Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Reading LevelReading Level
-
Content TypeContent Type
-
YearFrom:-To:
-
More FiltersMore FiltersItem TypeIs Full-Text AvailableSubjectPublisherSourceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
208
result(s) for
"Butler, Max."
Sort by:
Tigers' Butler Cape champ
in
Butler, Max
2015
Other double-winners for Alvirne were 138-pound John Plante (2 decisions), 145-pound Zac Brower (pin, forfeit) and 182-pound Evan Manning (decision, pin). Single winners were 106-pound Mitch Ferullo (forfeit), 106-pound Jon Arroyo (pin), 160-pound Joey Vecchione (pin), 170-pound Scott Cohn (pin), 132-pound Kyle McQuaide (technical fall) and Anthony Abruzzio (forfeit).
Newspaper Article
INFANT'S DEATH RULED ACCIDENTAL
2003
\"Because of the (harness) not being on the child, it allowed him to slide slowly down the seat for about a four-hour period,\" [Max Butler] said. \"His head went down toward his chest, and it compromised his airway. \"We'd like to remind parents that it's never a good idea to leave an infant in an infant seat unattended,\" [Todd Ringle] said. \"It's still very important to make sure that the harness system is on the child - - when you place that harness system, the child is kept at the proper angle.
Newspaper Article
Catch Me If You Can
2009
The story of Max Butler's control of online criminals. After honing his hacker skills, he wanted to prove he was smarter than anyone else. The takeover was his biggest achievement, but he then became a target of the FBI.
Magazine Article
Bay Area hacker indicted -- again
by
Richman, Josh
in
Butler, Max Ray
2007
The indictment claims [Max Ray Butler], sometimes known by the online alias \"Iceman,\" co-founded and administered \"CardersMarket,\" a Web site created as a safe haven for those engaged in stealing, using and selling credit card numbers. Butler by then was well-known in the computer security community; the founder of Berkeley-based Max Vision Network Security, he also had created http://www.whitehats.com, a site offering security resources including a database of electronic signatures left by hackers. In hacker lingo, a \"white-hat\" is a law-abiding person while a \"black hat\" is someone who invades computers without permission.
Newspaper Article
S.F. man indicted again in hacking case
by
Richman, Josh
in
Butler, Max Ray
2007
The indictment claims [Max Ray Butler], sometimes known by the online alias \"Iceman,\" co-founded and administered \"CardersMarket,\" a Web site created as a safe haven for those engaged in stealing, using and selling credit card numbers. A federal grand jury, in March 2000, indicted Butler, accusing him of having invaded computers at the Argonne and Brookhaven National Laboratories in Illinois and New York, respectively; at IDSoftware, a Mesquite, Texas company; at the National Aeronautics and Space Administration's Marshall Flight Center in Alabama; and the federal Secretary of Transportation's office in Washington, D.C. Butler was also accused of intercepting user names and passwords from those computers, and having about 477 passwords belonging to customers of Aimnet, a Santa Clara Internet service provider. .com, a site offering security resources including a database of electronic signatures left by hackers. In hacker lingo, a \"white-hat\" is a law-abiding person while a \"black hat\" is someone who invades computers without permission.
Newspaper Article
Bay Area hacker indicted -- again
by
Richman, Josh
in
Butler, Max Ray
2007
A federal grand jury, in March 2000, indicted [Max Ray Butler], accusing him of having invaded computers at the Argonne and Brookhaven National Laboratories in Illinois and New York, respectively; at IDSoftware, a Mesquite, Texas company; at the National Aeronautics and Space Administrations Marshall Flight Center in Alabama; and the federal Secretary of Transportations office in Washington, D.C. Butler was also accused of intercepting user names and passwords from those computers, and having about 477 passwords belonging to customers of Aimnet, a Santa Clara Internet service provider. Butler by then was well-known in the computer security community; the founder of Berkeley-based Max Vision Network Security, he also had created http://www.whitehats.com, a site offering security resources including a database of electronic signatures left by hackers. In hacker lingo, a white-hat is a law-abiding person while a black hat is someone who invades computers without permission.
Newspaper Article
Bay Area hacker indicted again
by
Richman, Josh
in
Butler, Max Ray
2007
The indictment claims [Max Ray Butler], sometimes known by the online alias \"Iceman,\" co-founded and administered \"CardersMarket,\" a Web site created as a safe haven for those engaged in stealing, using and selling credit-card numbers. Thousands of members worldwide used the site to communicate and to coordinate their schemes, the indictment says. Butler by then was well-known in the computer security community; the founder of Berkeley-based Max Vision Network Security, he also had created www.whitehats.com, a site offering security resources including a database of electronic signatures left by hackers. In hacker lingo, a \"white-hat\" is a law-abiding person while a \"black hat\" is someone who invades computers without permission.
Newspaper Article
Feds add charges to hacker based in San Francisco
by
Cato, Jason
in
Butler, Max Ray
2007
\"[Max Ray Butler] operates a well-known exchange of stolen identity information within the United States and abroad,\" U.S. Secret Service agent John Sechler said in an affidavit. Authorities investigated Butler for 16 months. His partner Christopher Aragon told agents Butler supplied him with more than 1,000 stolen credit card numbers monthly for nearly two years. Aragon programmed counterfeit charge cards with the numbers, bought merchandise, sold items online and split the proceeds with Butler, he told agents. \"In general, the vast majority of attacks like this happen because people in charge of protecting the information haven't done their due diligence,\" [Marty Lindner] said. \"It only takes an advocate who is mildly motivated (to steal.) It doesn't take a rocket scientist.\"
Newspaper Article