security What user names do hackers try on my computers? Thinking about hacker attacks and computer security in general the other day, I configured a Internet connected machine with an open ssh login prompt in order to track what user names try to connect to it and then made a small web application that
game Flappy Sonic already hacked My flappy bird clone has already been hacked by someone who scored 9999 points. Since this is a highly unprobable score for a casual player it's obvious that the game has ben hacked. This is really easy since the hiscore is sent