21.   In another incident, hackers used a compromised EPA computer to chat with other hackers.

22.   Israeli and Palestinian hackers have also used denial-of-service attacks to move their conflict online.

23.   Microsoft is making sure the hackers cannot use the stolen source code to change commercial software used by businesses, governments and consumers.

24.   Quite a few people at major corporations or government agencies asked for advance copies so they could find and plug holes before hackers could use SATAN against them.

25.   SATAN designer Dan Farmer and his partner said they released it despite fears that hackers will use it to execute break-ins.

26.   School officials, however, believe the hacker used their computer as a decoy.

27.   Sophisticated hackers used the Internet on Christmas Day to break in and take over the computer of a well-known computer security expert, The New York Times reported.

28.   The radio hackers also often use incorrect technology, which immediately tips off pilots, the authority said.

29.   Hackers however can use innocent conversations to help them gain entry into computer systems, according to Jonathan Littman, author of a book on renowned hacker Kevin Mitnick.

n. + use >>共 1017
company 4.37%
police 3.55%
people 3.04%
government 2.19%
team 1.10%
group 0.92%
system 0.89%
worker 0.86%
official 0.82%
doctor 0.77%
hacker 0.09%
hacker + v. >>共 220
be 11.44%
use 5.11%
break 4.05%
have 4.05%
get 2.46%
gain 2.11%
steal 1.94%
attack 1.58%
access 1.41%
find 1.23%
每页显示:    共 29