Knowledge

Template:Hacking in the 1980s

Source 📝

60: 37: 210: 30: 139: 65: 149: 144: 124: 179: 174: 114: 109: 189: 169: 8: 129: 154: 164: 86: 204: 159: 119: 91: 134: 15: 101: 184: 78: 202: 31: 38: 24: 45: 203: 19: 13: 14: 222: 1: 7: 211:Computer security templates 10: 227: 100: 77: 51: 46:Hacking in the 1980s 130:Christmas Tree EXEC 155:Lamer Exterminator 198: 197: 72: 71: 218: 140:Father Christmas 54: 53: 40: 33: 26: 17: 16: 226: 225: 221: 220: 219: 217: 216: 215: 201: 200: 199: 194: 96: 73: 47: 44: 12: 11: 5: 224: 214: 213: 196: 195: 193: 192: 187: 182: 177: 172: 167: 162: 157: 152: 147: 142: 137: 132: 127: 122: 117: 112: 106: 104: 98: 97: 95: 94: 89: 83: 81: 75: 74: 70: 69: 63: 58: 57:← — 52: 49: 48: 43: 42: 35: 28: 20: 9: 6: 4: 3: 2: 223: 212: 209: 208: 206: 191: 188: 186: 183: 181: 178: 176: 173: 171: 168: 166: 163: 161: 158: 156: 153: 151: 148: 146: 143: 141: 138: 136: 133: 131: 128: 126: 123: 121: 118: 116: 113: 111: 108: 107: 105: 103: 99: 93: 90: 88: 85: 84: 82: 80: 76: 68: → 67: 64: 62: 59: 56: 55: 50: 41: 36: 34: 29: 27: 22: 21: 18: 87:The Analyzer 23: 160:Morris worm 120:Byte Bandit 92:Markus Hess 79:Individuals 135:Elk Cloner 190:WANK Worm 165:Ping-Pong 150:Jerusalem 145:Ghostball 205:Category 61:Timeline 125:Cascade 102:Malware 185:Virdem 180:Stoned 175:Scores 115:Brain 66:1990s 110:1260 170:SCA 207:: 39:e 32:t 25:v

Index

v
t
e
Timeline
1990s
Individuals
The Analyzer
Markus Hess
Malware
1260
Brain
Byte Bandit
Cascade
Christmas Tree EXEC
Elk Cloner
Father Christmas
Ghostball
Jerusalem
Lamer Exterminator
Morris worm
Ping-Pong
SCA
Scores
Stoned
Virdem
WANK Worm
Category
Computer security templates

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.