn't actually steal any data. It's a glory thing. After the system administration got wise, Mitnick was arrested on the USC campus and served a short stint in a youth detention center—the first sentence for illegally accessing a computer system. The incident marked Mitnick's second arrest, but he would continue to be on the FBI radar and has since been the subject of many more arrests, investigations, and court cases.
Ranks For: Ingenuity, Scope

Click here for the full story

Thursday, September 25, 2008

Cover story: Top 50 tech visionaries

19/08/2008 13:29:00

It’s easy to look at a laptop, an iPod, or a laser printer as nothing more than a tool to get work done with or to while away your free time on, but these and many other high-tech devices didn’t fall off a tree. They emerged following years of hard work – and in some cases, an entire career devoted to a single technology – by inspired researchers, designers, and developers. Our list of technology visionaries includes the guy who invented a way to store data in a portable form – and who almost got demoted as a result. It recognises the woman who popularised the term “bug” after a moth flew into a computer relay. And it acknowledges a genius who might have saved modern gaming by inventing Jump Man. Our opinion doesn’t have to be the last word on the subject, however. If you have additional nominees who deserve recognition, or if you want to chime in to agree with or reminisce about or rail against our choices, please send your opinions to informationage@idg.com.au.

Click here to continue reading.....

Saturday, September 20, 2008

The Ten Greatest Hacks of All Time


Tech knowledge is like the Force: It can be used for good or for evil. And the greatest hackers in history are the ones who used their powers for good, to take technology to exciting places it was never intended to go.

You can hack your TiVo, your AppleTV, your Canon PowerShot, or (of course) your PC to make it do things its creators never intended. But we tried to go even further in our list of history's top ten hacks. We've looked back to computing's earliest days to find the most inspiring examples of hacker brilliance—in our entirely subjective opinion, of course. And none of these hacks are crimes—or at least, they shouldn't be. 

click here to continue reading

Monday, September 15, 2008

How to Extend Laptop Battery Life

Imagine you are sitting at the airport and you have just enough time to log in and check your email on that cool new laptop. Just as you get to your inbox, the light starts flashing saying you are running out of battery power and wouldn’t you know it, your cord won’t reach the outlet. There are certain steps you can take. The following fifteen tips can help you extend your battery’s life.

1. Defrag your hard drive regularly so it runs as efficiently as possible. Only perform this activity when plugged in, not on battery power. Mac OSX is equipped to better handle fragmentation so Apple users may not need this tip.

2. Dim the monitor. Many laptops have this option available and many include CPU and cooling enhancement enabling you to squeeze every last bit of power from your battery.

3. Reduce the number of programs that are active in the background. You may be running programs such as ITunes, Desktop Search, and so on. These all contribute to your CPU usage which quickly lowers battery life. Shut down everything you don’t need when operating on battery.

continue reading....


Monday, September 8, 2008

Ten key differences between Linux and Windows

Jack Wallen
Published: 03 Sep 2008 16:04 BST
Ten key differences between Linux and Windows
Before debating the relative merits and shortcomings of Linux and Windows, it helps to understand the real distinctions between them. Jack Wallen has distilled the key differences into one list.

I have been around the Linux community for more than 10 years now. From the very beginning, I have known that there are basic differences between Linux and Windows that will always set them apart. This is not to say one is better than the other; it's just to say that they are fundamentally different.
Many people, looking from the view of one operating system or the other, don't quite get the differences between these two powerhouses. So I decided it might be useful to list 10 of the primary differences between Linux and Windows.
Click here to continue reading.....

Tuesday, September 2, 2008

Jokes for Computer Geeks

A little boy goes to his father and asks, “Daddy, how was I born?”

The father answers, “Well, son, I guess one day you will need to find out anyway! Your mom and I first got together in a chat room on Yahoo. Then I set up a date via email and we met at a cyber-cafĂ©. We sneaked into a secluded room, where your mother agreed to download from my hard drive. As soon as I was ready to upload, we discovered that neither one of us had used a firewall. Since it was too late to hit the delete button, nine months later, a Pop-up appeared that said: Scroll down—you got made!”