U.S. questions ex-engineer in theft from Apple
Article Abstract:
Former Apple engineer Grady Ward is suspected of orchestrating the recent illegal distribution of design software used by the computer company to develop its popular Macintosh microcomputer. Ward claims to have been subpoenaed by the grand jury and is suspected, along with four others, by the US Federal Bureau of Investigation. Ward is suspected of distributing the Macintosh software to computer trade magazines and software developers in Jun 1989 as a member of the 'Nu Prometheus League.' The theft is said to have been undertaken for philosophical rather than financial reasons. The letter that accompanied the software disks proclaims that the goal of the league is to see the genius of Apple employees benefit the world even though Apple itself does everything it can to prevent companies from copying the design of the Macintosh.
Publication Name: The New York Times
Subject: News, opinion and commentary
ISSN: 0362-4331
Year: 1989
User Contributions:
Comment about this article or add new information about this topic:
Expert says Windows XP aid vandals
Article Abstract:
San Diego Supercomputer Center security analyst Steven Gibson has reported that Microsoft Windows XP is prone to computer terrorism or smaller attacks such as denial of service attack. Newer Microsoft software allowing consumers to be constantly linked to the net gives hackers even greater ability to engorge fake data streams. Microsoft said they had spoken to Mr. Gibson. The company says they have enhanced security of its softare. The San Diego Center reported about 13,000 attacks in February against about 5,000 sites.
Publication Name: The New York Times
Subject: News, opinion and commentary
ISSN: 0362-4331
Year: 2001
User Contributions:
Comment about this article or add new information about this topic:
Microsoft says online break-in lasted 6 weeks
Article Abstract:
Microsoft Corp. has reported that hackers were not able to steal the company's source code for Windows and Office computer software. Chairman Steve Ballmer said the culprits did view the code over the course of a 6-week hack-in using the QAZ Trojan program. The F.B.I. was called in to help in the probe which might have orignated via a Microsoft employee working remotely. An intruder may have also been able to put in additional code. The break-in is sobering to many companies who consider their systems secure.
Publication Name: The New York Times
Subject: News, opinion and commentary
ISSN: 0362-4331
Year: 2000
User Contributions:
Comment about this article or add new information about this topic:
- Abstracts: Firestone rating down, but not out. Expert advice: act now gripe later. Firestone warns of nationwide tire shortage
- Abstracts: No peace in the streets. The new days of rage. The price of peace
- Abstracts: Gemstar chief: king of TV jungle. Warner Bros. chiefs leave as movie tastes change. Gemstar CEO writes chapter in e-book publishing
- Abstracts: Despite rising travel costs, employees still flying high. Airlines rein in passenger frills to cut costs. Travel likely to become more pricey
- Abstracts: Humbled in Atlanta, I.B.M. hopes to rebound in Sydney. Shortage of technology parts is still dampening results; companies pay higher prices for needed components