X-Nico

unusual facts about Hacker


Binary GCD algorithm

Many branches may be removed by computing min(a,b) and "?title=Hacker's Delight">mixtures of Boolean algebra and arithmetic.


0x80

0x80 is a hacker interviewed by Brian Krebs of the Washington Post about his lucrative business in running "botnets", or networks of remotely controlled personal computers without the owner's consent.

9793 Torvalds

9882 Stallman, an asteroid named after Richard Matthew Stallman, American hacker, founder of the free software movement and the GNU project

Beatrix JAR

Their work was featured in art museums, night clubs, universities, libraries, hacker Spaces and art galleries all over the country including the Walker Art Center (Minneapolis, MN), Wexner Center for the Arts (Columbus, Ohio), Andy Warhol Museum (Pittsburgh, PA), Museum of Contemporary Art San Diego (San Diego, CA), the American Visionary Art Museum (Baltimore) and the High Art Museum (Atlanta, GA) to name a few.

Benjamin Thurman Hacker

In the early 1990s, at the request of then-Governor Pete Wilson, Hacker served for two years as director of the California Department of Veterans Affairs and then rejoined USAA as regional vice president and general manager of its western region.

Brad Fregger

He was the producer of Activision's Ghostbusters, the game Hacker, the Atari and Commodore 64 versions of Pitfall II and Shanghai (the first commercial version of Brodie Lockard's Mahjong solitaire), and he designed and produced the first commercial version of computer solitaire (Solitaire Royale, published by Spectrum Holobyte).

Bruce Sterling bibliography

The Hacker Crackdown: Law and Disorder on the Electronic Frontier (1992) - about the panic of law enforcers in the late 1980s about 'hackers' and the raid on Steve Jackson Games as part of Operation Sun Devil.

CloudFlare

In June 2012, the hacker group UGNazi attacked CloudFlare partially via flaws in Google's authentication systems, gaining administrative access to CloudFlare and using it to deface 4chan.

Computer Underground Digest

The newsletter came to prominence when it published legal commentary and updates concerning the "hacker crackdowns" and federal indictments of Leonard Rose and Craig Neidorf of Phrack.

Damon Keith

On December 14, 2001, the United States Immigration and Naturalization Service (“INS”) took Haddad into custody for overstaying his visa and initiated removal proceedings in Detroit before Immigration Judge Elizabeth Hacker.

Desperadoes of the West

Dale Van Sickel as Hacker/Ward Gordon (doubleing Roy Barcroft & Richard Powers)

Detroit Free Press v. Ashcroft

Believing this closure to be a violation to First Amendment rights to speech and press, The Detroit News, Detroit Free Press, Metro Times, Haddad, and Michigan Representative John Conyers filed a suit against John Ashcroft, Michael Creppy, and Immigration Judge Elizabeth Hacker (the Government) claiming that the Creppy Directive was unconstitutional.

Easterhegg

The Easterhegg (also Easter(H)egg or EH) is an annual hacker event, called into life by the German Chaos Computer Club.

EBCDIC

Open-source-software advocate and hacker Eric S. Raymond writes in his Jargon File that EBCDIC was almost universally loathed by early hackers and programmers because of its multitude of different versions, none of which resembled the other versions, and that IBM produced it in direct competition with the already-established ASCII.

Firewalls and Internet Security

First published in 1994, the book Firewalls and Internet Security: Repelling the Wily Hacker by William R. Cheswick and Steve Bellovin helped define the concept of a network firewall.

Hacker International

None of Hacker's games were licensed by the respective console manufacturers; Hiroshi Yamauchi personally opposed pornographic content in Famicom games, believing they would tarnish Nintendo's reputation.

Hacker T. Dog

Phil Fletcher's performance as Hacker was highly acclaimed and he was nominated for a BAFTA for Best Children’s Presenter with Iain Stirling.

HackMiami

The Winter Hacker Festival presented by HackMiami is scheduled to take place December 5 - 7, 2013 in Miami Beach, FL and will feature performances from YTCracker, Lil Wyte, Project Pat, Dual Core, and DJ Percent 27.

Hans Hacker

Additionally, a number of East Liverpool institutions and businesses such as the Museum of Ceramics, the Carnegie Library and the Dawson Funeral Home have Hacker's work on display.

Hilary Baumann Hacker

Hacker attended all four sessions of the Second Vatican Council from 1962 to 1965, and dedicated much of his tenure implementing the Council's reforms, especially the Novus Ordo Mass and greater participation of the laity.

Howard Rheingold

Also in 1985, Rheingold coauthored Out of the Inner Circle: A Hacker's Guide to Computer Security with former hacker Bill Landreth.

Ivan Maksakov

A multinational law enforcement group made up of British, American, and Russian private individuals and law enforcement agents captured Maksakov, Alexander Petrov, and Denis Stepanov.

James F. Conant

Hacker, as well as others like Ian Proops and Michael Forster have in turn criticized Conant's representation of them.

Jeff Goodell

Earlier works include Sunnyvale (2000), a personal memoir about growing up in Silicon Valley and the breakdown of his family; The Cyberthief and the Samurai (1996), the story of computer hacker Kevin Mitnick; and Our Story: 77 Hours That Tested Our Friendship and Our Faith (2002), about the Pennsylvania Quecreek Mine Rescue of nine trapped coal miners in 2002, which was a New York Times Best Seller.

Jörg Hacker

Jörg Hinrich Hacker (born 13 February 1952 in Grevesmühlen, Mecklenburg) is a German microbiologist.

Keith Beal

Early works include pieces for tuba quartet and saxophone quartet, but he became ever more confident and productive,writing 6 symphonies and 4 concertos, recording his Second Symphony in Kiev with the Kiev Modern Symphony Orchestra in 2001, and writing a clarinet concerto to be performed by Alan Hacker.

Kings of Sleep

The title of the album and many of the songs were inspired by the novels and short stories of William Gibson, including Neuromancer ("Black Ice" and "Terminal Beach" are both references from that novel), Count Zero (referring to the name of the novel as well as the hacker handle of one of the protagonists), and the short story The Winter Market (Kings of Sleep is the name of a fictional stim-album in that story).

Lapsley

Phil Lapsley (born 1965), electrical engineer, hacker, and entrepreneur

Le Journal de Montréal

This change was accompanied by the addition of several new columnists, including journalist and television host Richard Martineau, former Quebec government ministers Yves Séguin and Joseph Facal, former federal government Minister Sheila Copps,former hockey player Guy Lafleur and the ex-hacker Mafiaboy.

Massachusetts Correctional Institution – Concord

Cameron Lacroix, the teen hacker best known for compromising the personal account of a T-Mobile Sidekick belonging to Paris Hilton.

Moscow Mission

They are a hacker girl who once broke through Pentagon servers, a former special operative officer who enjoys speed and adrenalin, psychologist, a lady whose beauty outshines her intelligence and her rank of major, and a blind field engineer whose sense of smell and intuition substitute for his eye sight...

MV Seabourn Legend

In the movie, LAPD Police Officer Alex Shaw (Jason Patric) and his girlfriend Annie Porter (Sandra Bullock) are trapped on the ship, where navigation computers have been reprogrammed by a computer hacker, (Willem Dafoe) setting the ship on a collision course with a supertanker.

Norma Fisher

She performs frequently with the International Chamber Ensemble of Rome, Carmina Quartet and Reykjavik Wind Quintet and has partnered such well known soloists as Stephanie Gonley, Alan Hacker, Maurice Hasson, Emanuel Hurwitz, Ralph Kirshbaum, Steven Isserlis, Peter Lukas Graf, Gyorgy Pauk, Hu Kun, Sylvia Rosenberg, Grigori Zhislin, Yossi Zivoni and singers Benjamin Luxon, Sherrill Milnes and Nelly Miricioiu.

Public image of David Irving

Convicted Internet Web site hacker Jeremy Hammond was apprehended with four other occupants of a vehicle identified by witnesses of the attack, by River Grove, Illinois, police later the same evening.

Real Programmer

The archetypal Real Programmer is Mel Kaye of the Royal McBee Computer Corporation who is immortalised in The Story of Mel, one of the most famous pieces of hacker folklore.

Robert Skulj

Robert Skulj, born in 1975, was a Slovenian hacker who discovered a security hole in a banking e-commerce system called Klik in year 2002.

Rop Gonggrijp

While growing up in Wormer in the Dutch Zaanstreek area, he became known as a teenage hacker and appeared as one of the main characters in Jan Jacobs's book "Kraken en Computers" ("Hacking and computers", Veen uitgevers 1985, ISBN 90-204-2651-6) which describes the early hacker scene in the Netherlands.

Rudy Rucker

Rucker often uses his novels to explore scientific or mathematical ideas; White Light examines the concept of infinity, while the Ware Tetralogy (written from 1982 through 2000) is in part an explanation of the use of natural selection to develop software (a subject also developed in his The Hacker and the Ants, written in 1994).

Spectre Studios

A figure called "The Heisman Hacker" was also made based on If I Did It, Pamela Rogers, Mark Foley, Bald Britney, Lisa Nowak.

Steven M. Bellovin

Firewalls and Internet Security: Repelling the Wily Hacker ISBN 0-201-63357-4 (with W. Cheswick) - one of the first books on internet security.

T.J. Maxx

In March 2010, Albert Gonzalez, a computer hacker, was sentenced to 20 years in federal prison after confessing to stealing credit and debit card details from a number of companies, including T.J.Maxx.

The Cuckoo's Egg

Stoll recorded the hacker's actions as he sought, and sometimes gained unauthorized access to military bases around the United States, looking for files that contained words such as "nuclear" or "SDI".

The Death List

Hacker refers to a character reference he gave for Emil Savundra, and a party he attended at the house of John Poulson, referring to two major scandals of the 1960s and 1970s.

Three-letter acronym

According to the Jargon File, a journalist once asked hacker Paul Boutin what he thought the biggest problem in computing in the 1990s would be.

Timeo Danaos et dona ferentes

In the satirical British series Yes Minister, it is used by civil servant Bernard Woolley in the episode "The Bed of Nails", in which government minister Hacker is offered an apparently advantageous role which would actually lose him votes, the bed of nails.

Warcraft III professional competition

Liu Weiliang started his professional e-sports career in team Hacker and started gaining recognition in international competitive gaming after joining the Mousesports.


see also