Template:Hacking in the 1980s
Source 📝
60:
37:
210:
30:
139:
65:
149:
144:
124:
179:
174:
114:
109:
189:
169:
8:
129:
154:
164:
86:
204:
159:
119:
91:
134:
15:
101:
184:
78:
202:
31:
38:
24:
45:
203:
19:
13:
14:
222:
1:
7:
211:Computer security templates
10:
227:
100:
77:
51:
46:Hacking in the 1980s
130:Christmas Tree EXEC
155:Lamer Exterminator
198:
197:
72:
71:
218:
140:Father Christmas
54:
53:
40:
33:
26:
17:
16:
226:
225:
221:
220:
219:
217:
216:
215:
201:
200:
199:
194:
96:
73:
47:
44:
12:
11:
5:
224:
214:
213:
196:
195:
193:
192:
187:
182:
177:
172:
167:
162:
157:
152:
147:
142:
137:
132:
127:
122:
117:
112:
106:
104:
98:
97:
95:
94:
89:
83:
81:
75:
74:
70:
69:
63:
58:
57:← —
52:
49:
48:
43:
42:
35:
28:
20:
9:
6:
4:
3:
2:
223:
212:
209:
208:
206:
191:
188:
186:
183:
181:
178:
176:
173:
171:
168:
166:
163:
161:
158:
156:
153:
151:
148:
146:
143:
141:
138:
136:
133:
131:
128:
126:
123:
121:
118:
116:
113:
111:
108:
107:
105:
103:
99:
93:
90:
88:
85:
84:
82:
80:
76:
68: →
67:
64:
62:
59:
56:
55:
50:
41:
36:
34:
29:
27:
22:
21:
18:
87:The Analyzer
23:
160:Morris worm
120:Byte Bandit
92:Markus Hess
79:Individuals
135:Elk Cloner
190:WANK Worm
165:Ping-Pong
150:Jerusalem
145:Ghostball
205:Category
61:Timeline
125:Cascade
102:Malware
185:Virdem
180:Stoned
175:Scores
115:Brain
66:1990s
110:1260
170:SCA
207::
39:e
32:t
25:v
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.
↑