Find link

language:

jump to random article

Find link is a tool written by Edward Betts.

searching for Protected computer 64 found (75 total)

alternate case: protected computer

Class (computer programming) (5,690 words) [view diff] no match in snippet view article

In object-oriented programming, a class is an extensible program-code-template for creating objects, providing initial values for state (member variables)
Cameron LaCroix (501 words) [view diff] exact match in snippet view article find links to article
of intentionally causing damage to a protected computer system, obtaining information from a protected computer system, wire fraud, and aggravated identity
Roman Seleznev (1,553 words) [view diff] exact match in snippet view article find links to article
sentenced to 27 years in prison for wire fraud, intentional damage to a protected computer, and identity theft. Seleznev is the son of Valery Seleznev, a member
2014 celebrity nude photo leak (5,132 words) [view diff] exact match in snippet view article find links to article
agreed to plead guilty to one count of unauthorized access to a protected computer to obtain information resulting in an 18-month sentence. While no
Title VIII of the Patriot Act (3,345 words) [view diff] exact match in snippet view article find links to article
apply to those who either damage or gain unauthorized access to a protected computer and thus cause a person an aggregate loss greater than $5,000; adversely
JSTOR (2,956 words) [view diff] exact match in snippet view article find links to article
fraud, unlawfully obtaining information from a protected computer, and recklessly damaging a protected computer. Prosecutors in the case claimed that Swartz
DarkMarket (1,089 words) [view diff] exact match in snippet view article find links to article
on June 10, 2010, to conspiracy to intentionally cause damage to a protected computer and to commit computer fraud. Davies, Caroline (14 January 2010).
United States v. Kane (1,555 words) [view diff] exact match in snippet view article find links to article
Central to the case was whether a video poker machine constituted a protected computer and whether the exploitation of a software bug constituted exceeding
Section summary of Title II of the Patriot Act (7,827 words) [view diff] exact match in snippet view article find links to article
through, or from the protected computer; and does not include a person known by the owner or operator of the protected computer to have an existing contractual
Patriot Act (20,102 words) [view diff] exact match in snippet view article find links to article
communications to law enforcement agencies. Those who operate or own a "protected computer" can give permission for authorities to intercept communications carried
National Information Infrastructure Protection Act (2,473 words) [view diff] exact match in snippet view article find links to article
causes damage without authorization, to a protected computer; (ii) intentionally accesses a protected computer without authorization, and as a result of
PayPal 14 (544 words) [view diff] exact match in snippet view article find links to article
defendants pleaded guilty to one misdemeanor count of damaging a protected computer and one felony count of conspiracy, and three others each pleaded
United States v. John (2010) (1,396 words) [view diff] exact match in snippet view article
court ruled that an employee would exceed authorized access to a protected computer if he or she used that access to obtain or steal information as part
Charles H. Eccleston (1,610 words) [view diff] exact match in snippet view article find links to article
Regulatory Commission (NRC) who was convicted for attempting to breach protected computer systems. Eccleston, a U.S. citizen who had been living in Davao City
AT&T Merlin (2,589 words) [view diff] exact match in snippet view article find links to article
Administration Terminal (SAT). The SAT was a dedicated, password-protected computer terminal continuously connected to the RS232 serial port to the PBX
Computer crime countermeasures (3,632 words) [view diff] exact match in snippet view article find links to article
committing fraud with a protected computer, damaging a protected computer, trafficking in passwords, threatening to damage a protected computer, conspiracy to
List of military inventions (353 words) [view diff] exact match in snippet view article find links to article
global positioning satellites Darknet 1990s United States Anonymous/protected computer networking Used by journalists, political activists, scientists, etc
Operation Payback (5,201 words) [view diff] exact match in snippet view article find links to article
He was charged with conspiracy and unauthorized impairment of a protected computer. On October 26, 2010, LimeWire was ordered to disable the "searching
Scott Levine (293 words) [view diff] exact match in snippet view article find links to article
2005, Levine was convicted of 120 counts of unauthorized access of a protected computer, two counts of access device fraud, and one count of obstruction of
List of cybercriminals (2,145 words) [view diff] exact match in snippet view article find links to article
count of intentionally causing or attempting to cause damage to a protected computer via his version of the Blaster computer worm 28 January 2005 18 months
Antivirus software (9,194 words) [view diff] exact match in snippet view article find links to article
remove anything. They may protect against infection from outside the protected computer or network, and limit the activity of any malicious software which
USBKill (1,510 words) [view diff] exact match in snippet view article find links to article
installation of malware or spyware on, or copying of files from, a protected computer. It is also recommended for general use as part of a robust security
Computer trespass (650 words) [view diff] exact match in snippet view article find links to article
financial information, information from a department or agency from any protected computer. Each state has its own laws regarding computer trespassing but they
Federal Correctional Institution, Fort Dix (954 words) [view diff] exact match in snippet view article find links to article
release on June 26, 2024. Tech CEO convicted of conspiracy to access a protected computer system. Also founder of A Voice From Prison, the first nonprofit of
Seal (emblem) (5,623 words) [view diff] exact match in snippet view article
certificate owned by the professional may be attached to a security protected computer file. The identities on the professional seals determine legal responsibility
SpywareBlaster (172 words) [view diff] exact match in snippet view article find links to article
Clsid of known malware programs, preventing them from infecting the protected computer. This approach differs from many other anti-spyware programs, which
Xbox Underground (974 words) [view diff] exact match in snippet view article find links to article
of unauthorized access to its computer networks, including GDNP's protected computer network, which resulted in the theft of log-in credentials, trade
Guccifer (2,291 words) [view diff] exact match in snippet view article find links to article
44—pleaded guilty in U.S. federal court to unauthorized access to a protected computer and aggravated identity theft as part of a plea agreement with federal
LulzSec (10,578 words) [view diff] exact match in snippet view article find links to article
indicted on charges of conspiracy and the unauthorized impairment of a protected computer. He is suspected of using the name "recursion" and assisting LulzSec
Is Anyone Up? (1,696 words) [view diff] exact match in snippet view article find links to article
in California on charges of conspiracy, unauthorized access to a protected computer, and aggravated identity theft. In February 2015, Moore pled guilty
Swatting (4,452 words) [view diff] exact match in snippet view article find links to article
"Conspiracy to commit access device fraud and unauthorized access of a protected computer" An accomplice may be found guilty of "conspiring to obstruct justice"
Dead man's switch (3,835 words) [view diff] exact match in snippet view article find links to article
user-specified data if an unauthorized user should ever gain access to the protected computer. Google's Inactive Account Manager allows the account holder to nominate
Hunter Moore (2,167 words) [view diff] exact match in snippet view article find links to article
arrest by the FBI on charges of conspiracy, unauthorized access to a protected computer, and aggravated identity theft. Many of these crimes were committed
Death of Caylee Anthony (10,941 words) [view diff] exact match in snippet view article find links to article
and computer expert in Connecticut, revealed that Casey's password-protected computer account shows activity on the home computer at 1:39 p.m., with activity
Pulte Homes, Inc. v. Laborers' International Union (859 words) [view diff] exact match in snippet view article find links to article
that conduct, intentionally cause damage without authorization, to a protected computer." Under the CFAA, "any impairment to the integrity or availability
Hacker Dojo (1,283 words) [view diff] case mismatch in snippet view article find links to article
1030(a)(5)(A) and (c)(4)(B)(i)—Intentionally Causing Damage to a Protected Computer. Miller was indicted in May 2014. He was scheduled to be sentenced
Password (8,868 words) [view diff] exact match in snippet view article find links to article
commonly used by people during a log in process that controls access to protected computer operating systems, mobile phones, cable TV decoders, automated teller
In re DoubleClick (1,201 words) [view diff] exact match in snippet view article find links to article
Abuse Act, 18 U.S.C. § 1030, prohibits the intentional access of a protected computer to obtain information without authorization which causes at least
Crime prevention (4,136 words) [view diff] exact match in snippet view article find links to article
computer penetrations and data thefts at some of the most heavily protected computer systems in the world. Criminal activities in cyberspace are increasing
Anonymous (hacker group) (15,620 words) [view diff] exact match in snippet view article
American 19-year-old. He pleaded guilty to "unauthorized impairment of a protected computer" in November 2009 and was sentenced to 366 days in U.S. federal prison
Alycia Lane (1,715 words) [view diff] exact match in snippet view article find links to article
Mendte was charged with one felony count of intentionally accessing a protected computer without authorization. In August 2008, Mendte pleaded guilty and in
Sanford Wallace (1,662 words) [view diff] exact match in snippet view article find links to article
various counts of electronic mail fraud, intentional damage to a protected computer, and criminal contempt. The indictment followed a two-year investigation
High Orbit Ion Cannon (1,744 words) [view diff] exact match in snippet view article find links to article
with one count of "conspiracy to intentionally cause damage to a protected computer" for the events that occurred between September 16, 2010 and January
AC power plugs and sockets (11,828 words) [view diff] exact match in snippet view article find links to article
variation (standard DK 2-5a) of the Danish plug is for use only on surge protected computer sockets. It fits into the corresponding computer socket and the normal
2020 Twitter account hijacking (5,096 words) [view diff] exact match in snippet view article find links to article
conspiracy to commit money laundering and the intentional access of a protected computer, and a 22-year-old from Florida was charged with aiding and abetting
GlobalHell (1,992 words) [view diff] case mismatch in snippet view article find links to article
Website Sentenced to 34 Months for Attempting to Cause Damage to a Protected Computer". www.justice.gov. 2006-08-15. Archived from the original on 2022-11-16
Shadowrun (1993 video game) (2,826 words) [view diff] exact match in snippet view article
found by piecing together snippets of data found by hacking various protected computer systems. Along the way, he has encounters with gangs, criminals, and
Barrett Brown (7,766 words) [view diff] exact match in snippet view article find links to article
guilty to accessory after the fact in the unauthorized access to a protected computer, threatening an FBI agent and obstructing the execution of a search
Peter Levashov (1,269 words) [view diff] exact match in snippet view article find links to article
ultimately "pleaded guilty to one count of causing intentional damage to a protected computer, one count of conspiracy, one count of wire fraud and one count of
Lee v. PMSI, Inc. (859 words) [view diff] exact match in snippet view article find links to article
makes it illegal (with both civil and criminal penalties) to access a protected computer without authorization. Courts have long debated whether the statute
Yevgeniy Nikulin (2,483 words) [view diff] exact match in snippet view article find links to article
transmission of information, code, or command causing damage to a protected computer 2 counts of aggravated identity theft 1 count of trafficking in unauthorized
News International phone hacking scandal (24,555 words) [view diff] exact match in snippet view article find links to article
Marketing engaged in illegal computer espionage by breaking into password protected computer systems and obtaining confidential information. Further controversy
List of people banned from Major League Baseball (5,989 words) [view diff] exact match in snippet view article find links to article
later sentenced to 46 months in prison for unauthorized access of a protected computer, thus becoming the first person to be incarcerated for activities
List of people granted executive clemency by Donald Trump (8,266 words) [view diff] exact match in snippet view article find links to article
$250,000 fine due and payable immediately Conspiracy to access a protected computer without authorization The former CEO of an education software business
Matthew Weigman (976 words) [view diff] exact match in snippet view article find links to article
conspiracy to commit access device fraud and unauthorized access of a protected computer." Weigman admitted that he and his allies gained unauthorized access
United States v. Nosal (1,616 words) [view diff] exact match in snippet view article find links to article
liable anyone who "knowingly and with intent to defraud, accesses a protected computer without authorization, or exceeds authorized access, and by means
Craigslist Inc. v. 3Taps Inc. (1,871 words) [view diff] exact match in snippet view article find links to article
to access the listings. The CFAA claim only applies to access of a protected computer system without authorization. It claimed that Craigslist was a public
HiQ Labs v. LinkedIn (959 words) [view diff] exact match in snippet view article find links to article
authorization or exceeding one's authorization to obtain information from a protected computer. LinkedIn asserted that following the receipt of its cease-and-desist
2015 St. Louis Cardinals season (17,768 words) [view diff] exact match in snippet view article find links to article
guilty in federal court to five counts of unauthorized access to a protected computer from at least March 2013 through June 2014. Officials in MLB's commissioner's
Sergey Aleynikov (3,270 words) [view diff] exact match in snippet view article find links to article
of stolen goods (count 2), and illicit obtainment of data from a protected computer (count 3). On July 16, 2010, Aleynikov moved to dismiss the indictment
Copyright and Related Rights Regulations 2003 (1,735 words) [view diff] exact match in snippet view article find links to article
copyright, including seizure. The right is infringed: with respect to protected computer programs, by a person who "manufactures for sale or hire, imports
International cybercrime (3,492 words) [view diff] exact match in snippet view article find links to article
Social engineering is nevertheless highly effective for attacking well-protected computer systems with the exploitation of trust. Social networking becomes
Overview of news media phone hacking scandals (15,662 words) [view diff] exact match in snippet view article find links to article
espionage against in 2006 by breaking into FLOORgraphics' password-protected computer system and obtaining proprietary information at least eleven times
List of Danball Senki episodes (668 words) [view diff] exact match in snippet view article find links to article
be recovered by the group if they can hack into the world's most protected computer system. The group is disappointed when they learn even a team of hackers