ZILtoid1991@lemmy.world to 196@lemmy.blahaj.zone · 6 months agoObvious cybersecurity rulelemmy.worldimagemessage-square35fedilinkarrow-up1326arrow-down10
arrow-up1326arrow-down1imageObvious cybersecurity rulelemmy.worldZILtoid1991@lemmy.world to 196@lemmy.blahaj.zone · 6 months agomessage-square35fedilink
minus-squareClay_pidgin@sh.itjust.workslinkfedilinkEnglisharrow-up9·6 months agoIf any of you are interested in what it was like tracing a hacker back then, I HIGHLY recommend the book The Cuckoo’s Egg by Clifford Stohl. https://en.m.wikipedia.org/wiki/The_Cuckoo’s_Egg_(book)
minus-squareRubberElectrons@lemmy.mllinkfedilinkarrow-up4·6 months agoVery interesting when I’d read it. Jangling keys across the modem connections… Brilliant. I hope to be such a capable sysmin
If any of you are interested in what it was like tracing a hacker back then, I HIGHLY recommend the book The Cuckoo’s Egg by Clifford Stohl.
https://en.m.wikipedia.org/wiki/The_Cuckoo’s_Egg_(book)
Very interesting when I’d read it. Jangling keys across the modem connections… Brilliant. I hope to be such a capable sysmin