Across
- 4. What interplanetary institution was once hacked by 15 year Olds leading to a 21 day shutdown
- 6. Doug Engelbart was the inventor of what computer accessory? The first one was made from wood. You might find it either in the corner of a room or attached to your computer through a long cable, both in different senses.
- 10. What animal could a firefox be called
- 11. What was the spooky name of the first computer worm, created in 1971, that could be defeated by the first antivirus software (aptly named Reaper), a character of this namesake is also found in a famous Swedish Game that puts the player in a blank chunked world.
- 12. What does the T in reCAPTCHA stand for
- 13. A virus which attacks on other viruses. Also biological word for a virus that grows and divides inside a bacterium, destroying it
- 16. WinVru was the virus first made for which OS
- 17. According to an analysis by the UK's National Cyber Security Centre that investigated passwords belonging to hacked accounts worldwide, what is the most common six-letter "word" that is used for passwords that don't require numbers or punctuation?
- 18. The protection of computer systems and networks from attack by malicious actors that may result in unauthorized information getting leaker
Down
- 1. What does the first "D" stand for in the common cybercrime known as a DDoS attack?
- 2. A makeshift solution to a problem, especially a computer or programming problem.
- 3. A computer connected to a network that a hacker has compromised
- 5. The "man without a head" is the emblem of what Guy Fawkes-lovin' hacker group that reemerged in 2020, The name fits for a group of people not known because of their name.
- 7. What is the process of analyzing the passage of data packets through a network called (A hound would do this action to a packet of drugs in an airport as well)
- 8. A malicious software designed to give you unwanted ads without your consent, mostly in web browsers
- 9. Hacking for a cause
- 14. A person who enjoys fixing and experimenting with machines and their parts.
- 15. What is a virtual environment which people use to open risky files inorder to protect their system from getting hurt