.:.:.:.:
RTTP
.
Mobile
:.:.:.:.
[
<--back
] [
Home
][
Pics
][
News
][
Ads
][
Events
][
Forum
][
Band
][
Search
]
full forum
|
bottom
Reply
[
login
]
SPAM Filter:
re-type this
(values are 0,1,2,3,4,5,6,7,8,9,A,B,C,D,E, or F)
you are quoting a heck of a lot there.
[QUOTE]blah blah blah[/QUOTE] to reply to Doomkid.
Please remove excess text as not to re-post tons
message
[QUOTE="Doomkid:1222557"]Yup. [quote]23. The next day, October 9, 2010, Swartz used both the “ghost laptop” and the “ghost macbook” to systematically and rapidly access and download an extraordinary volume of articles from JSTOR. The pace was so fast that it brought down some of JSTOR’s computer servers. 24. In response, JSTOR blocked the entire MIT computer network’s access to JSTOR for several days, beginning on or about October 9, 2010. November and December, 2010 25. During November and December, 2010, Swartz used the “ghost laptop” (i.e., the Acer laptop) at MIT to make over two million downloads from JSTOR. This is more than one hundred times the number of downloads during the same period by all the legitimate MIT JSTOR users combined. Of the downloads, approximately half were research articles, with the remainder being reviews, news, editorials, and miscellaneous documents. 26. This time around, Swartz circumvented MIT’s guest registration process altogether when he connected to MIT’s computer network. By this point, Swartz was familiar with the IP addresses available to be assigned at the switch in the restricted network interface closet in the basement of MIT’s Building 16. Swartz simply hard-wired into the network and assigned himself two IP addresses. He hid the Acer laptop and a succession of external storage drives under a box in the closet, so that they would not be obvious to anyone who might enter the closet.[/quote] http://www.boston.com/Boston/metrodesk/2011/07/cambridge-man-accused-hacking-mit-computers-steal-scientific-papers/6SVnqu3Yfo7OIrLQOYSz5M/index.html[/QUOTE]
top
[
Vers. 0.12
][ 0.005 secs/8 queries][
refresh
][