
Invisible Intruders
Command Line Heroes
00:00
The Lawrence Berkeley Lab Hacker
The lawrence berkeley lab was using a variation of eunuchs called cano. The new emax editing programme had its own e mal sub system that had this tiny security flaw. When it received mail, it renamed the file and changed the ownership label. That meant you could move a file into any part of the set up - even protected parts. It would have been easy enough for stole to patch the hole and lock this hacker out. But cliff stole had noticed something else. They were leap frogging from their network into the us Department of defense's net.
Transcript
Play full episode
Remember Everything You Learn from Podcasts
Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.