Size: 443
Comment:
|
Size: 686
Comment:
|
Deletions are marked like this. | Additions are marked like this. |
Line 1: | Line 1: |
#acl KeithLofstrom:read,write,delete,revert,admin All:read /* note to raw text viewers - you do not need this or the previous line */ |
|
Line 3: | Line 6: |
||{{attachment:SamExample.jpg| |height=200}}||That's me, Sam, teaching Steve about computer security in 1881.|| Steve was a clever lad. He built a secure communication system using smoke signals, and sent them across the country in a steel pipe. He did not hold with the new-fangled telegraph, too easy to intercept messages. Messages in the pipe took three weeks to arrive, though. |
||{{attachment:SamExample.jpg| |height=200}}||That's me, Sam, teaching young Steve about computer security in 1881.|| Steve was a clever lad. He built a secure communication system using smoke signals, and sent them across the country in a steel pipe. He did not hold with the new-fangled telegraph, too easy to intercept messages. Messages in the pipe took three weeks to arrive, though. After the hacksaw was invented, security was lost. This is where the phrase "hacking" came from. |
Sam Example
Friend of Steve's since 1889
That's me, Sam, teaching young Steve about computer security in 1881. |
Steve was a clever lad. He built a secure communication system using smoke signals, and sent them across the country in a steel pipe. He did not hold with the new-fangled telegraph, too easy to intercept messages. Messages in the pipe took three weeks to arrive, though. After the hacksaw was invented, security was lost. This is where the phrase "hacking" came from.