Tinkerers Lab + Kludge

123456789101112131415161718
Across
  1. 4. What interplanetary institution was once hacked by 15 year Olds leading to a 21 day shutdown
  2. 6. Doug Engelbart was the inventor of what computer accessory? The first one was made from wood. You might find it either in the corner of a room or attached to your computer through a long cable, both in different senses.
  3. 10. What animal could a firefox be called
  4. 11. What was the spooky name of the first computer worm, created in 1971, that could be defeated by the first antivirus software (aptly named Reaper), a character of this namesake is also found in a famous Swedish Game that puts the player in a blank chunked world.
  5. 12. What does the T in reCAPTCHA stand for
  6. 13. A virus which attacks on other viruses. Also biological word for a virus that grows and divides inside a bacterium, destroying it
  7. 16. WinVru was the virus first made for which OS
  8. 17. According to an analysis by the UK's National Cyber Security Centre that investigated passwords belonging to hacked accounts worldwide, what is the most common six-letter "word" that is used for passwords that don't require numbers or punctuation?
  9. 18. The protection of computer systems and networks from attack by malicious actors that may result in unauthorized information getting leaker
Down
  1. 1. What does the first "D" stand for in the common cybercrime known as a DDoS attack?
  2. 2. A makeshift solution to a problem, especially a computer or programming problem.
  3. 3. A computer connected to a network that a hacker has compromised
  4. 5. The "man without a head" is the emblem of what Guy Fawkes-lovin' hacker group that reemerged in 2020, The name fits for a group of people not known because of their name.
  5. 7. What is the process of analyzing the passage of data packets through a network called (A hound would do this action to a packet of drugs in an airport as well)
  6. 8. A malicious software designed to give you unwanted ads without your consent, mostly in web browsers
  7. 9. Hacking for a cause
  8. 14. A person who enjoys fixing and experimenting with machines and their parts.
  9. 15. What is a virtual environment which people use to open risky files inorder to protect their system from getting hurt