http://w2.eff.org/IP/P2P/MGM_v_Grokster/ this site has information to do with the case, if you are doing the xtra credit here you go 🙂
The essay website http://www.gpc.edu/~jbenson/csci1300/essays.htm#hacking refers us to page 493-494 in our textbook for information on hacking. However these pages talk about firewalls. I roughly skimmed the book and the only Index reference to “hacker” is in Chapter 12 under Information Security. Which pages should we read?
In talking about databases and key field values, I mentioned the government’s “no-fly list” as an example of the non-uniqueness of names (and the problems that can cause). If you want to know more, here is the link: The story itself, with links to video clips from the broadcast.