2min chapter

Command Line Heroes cover image

Invisible Intruders

Command Line Heroes

CHAPTER

The Lawrence Berkeley Lab Hacker

The lawrence berkeley lab was using a variation of eunuchs called cano. The new emax editing programme had its own e mal sub system that had this tiny security flaw. When it received mail, it renamed the file and changed the ownership label. That meant you could move a file into any part of the set up - even protected parts. It would have been easy enough for stole to patch the hole and lock this hacker out. But cliff stole had noticed something else. They were leap frogging from their network into the us Department of defense's net.

00:00

Get the Snipd
podcast app

Unlock the knowledge in podcasts with the podcast player of the future.
App store bannerPlay store banner

AI-powered
podcast player

Listen to all your favourite podcasts with AI-powered features

Discover
highlights

Listen to the best highlights from the podcasts you love and dive into the full episode

Save any
moment

Hear something you like? Tap your headphones to save it with AI-generated key takeaways

Share
& Export

Send highlights to Twitter, WhatsApp or export them to Notion, Readwise & more

AI-powered
podcast player

Listen to all your favourite podcasts with AI-powered features

Discover
highlights

Listen to the best highlights from the podcasts you love and dive into the full episode