Skip Navigation

Home Projects Publications Archives About Sign Up or Log In

Browse Resources

(1 classification) (4 resources)

Computer hackers

Classification
United States (2)

Resources
View Resource Web Spoofing: An Internet Con Game

The Safe Internet Programming group at the Princeton University Department of Computer Science in 1996 published a paper on the practice known as "web spoofing," through which an attacker intervenes between an end-user browsing the Web and real Web sites. The attacker sets up a shadow copy of the Web, and as users request pages from sites they will receive pages from the attacker's site instead....

http://sip.cs.princeton.edu/pub/spoofing.html
View Resource Rash of Hacker Attacks Knock Out Major Websites

On February 7, 2000, and continuing in the following days, six of the most popular sites on the World Wide Web were brought to a stand-still by a concerted effort of computer hackers. The attack started with Yahoo! on Monday. Buy.com, Ebay, CNN.com, and Amazon.com were hit on Tuesday, and ZDNet reported that it was the latest victim of the hackers on Wednesday morning. Each of the sites has...

https://scout.wisc.edu/report/be/2000/0210
View Resource Princeton University Department of Computer Science: Safe Internet Programming

The Safe Internet Programming (SIP) group at the Princeton University Department of Computer Science offers their publications, research, and news about Internet security.

http://sip.cs.princeton.edu
View Resource Report: Pro-Islamic Hackers Gear up for Cyberwar

An October 29, 2002 news article in USA Today describes a recent surge in activity of politically motivated hackers and cyber terrorists. The attacks, which range from Web site defacements to viruses and worms, are probably being perpetrated by individuals opposed to the US war on terrorism and action in Iraq.

http://usatoday30.usatoday.com/tech/news/computersecurity/20...