arrow Communications of the ACM
arrow Volume 31 , Issue 5 (1988)

access SIGs conferences publication page subscription page

Stalking the wily hacker
Pages 484-497

Clifford Stoll

metadata:   abstract index terms  
rule rule rule rule
full text:   pdf 1559 KB

back to top
blue HR


An astronomer-turned-sleuth traces a German trespasser on our military networks, who slipped through operating system security holes and browsed through sensitive databases. Was it espionage?

back to top
blue HR


Categories and Subject Descriptors:
Computer Systems Organization -Computer-Communication Networks - General (C.2.0): Security and protection (e.g., firewalls); Computer Systems Organization -Computer-Communication Networks - Network Operations (C.2.3): Network monitoring; Computer Systems Organization -Computer-Communication Networks - Network Operations (C.2.3): Public networks; Computing Milieux -Computers and Society - Public Policy Issues (K.4.1): Transborder data flow; Computing Milieux -Computers and Society - Social Issues (K.4.2): Abuse and crime involving computers**; Computing Milieux -Management of Computing and Information Systems - Miscellaneous (K.6.m): Security*; Computing Milieux -The Computing Profession - Miscellaneous (K.7.m): Ethics**;

General Terms:
Management, Security

blue HR