Install Steam
login
|
language
简体中文 (Simplified Chinese)
繁體中文 (Traditional Chinese)
日本語 (Japanese)
한국어 (Korean)
ไทย (Thai)
Български (Bulgarian)
Čeština (Czech)
Dansk (Danish)
Deutsch (German)
Español - España (Spanish - Spain)
Español - Latinoamérica (Spanish - Latin America)
Ελληνικά (Greek)
Français (French)
Italiano (Italian)
Bahasa Indonesia (Indonesian)
Magyar (Hungarian)
Nederlands (Dutch)
Norsk (Norwegian)
Polski (Polish)
Português (Portuguese - Portugal)
Português - Brasil (Portuguese - Brazil)
Română (Romanian)
Русский (Russian)
Suomi (Finnish)
Svenska (Swedish)
Türkçe (Turkish)
Tiếng Việt (Vietnamese)
Українська (Ukrainian)
Report a translation problem
ㅤ [COMPUTER JARGON] The Dark Arts
🎍 ❀ 📒 ❀ 👳 ❀ 🐳 ❀ 💄 ❀ 🥒 ❀ 🍇 ❀ 📗 ❀ 👑 ❀ 🎈
It turned out that the worm exploited three or four different holes in the
system. From this, and the fact that we were able to capture and examine
some of the source code, we realized that we were dealing with someone very
sharp, probably not someone here on campus.
-- Dr. Richard LeBlanc, associate professor of ICS, in
Georgia Tech's campus newspaper after the Internet worm.
🥞 ❀ 🍖 ❀ 🍆 ❀ 🐊 ❀ 👃 ❀ 📕 ❀ 👽 ❀ 🍧 ❀ 💎 ❀ 🎄