Search
  • Videos
  • 5G Guide
  • Windows 10
  • Cloud
  • AI
  • Security
  • TR Premium
  • more
    • Build a Website
    • Enterprise Software
    • Hardware
    • Innovation
    • Best Smartphones
    • Executive Guides
    • Best VPN Services
    • Web Hosting
    • See All Topics
    • White Papers
    • Downloads
    • Reviews
    • Galleries
    • Videos
    • TechRepublic Forums
  • Newsletters
  • All Writers
    • Preferences
    • Community
    • Newsletters
    • Log Out
  • Menu
    • Videos
    • 5G Guide
    • Windows 10
    • Cloud
    • AI
    • Security
    • TR Premium
    • Build a Website
    • Enterprise Software
    • Hardware
    • Innovation
    • Best Smartphones
    • Executive Guides
    • Best VPN Services
    • Web Hosting
    • See All Topics
    • White Papers
    • Downloads
    • Reviews
    • Galleries
    • Videos
    • TechRepublic Forums
      • Preferences
      • Community
      • Newsletters
      • Log Out
  • us
    • Asia
    • Australia
    • Europe
    • India
    • United Kingdom
    • United States
    • ZDNet around the globe:
    • ZDNet China
    • ZDNet France
    • ZDNet Germany
    • ZDNet Korea
    • ZDNet Japan

Caption Competition: Harry Potter and the hacker

1 of 1 NEXT PREV
  • 40150514-1-rowlings360.jpg

    What would J K Rowling like to say to 'Gabriel'?

    This competition is now closed. The winning entry from Ian Paterson was: "The two finger salute was J K Rowlings only response to the claim."

    Published: June 22, 2007 -- 08:30 GMT (01:30 PDT)

    Caption by: silicon.com staff

1 of 1 NEXT PREV
silicon.com staff

By silicon.com staff | June 22, 2007 -- 08:30 GMT (01:30 PDT) | Topic: Security

  • 40150514-1-rowlings360.jpg

What would J K Rowling like to say to 'Gabriel'?

Read More Read Less

What would J K Rowling like to say to 'Gabriel'?

This competition is now closed. The winning entry from Ian Paterson was: "The two finger salute was J K Rowlings only response to the claim."

Published: June 22, 2007 -- 08:30 GMT (01:30 PDT)

Caption by: silicon.com staff

1 of 1 NEXT PREV

Related Topics:

Security Security TV Data Management CXO Data Centers
silicon.com staff

By silicon.com staff | June 22, 2007 -- 08:30 GMT (01:30 PDT) | Topic: Security

Show Comments
LOG IN TO COMMENT
  • My Profile
  • Log Out
| Community Guidelines

Join Discussion

Add Your Comment
Add Your Comment

Related Galleries

  • 1 of 3
  • The Nightmare in Silicon Valley: 8 horror technologies that should scare you to death

    Every night is fright night with what can happen once these scary technologies take hold in ways that you may not have imagined.

  • Julia programming language, cloud computing, cybersecurity worries: Research round-up

    All the facts and figures that matter to you and your business from the past month in technology news.

  • YubiKey 5Ci: USB-C and Lightning Security Key

    The world’s first Lightning-compatible security key

  • 10 Linux distros: From different to dangerous

    One of the great benefits of Linux is the ability to roll your own. Throughout the years, individuals, organizations, and even nation states have done just that. In this gallery, we're ...

  • 2019's tech, security, and authentication trends

    We take a look at the top tech, cybersecurity, and authentication trends as revealed today by the Duo Security's 2019 Trusted Access Report, which includes data from 24 million devices, ...

  • The world's most famous and dangerous APT (state-developed) malware

    A list of the most dangerous, effective, and most well-known malware strains that have been developed by the cyber-security units of various countries' intelligence and military ...

  • Best-paid tech jobs, malware warnings and shadow IT: Research round-up

    All the facts and figures that matter to you and your business from the past month in technology news.

ZDNet
Connect with us

© 2019 CBS Interactive. All rights reserved. Privacy Policy | Cookies | Ad Choice | Advertise | Terms of Use | Mobile User Agreement

  • Topics
  • All Authors
  • Galleries
  • Videos
  • Sponsored Narratives
  • About ZDNet
  • Meet The Team
  • Site Map
  • RSS Feeds
  • Reprint Policy
  • Manage | Log Out
  • Join | Log In | Membership
  • Newsletters
  • Site Assistance
  • ZDNet Academy
  • TechRepublic Forums