{"title":"Responsible computing at the University of Delaware","authors":"Richard Gordan","doi":"10.1145/126777.128743","DOIUrl":null,"url":null,"abstract":"Just over four years ago, our department director called two of us into her office. It looked like one of our student consultants had broken into a computer at another university, securing root privileges for himself, using his work account and an account in the Computer Science lab. The FBI was interested because our student's crime had crossed state lines, or so the other university told us.","PeriodicalId":168438,"journal":{"name":"ACM Siguccs Newsletter","volume":"47 12","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1991-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"ACM Siguccs Newsletter","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/126777.128743","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Just over four years ago, our department director called two of us into her office. It looked like one of our student consultants had broken into a computer at another university, securing root privileges for himself, using his work account and an account in the Computer Science lab. The FBI was interested because our student's crime had crossed state lines, or so the other university told us.