Climate Science Glossary

Term Lookup

Enter a term in the search box to find its definition.


Use the controls in the far right panel to increase or decrease the number of terms automatically displayed (or to completely turn that feature off).

Term Lookup


All IPCC definitions taken from Climate Change 2007: The Physical Science Basis. Working Group I Contribution to the Fourth Assessment Report of the Intergovernmental Panel on Climate Change, Annex I, Glossary, pp. 941-954. Cambridge University Press.

Home Arguments Software Resources Comments The Consensus Project Translations About Support

Bluesky Facebook LinkedIn Mastodon MeWe

Twitter YouTube RSS Posts RSS Comments Email Subscribe

Climate's changed before
It's the sun
It's not bad
There is no consensus
It's cooling
Models are unreliable
Temp record is unreliable
Animals and plants can adapt
It hasn't warmed since 1998
Antarctica is gaining ice
View All Arguments...

New? Register here
Forgot your password?

Latest Posts


A Hack By Any Other Name — Index

Posted on 24 March 2014 by Bob Lacatena


In March of 2012, a "leak" — actually the results of a concerted, persistent and expert hack — of the Skeptical Science web site revealed the contents of the private contributors forum, as well as a useless list of deleted comments (we have intended for some time to make all deleted comments visible to everyone, and simply haven't gotten around to that task yet) and the site's registered users (culled to remove all pseudo-skeptics).

The series of seven posts outlines the story of how the hack unfolded, how it was investigated, and exactly how it was perpetrated.

The Posts

  • Part 1 recounts the initial steps of the hacker, and our initial discovery of his intrusion.

  • Part 2 describes the earliest encounters, known and unknown, with the hack.

  • Part 3 explains SQL injection attacks, recounts the hacker's release note, and describes the hacker's activity through March.

  • Part 4 describes the inner workings of the Skeptical Science website, and the first, restricted efforts to respond to the hack.

  • Part 5 explains how apache logs are structured, and explains some of the avenues the hacker used in his attack.

  • Part 6 describes the methods used by the hacker and details his activity on February 21st.

  • Part 7 concludes by answering those questions that have answers.

The Timeline


0 0

Printable Version  |  Link to this page


Comments 1 to 1:

  1. Looks good.  Thanks for putting the index together.  I'll circulate the link to my techie friends who wouldn't normally visit SkS.

    0 0

You need to be logged in to post a comment. Login via the left margin or if you're new, register here.

The Consensus Project Website


(free to republish)

© Copyright 2024 John Cook
Home | Translations | About Us | Privacy | Contact Us