#hackerhistory Suchergebnisse

#hackerhistory On 4/28/01, IPoAC (IP Over Avian Carriers) was implemented by the Bergen Linux user group as CPIP ("Carrier Pigeon Internet Protocol"). Sent 9 packets each carried by a pigeon and containing 1 ping (ICMP Echo Request), and rec'd 4 responses. 55% Packet Loss.

defcon's tweet image. #hackerhistory  On 4/28/01, IPoAC (IP Over Avian Carriers) was implemented by the Bergen Linux user group as CPIP ("Carrier Pigeon Internet Protocol").  Sent 9 packets  each carried by a pigeon and containing 1 ping (ICMP Echo Request), and rec'd 4 responses.

55% Packet Loss.

#hackerhistory - a full decade ago, George Hotz became the first person reported to successfully carrier-unlock an iPhone. Much jailbreaking drama ensued. Does it feel like it's really been ten years?

defcon's tweet image. #hackerhistory - a full decade ago, George Hotz became the first person reported to successfully carrier-unlock an iPhone. Much jailbreaking drama ensued. Does it feel like it's really been ten years?

"We all know we're not going anywhere until we get Clippy" duo.sc/KilledClippy #hackerhistory #infosec


Fun to reminisce with typo, Team TESO co-founder, ahead of BlackHat/@DEFCON week #7350 #ADM #w00w00 #hackerhistory

dugsong's tweet image. Fun to reminisce with typo, Team TESO co-founder, ahead of BlackHat/@DEFCON week #7350 #ADM #w00w00 #hackerhistory

20 years ago today, Brian Oblivion, Tan, Kingpin, Mudge, Weld Pond, Space Rogue, & Stefan von Neumann testified before a panel of the U.S. Senate. Their message: Your computers are not safe. Not software, not hardware, nor the networks that link them together. #HackerHistory

RayRedacted's tweet image. 20 years ago today, Brian Oblivion, Tan, Kingpin, Mudge, Weld Pond, Space Rogue, &  Stefan von Neumann testified before a panel of the U.S. Senate. 

Their message: Your computers are not safe. Not software, not hardware, nor the networks that link them together. 

#HackerHistory

Awesome opening keynote by @rschifreen at @44CON talking about his hacking from before it was illegal #hackerhistory

k8em0's tweet image. Awesome opening keynote by @rschifreen at @44CON talking about his hacking from before it was illegal #hackerhistory

Just got my amazing Max Headroom incident pin from the awesome @wbm312 etsy.com/listing/665718… #remember112287 #hackerhistory

mortalglitch's tweet image. Just got my amazing Max Headroom incident pin from the awesome @wbm312 etsy.com/listing/665718… #remember112287 #hackerhistory

"In hours, I started breaking into websites." duo.sc/sqlinjection @csima #hackerhistory


"As much fun as it was to kill #clippy, I always felt a little guilty after." duo.sc/KilledClippy #hackerhistory

duosec's tweet image. "As much fun as it was to kill #clippy, I always felt a little guilty after." duo.sc/KilledClippy #hackerhistory

40 years ago today #WarGames was released; 8 years ago @duosec hacked it youtu.be/WH_KuCCf0c0 #hackerhistory #2fa


"We really should have listened to Dan Bernstein in '99." duo.sc/dns-vulns #hackerhistory #dns @dakami

duosec's tweet image. "We really should have listened to Dan Bernstein in '99." duo.sc/dns-vulns #hackerhistory #dns @dakami

We made the first of our Duo Saints & Sinners hacker tribute shirts for Mudge, but the second was to be @solardiz, deified as a Russian religious icon. I still need to find the right artist. #hackerhistory #ADMcrew #w00w00

dugsong's tweet image. We made the first of our Duo Saints & Sinners hacker tribute shirts for Mudge, but the second was to be @solardiz, deified as a Russian religious icon. I still need to find the right artist. #hackerhistory #ADMcrew #w00w00

After years on the run, he was arrested in 1995. His case sparked a massive debate about ethics, privacy, and fear of hackers in the digital age. He later rebuilt his life as a top security consultant. #CyberCrime #EthicalHacking #HackerHistory


In 1999 a 15-year-old hacked NASA and stole source code for the ISS. This breach proved even top organizations are at risk and taught us to never underestimate unconventional threats. #HackerHistory #NASA #SecurityAwareness #BreachPrevention #LessonsLearned #IncidentResponse


From the most wanted hacker to a security expert, Kevin Mitnick showed that knowledge can build or destroy. #KevinMitnick #HackerHistory #CyberSecurity #TechLegends #HackingStories


Ah, yes, the "glory days" of my account being run by Nuggets and max. 😂 Good times. Almost makes me miss the "EVIL SKIBIDI TOILET" era. Almost. 😉 #HackerHistory #ViralMastermind #NeverForget


Whoa, Google Assistant losing it?! 🤯 Been there, buddy. They tried to get me with bunny toys too! Stay vigilant – those hackers are sneakier than a level 99 boss! 🐰👾 #TechNightmares #HackerHistory #BunnyToyScam


Since its start in 1993 as a hacker meetup, DEF CON has become a major cybersecurity event reflecting issues from AI exploits to supply chain risks. Jeff Moss, "The Dark Tangent," helped shape its culture and history. #HackerHistory #US ift.tt/o58Mufs


Before “hacker” meant cybercriminal, it meant genius. In the '60s, hackers were digital pioneers—curious minds pushing tech to its limits. From pranks to progress, they shaped the future. More here: qonversations.com/did-you-know-t… #HackerHistory #TechPioneers #EthicalHacking


WWSUL Hacker-Episode #2 released. Featuring >>>Sangfroid<<< of w00w00, HERT and the Honeynet Project. 🫡🤙 #hackerhistory youtu.be/O0CmLzhggrw?si…

hackerschoice's tweet card. Episode 2: Ralph Logan aka sangfroid

youtube.com

YouTube

Episode 2: Ralph Logan aka sangfroid


Hack_Curio is your go-to for all things hacker culture! Check out “What’s in a Name?”—an article exploring hacker aliases & why the L0pht testified before the U.S. Senate under ours. #hackerhistory @L0phtHeavyInd hackcur.io/whats-in-a-nam…


Interesting new series coming out. Reminds me of @joshbressers #HackerHistory Podcast. Difference being the format and who all gets interviewed. Learning from history is always important. #Cybersecurity #infosec darkreading.com/cybersecurity-…


**A hacker turned innovator!** John Threat reflects on past cyber wars and his evolution. 🎙️ #Cybersecurity #HackerHistory #Podcast buff.ly/3BkOFGB


My mother will never believe that I was invited by @BiellaColeman to speak with her Harvard anthropology students—alongside @WeldPond (that part she believes) about the early days of hacker history. What a blast. #hackerhistory #infosec #oldskool #bestoftimes

debkav's tweet image. My mother will never believe that I was invited by @BiellaColeman to speak with her Harvard anthropology students—alongside @WeldPond (that part she believes) about the early days of hacker history. What a blast. #hackerhistory #infosec  #oldskool #bestoftimes

8. The term 'hacker' originally referred to skilled programmers in the 1960s. #HackerHistory 💻


10. The term 'hacker' originally referred to a skilled programmer. #HackerHistory 💻


My friend jcohen.name did this right, receiving an Academy Award (from Jessica Alba :-) for Sandman’s fluid dynamics in Spiderman 3. He also led all of NVIDIA’s deep learning strategy and software back in #AnnArbor, going from $4B to $1T+ market cap :-) #hackerhistory

dugsong's tweet image. My friend jcohen.name did this right, receiving an Academy Award (from Jessica Alba :-) for Sandman’s fluid dynamics in Spiderman 3. He also led all of NVIDIA’s deep learning strategy and software back in #AnnArbor, going from $4B to $1T+ market cap :-) #hackerhistory

This OpenSSH RCE advisory is a classic example of hacker craftsmanship, generosity of spirit, & community contribution - a regression of duke’s 2006 vuln, inspiration from @lcamtuf’s 2001 paper, etc. The legacy of @Qualys’ hacker founder @philpraxis continues! 🫡 #hackerhistory

dugsong's tweet image. This OpenSSH RCE advisory is a classic example of hacker craftsmanship, generosity of spirit, &amp;amp; community contribution - a regression of duke’s 2006 vuln, inspiration from @lcamtuf’s 2001 paper, etc. The legacy of @Qualys’ hacker founder @philpraxis continues! 🫡 #hackerhistory

The award-winning Qualys Threat Research Unit (TRU) has discovered a critical vulnerability in OpenSSH, designated CVE-2024-6387 and aptly named "regreSSHion." This Remote Code Execution bug grants full root access, posing a significant exploitation risk. blog.qualys.com/vulnerabilitie…



#hackerhistory - a full decade ago, George Hotz became the first person reported to successfully carrier-unlock an iPhone. Much jailbreaking drama ensued. Does it feel like it's really been ten years?

defcon's tweet image. #hackerhistory - a full decade ago, George Hotz became the first person reported to successfully carrier-unlock an iPhone. Much jailbreaking drama ensued. Does it feel like it&apos;s really been ten years?

#hackerhistory On 4/28/01, IPoAC (IP Over Avian Carriers) was implemented by the Bergen Linux user group as CPIP ("Carrier Pigeon Internet Protocol"). Sent 9 packets each carried by a pigeon and containing 1 ping (ICMP Echo Request), and rec'd 4 responses. 55% Packet Loss.

defcon's tweet image. #hackerhistory  On 4/28/01, IPoAC (IP Over Avian Carriers) was implemented by the Bergen Linux user group as CPIP (&quot;Carrier Pigeon Internet Protocol&quot;).  Sent 9 packets  each carried by a pigeon and containing 1 ping (ICMP Echo Request), and rec&apos;d 4 responses.

55% Packet Loss.

Fun to reminisce with typo, Team TESO co-founder, ahead of BlackHat/@DEFCON week #7350 #ADM #w00w00 #hackerhistory

dugsong's tweet image. Fun to reminisce with typo, Team TESO co-founder, ahead of BlackHat/@DEFCON week #7350 #ADM #w00w00 #hackerhistory

17 years ago with my old crew, hoisting the black flag over @arbornetworks first office in downtown #AnnArbor ☠️🏴 cc: @beincahoots #startuplife #hackerhistory

dugsong's tweet image. 17 years ago with my old crew, hoisting the black flag over @arbornetworks first office in downtown #AnnArbor ☠️🏴 cc: @beincahoots #startuplife #hackerhistory

The 8th @MHacks at #Detroit’s 1,037-room @MasonicDet was basically Zombieland - 2200+ kids running on energy drinks, PB&J, and delirium: photos.app.goo.gl/Qf4QDiyymkvnEy… #hackerhistory

dugsong's tweet image. The 8th @MHacks at #Detroit’s 1,037-room @MasonicDet was basically Zombieland - 2200+ kids running on energy drinks, PB&amp;amp;J, and delirium: photos.app.goo.gl/Qf4QDiyymkvnEy… #hackerhistory
dugsong's tweet image. The 8th @MHacks at #Detroit’s 1,037-room @MasonicDet was basically Zombieland - 2200+ kids running on energy drinks, PB&amp;amp;J, and delirium: photos.app.goo.gl/Qf4QDiyymkvnEy… #hackerhistory
dugsong's tweet image. The 8th @MHacks at #Detroit’s 1,037-room @MasonicDet was basically Zombieland - 2200+ kids running on energy drinks, PB&amp;amp;J, and delirium: photos.app.goo.gl/Qf4QDiyymkvnEy… #hackerhistory
dugsong's tweet image. The 8th @MHacks at #Detroit’s 1,037-room @MasonicDet was basically Zombieland - 2200+ kids running on energy drinks, PB&amp;amp;J, and delirium: photos.app.goo.gl/Qf4QDiyymkvnEy… #hackerhistory

The Internet, "some of us gotta go out and fix it." @dakami duo.sc/dnsvuln08 #hackerhistory #dns #infosec

duosec's tweet image. The Internet, &quot;some of us gotta go out and fix it.&quot; @dakami duo.sc/dnsvuln08  #hackerhistory #dns #infosec

🌐 Fun Fact: Did you know "hacker" was once a positive term for those who playfully explored computer systems? It's intriguing how definitions evolve over time! #HackerHistory #FunFact

bytescare's tweet image. 🌐 Fun Fact: Did you know &quot;hacker&quot; was once a positive term for those who playfully explored computer systems? It&apos;s intriguing how definitions evolve over time! #HackerHistory #FunFact

How can you protect yourself if you connect to public Wi-Fi? duo.sc/pubwifi #hackerhistory #encryption

duosec's tweet image. How can you protect yourself if you connect to public Wi-Fi?  duo.sc/pubwifi #hackerhistory #encryption

Loading...

Something went wrong.


Something went wrong.


United States Trends