Home » Computers & Electronics » Computer Security

Computer Security

Dr. Chaos

Dr. Chaos is a Criminal Who was Incarcerated at the Supermax Prison ADX Florence for Causing 28 Power Failures and Hoarding a Large Amount of Cyanide. He was Released on September 2019.

From 1998 to 2001, a computer system administrator turned terrorist caused havoc in Wisconsin. One of his terrorist acts included an attack on the city’s power grid. He ignited buildings, disrupted transmission towers, disabled air traffic control software, and caused headaches for an Internet Service Provider with the help of people he recruited from the […]

Dr. Chaos is a Criminal Who was Incarcerated at the Supermax Prison ADX Florence for Causing 28 Power Failures and Hoarding a Large Amount of Cyanide. He was Released on September 2019. Read More »

The Hockey Puck Apple

Apple Created a Custom Mouse and Called It “The Hockey Puck,” That Lasted for Only Two Years Before it was Discontinued. This was Considered One of Apple’s More Notorious Flops.

Apple has done far more right than wrong over the years, redefining personal computing with each bold new step, from the original Macintosh and its graphical user interface to the powerhouse tower Macs of the early 1990s to the ever-slimming notebook range and into the mobile computing revolution and beyond. Despite its many victories, Apple

Apple Created a Custom Mouse and Called It “The Hockey Puck,” That Lasted for Only Two Years Before it was Discontinued. This was Considered One of Apple’s More Notorious Flops. Read More »

President Carter Oversaw the Installation of the First Computers in the White House in 1978.

By the late 1970s, the federal government had been using computers for decades, and IBM’s mainframes had helped NASA astronauts reach the moon. However, there were few minicomputers or early personal computers in federal offices. But did you know which US President oversaw the installation of the first computers in the White House? President Jimmy

President Carter Oversaw the Installation of the First Computers in the White House in 1978. Read More »

Phyton Programming Language

The Python Programming Language Got Its Name from Monty Python and Not a Snake.

A programming language is any set of rules that converts strings, or in the case of visual programming languages, graphical program elements, to various types of machine code output. Programming languages are computer languages used to implement algorithms in computer programming. But did you know that the Python Programming Language did not come from the

The Python Programming Language Got Its Name from Monty Python and Not a Snake. Read More »

Malware Laptop

How Much Did a Malware-Infested Laptop Sell at an Art Auction?

Malware is short for malicious software. The term refers to any intrusive software created by Hackers to steal data and damage or destroy computers and computer mechanisms. But did you know that an old malware-infected computer was auctioned off at a high price? A Windows XP computer that was infected with six different types of

How Much Did a Malware-Infested Laptop Sell at an Art Auction? Read More »

Are Frequent Mandatory Password Changes Necessary?

October is Cybersecurity Month. Let’s take a look at one of the primary forms of cyber security, your log-in password. Did you know that experts actually discourage frequent changes?   The Federal Trade Commission cautions businesses against implementing routine password changing procedures because they encourage users to use basic, easy-to-remember passwords that will be easy to

Are Frequent Mandatory Password Changes Necessary? Read More »

In 1999, a group of hackers discovered that they could enter any Hotmail account by simply entering “eh” as a password. It was fixed by Microsoft within two hours.

Tech Time Warp: Quite the Hotmail hack, eh? You might not want to admit it, but you may still have a Hotmail account kicking around. Once your premier account—perhaps an upgrade from AOL—it may now be your throwaway address. Once, though, Hotmail was hip—and quite a target for hackers. Hotmail and Rocketmail (later Yahoo!) were

In 1999, a group of hackers discovered that they could enter any Hotmail account by simply entering “eh” as a password. It was fixed by Microsoft within two hours. Read More »

A US law firm set up honeypots on torrent-sharing site The Pirate Bay and then sued people who downloaded their torrents. The matter reached the FBI and the pirate site accepted to collaborate with the feds resulting in the crooked lawyers getting jail time.

Cooperative ‘Copyright Troll’ Lawyer Sentenced to Five Years in Prison John Steele, one of the attorneys behind the ‘copyright troll’ law firm Prenda, has been sentenced to five years in prison. The attorney was one of the masterminds behind the fraudulent scheme that extracted settlements from alleged pirates. Because of Steele’s cooperative stance, his sentence

A US law firm set up honeypots on torrent-sharing site The Pirate Bay and then sued people who downloaded their torrents. The matter reached the FBI and the pirate site accepted to collaborate with the feds resulting in the crooked lawyers getting jail time. Read More »

In 2018, A hacker broke into people’s routers (100,000 of them) and patched their vulnerabilities up so that they couldn’t be abused by other hackers.

A mysterious grey-hat is patching people’s outdated MikroTik routers A Russian-speaking grey-hat hacker is breaking into people’s MikroTik routers and patching devices so they can’t be abused by cryptojackers, botnet herders, or other cyber-criminals, ZDNet has learned. The hacker, who goes by the name of Alexey and says he works as a server administrator, claims

In 2018, A hacker broke into people’s routers (100,000 of them) and patched their vulnerabilities up so that they couldn’t be abused by other hackers. Read More »