ZILtoid1991@lemmy.world to 196@lemmy.blahaj.zone · 5 months agoObvious cybersecurity rulelemmy.worldimagemessage-square32fedilinkarrow-up1322arrow-down10
arrow-up1322arrow-down1imageObvious cybersecurity rulelemmy.worldZILtoid1991@lemmy.world to 196@lemmy.blahaj.zone · 5 months agomessage-square32fedilink
minus-squareClay_pidgin@sh.itjust.workslinkfedilinkEnglisharrow-up9·5 months agoIf any of you are interested in what it was like tracing a hacker back then, I HIGHLY recommend the book The Cuckoo’s Egg by Clifford Stohl. https://en.m.wikipedia.org/wiki/The_Cuckoo’s_Egg_(book)
minus-squareRubberElectrons@lemmy.mllinkfedilinkarrow-up4·5 months agoVery interesting when I’d read it. Jangling keys across the modem connections… Brilliant. I hope to be such a capable sysmin
If any of you are interested in what it was like tracing a hacker back then, I HIGHLY recommend the book The Cuckoo’s Egg by Clifford Stohl.
https://en.m.wikipedia.org/wiki/The_Cuckoo’s_Egg_(book)
Very interesting when I’d read it. Jangling keys across the modem connections… Brilliant. I hope to be such a capable sysmin