Quote: "I realize that this bill basically says you can tap someone's phone for jaywalking, and normally I would say, 'No way.' But after what happened on September 11th, I say screw 'em." - Dana Lee Dembrow, Democratic member of the Maryland House of Delegates explaining her approval of a new bill that would greatly expand the ability of authorities to monitor e-mail and telephone traffic. Jaywalkers beware.
Discusses the CampusWide card access system for colleges (now owned by Blackboard) including software, hardware, infrastructure and a potential exploit.
4 and two thirds
In Best of 2600 book?
Yes, page 604, Section 3 (2000 and Beyond: A Changing Landscape), Chapter 15 (Still More Hacker Stories)
The ability to permit or deny the use of a particular resource by a particular entity. (more..)
A piece of software, a chunk of data, or sequence of commands that take advantage of a bug, glitch or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software, hardware, or something electronic (usually computerized). This frequently includes such things as violently gaining control of a computer system or allowing privilege escalation or a denial of service attack. (more..)
Copyleft 2008-2018 William R. Epp, banner by Max Nardi.