LATE REGISTRATION RATES FOR #HITB2014KUL STARTS ON THE 1ST OF OCTOBER ONWARDS!

REGISTER ONLINE NOW

 

Hands-on Technical Trainings - 13th & 14th October

http://conference.hitb.org/hitbsecconf2014kul/#tile_schedule

Triple-Track Conference - 15th & 16th October

http://conference.hitb.org/hitbsecconf2014kul/conference-speakers/

 

Capture the Flag - 15th & 16th October

http://conference.hitb.org/hitbsecconf2014kul/capture-the-flag/

HackWEEKDAY - 15th & 16th October

http://conference.hitb.org/hitbsecconf2014kul/hackweekday/

CommSec Village - 15th & 16th October

http://conference.hitb.org/hitbsecconf2014kul/commsec-village/

How MIT ensnared a hacker, bucking a freewheeling culture

http://images.canberratimes.com.au/2013/01/18/3961810/art-Swartz-620x349.jpg

In the early days of 2011, the Massachusetts Institute of Technology learned that it had an intruder. Worse, it believed the intruder had been there before.

Months earlier, the mysterious visitor had used the school's computer network to begin copying millions of research articles belonging to JSTOR, the non-profit organisation that sells subscription access to universities.

The visitor was clever — switching identifications to avoid being blocked by MIT's security system — but eventually the university believed it had shut down the intrusion, then spent weeks reassuring furious officials at JSTOR that the downloading had been stopped. But on January 3 that year, according to internal MIT documents, the university was informed that the intruder was back — this time downloading documents very slowly, with a new method of access, so as not to alert the university's security experts.