Geometry.Net - the online learning center
Home  - Computer - Hacking

e99.com Bookstore
  
Images 
Newsgroups
Page 3     41-60 of 186    Back | 1  | 2  | 3  | 4  | 5  | 6  | 7  | 8  | 9  | 10  | Next 20

         Hacking:     more books (100)
  1. Hands-On Ethical Hacking and Network Defense by Michael T. Simpson, Kent Backman, et all 2010-03-17
  2. Live Hacking: The Ultimate Guide to Hacking Techniques & Countermeasures for Ethical Hackers & IT Security Experts by Ali Jahangiri, 2009-10-21
  3. Hacking the Code: ASP.NET Web Application Security by Mark Burnett, 2004-05
  4. Hacking iSeries by Shalom Carmel, 2006-02-10
  5. Hacking the Cable Modem: What Cable Companies Don't Want You to Know by DerEngel, 2006-09-10
  6. Every Woman's Nightmare: The True Story Of The Fairy-Tale Marriage And Brutal Murder Of Lori Hacking by Steven Long, 2006-04-04
  7. Hacking World of Warcraft (ExtremeTech) by Daniel Gilbert, James Whitehead II, 2007-06-05
  8. Rewriting the Soul by Ian Hacking, 1998-08-03
  9. Hacking Roomba: ExtremeTech by Tod E. Kurt, 2006-11-20
  10. Hacking College by Dean Kohrs, 2010-06-23
  11. Hacker's Challenge 3: 20 Brand New Forensic Scenarios & Solutions (Hacking Exposed) (v. 3) by David Pollino, Bill Pennington, et all 2006-04-25
  12. Scientific Revolutions (Oxford Readings in Philosophy)
  13. Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions by David Endler, Mark Collier, 2006-11-28
  14. Hacking the PSP: Cool Hacks, Mods, and Customizations for the SonyPlayStationPortable (ExtremeTech) by Auri Rahimzadeh, 2006-10-30

41. Hacking The TiVo FAQ
You have no frames! So, click here to go to the TiVo Hack FAQ.
http://www.tivofaq.com/hack/faq.html
You have no frames! So, click here to go to the TiVo Hack FAQ.

42. Tamagotchi Hacking
No technical info and the links within are all dead, but it is useful in that it points out hacks that are possible. Good starting point. Wired News
http://www.wired.com/news/news/technology/story/6229.html

43. Mark Dery's Pyrotechnic Insanitarium
Full text of the culture jamming manifesto by Mark Dery, popularizer of the term culture jamming
http://www.levity.com/markdery/culturjam.html
Culture Jamming: Hacking, Slashing and Sniping in the Empire of Signs The Empire of Signs Modern alert
plague is here
burn your TV
exterminate fear
Image breakers
smashing TV
American heroes
burn to be free
The McLaughlin Hour Entertainment Tonight -style hype from a cheerleading media. When filmmaker Jon Alpert, under contract to NBC, brought back stomach-churning footage of Iraq under U.S. bombardment, the network which is owned by one of the world's largest arms manufacturers, General Electric fired Alpert and refused to air the film. Not that Alpert's film would have roused the body politic: Throughout the war, the American people demanded the right not to know. A poll cited in The New York Times was particularly distressing: "Given a choice between increasing military control over information or leaving it to news organizations to make most decisions about reporting on the war, 57 per cent of those responding said they would favor greater military control." was hired; it orchestrated the congressional testimony of the distraught young Kuwaiti woman whose horror stories about babies ripped from incubators and left "on the cold floor to die" by Iraqi soldiers was highly effective in mobilizing public support for the war. Her testimony was never substantiated, and her identity she was the daughter of the Kuwaiti ambassador to the U.S. was concealed, but why niggle over details? "Formulated like a World War II movie, the Gulf War even ended like a World War II movie," wrote Neal Gabler, "with the troops marching triumphantly down Broadway or Main Street, bathed in the gratitude of their fellow Americans while the final credits rolled."

44. A History Of Hacking
Home. A history of hacking. hacking has been around for more than a century. 2600The Hacker Quarterly is founded to share tips on phone and computer hacking.
http://www.sptimes.com/Hackers/history.hacking.html
Hackers WE ARE HACKERS A history of hacking Florida's hacker connections Altering a Web site STREET SMARTS The bible of phreaking faithful ... Home
A history of hacking Hacking has been around for more than a century. In the 1870s, several teenagers were flung off the country's brand new phone system by enraged authorities. Here's a peek at how busy hackers have been in the past 35 years. Early 1960s University facilities with huge mainframe computers, like MIT's artificial intelligence lab, become staging grounds for hackers. At first, "hacker" was a positive term for a person with a mastery of computers who could push programs beyond what they were designed to do. Early 1970s John Draper John Draper makes a long-distance call for free by blowing a precise tone into a telephone that tells the phone system to open a line. Draper discovered the whistle as a give-away in a box of children's cereal. Draper, who later earns the handle "Captain Crunch," is arrested repeatedly for phone tampering throughout the 1970s. Yippie social movement starts YIPL/TAP (Youth International Party Line/Technical Assistance Program) magazine to help phone hackers (called "phreaks") make free long-distance calls.

45. Hacking For Human Rights?
Article about the Cult of the Dead Cow, the Hong Kong Blondes, and hacktivism. Wired
http://www.wired.com/news/news/politics/story/13693.html

46. Hacking Memes
hacking Memes. Contents. Humans are present only as audience or operators. .Meme hacking was limited by technology in the early days.
http://www.firstmonday.dk/issues/issue4_10/downes/
Contents
The Essence of the Meme
Advertising

The Corporate Pitch

Hyper Reality
...
The Anti-Meme
The Essence of the Meme
The concept of the meme has been working its way around the Web for a while now, instantiating itself in Wired 's regular feature, Hype List , in articles , and in general currency. As David Bennahum writes at the top of each issue of Meme , a meme is a "contagious idea that replicates like a virus, passed on from mind to mind. Memes function the same way genes and viruses do, propagating through communication networks and face-to-face contact between people." The tune you can't get out of your head, the phrase you keep using in your conversation - these are all memes, ideas which have passed from somewhere out there into your head and into your consciousness. Transference is the essence of the meme. Principia Cybernetica Web defines it as "an information pattern, held in an individual's memory, which is capable of being copied to another individual's memory." The Hacker's Dictionary defines it as "An idea considered as a replicator, esp. with the connotation that memes parasitize people into propagating them much as viruses do." The concept originates in Richard Dawkins's 1976 book The Selfish Gene.

47. The Hacking Depot - Kies Je Taal - Choose Your Language
Informatie over cryptografie, computerbeveiliging, hacken en phreaking.
http://mediatheek.thinkquest.nl/~ll152
Enter Je hebt de Macromedia Flash 4 plugin nodig om deze site te kunnen bekijken.
Zet je boxen aan, want er zit geluid bij de intro.
Je kunt deze site het beste in een resolutie van 800 x 600 of 1024 x 768 en minstens 16-bits kleuren. © 2000, ThinkQuest Leerlingteam 152

48. Technology And Pleasure
hacking is discussed in the context of being a method for system development.An hacking in the Real World. Linux is subversive. Who
http://www.firstmonday.dk/issues/issue4_2/gisle/
"Hackers" are identified as a specific subgroup of computer workers. The history of the hacker community is told. The explicit and implicit ideologies expressed through hacking is analyzed and presented. Computer artifacts of origin both inside and outside the hacker community are compared and the embedded properties of the resulting artifacts are inferred. Hacking is discussed in the context of being a method for system development. Finally, it is argued that this system development method under certain circumstances may yield superior software artifacts.
Contents
Introduction
Tinker, Taylor, Scholar, Hacker

The Hacker Community

The Hacker Ethic
...
Conclusion
Introduction
"The hacker is a person outside the system who is never excluded by its rules" (Turkle, 1984). ""Hackers" are computer aficionados who break in to corporate and government computer systems using their home computer and a telephone modem" (Meyer, 1989). The popular image of the computer hacker seems to be part compulsive programmer preferring the company of computers to people, and part criminal mastermind using his or her technical prowess to perpetrate anti-social acts. But this is at best only half the story. A number of people I know who are proud to be called "hackers" are sensitive, sharing, social and honest. Part of the confusion surrounding the word "hacker" stems from the fact that it as been applied to at least three distinct communities.

49. Internet Hacking For Dummies
A panel discussion at Computers, Freedom, and Privacy conference in Texas reviewed common security blunders, and offered sound advice for protecting sensitive data. Wired News
http://www.wired.com/news/news/story/10459.html

50. Hacking Ball Z V0.3 :: Webmasters, Programadores, Informáticos [RECURSOS GRATIS

http://www.hackingballz.com/

Foro Z
eL GURU Fuentes Graficas Descarga de programas Directorio de enlaces Biblioteca Herramientas Web Libro de visitas ... Ver todos los documentos NickName:
¿Cerramos HBZ, creen que ya cumplio su ciclo?
Si No
[...anteriores]
Condiciones de uso

The Kaiser

51. BO LAVARE'S SMARTCARD SECURITY PAGE
Smartcard securtity news. Information about smartcard technical background, smartcard security, smartcard hacking, description of hardware and software and known vulnerabilities.
http://www.geocities.com/ResearchTriangle/Lab/1578/smart.htm
Bo Lavare's
Smartcard security page

Smartcard Section

GSM Section

RDS Section
...
Micro Section

SMARTCARD
section menu:
Smartcard News

Standards

Readers
Attacks ... Sign guestbook Your comments send to
bolavare@geocities.com Place a word SMARTCARD in the subject!
Smartcard security information page
by Bo Lavare This page will be still under construction. You may put this banner on your page:
Bo Lavare's Smartcard Security News
Smartcard security news issues: Newest
New!! GSM Pages!
Smartcard standards and specifications
The main standards of smart cards are ISO standards. The list of relevant ISO standards can be found here . Unfortunately the standards are not for free. The most important standard is ISO 7816. First four parts of this standard are available on-line below.

52. Hacking Linux Exposed
Companion Website to hacking Linux Exposed, Osborne/McGrawHill. Source code from the book, updates, Category Computers Software Operating Systems Linux Security...... an attacker. In hacking Linux Exposed, Second Edition we are ableto cover Linux hacking in more detail than ever before. We are
http://www.hackinglinuxexposed.com/
Secure your Linux network by thinking like an attacker. In Hacking Linux Exposed, Second Edition we are able to cover Linux hacking in more detail than ever before. We are able to show you where Linux may differ from other Unix-like systems and give you Linux-specific countermeasures that you can implement immediately. In the hard-hitting style of Hacking Exposed Hacking Linux Exposed, Second Edition once again dives into the actual attacks used by the enemy. Look no further for the actual exploitation techniques used to surreptitiously gain access to Linux systems. Hacking Linux Exposed, Second Edition covers the myriad ways a malicious hacker will attack your Linux system, and the rationale behind such behavior. While the bad guys are well versed in such techniques, this book serves to educate the home user as well as the overworked and underpaid system administrator who is not only responsible for the operation of mission-critical Linux servers, but who must vigilantly secure them on a daily basis. For more information, see the

53. Stephen Downes - Threads - Hacking Memes
Essay about antimemes and the anti-meme movement by Stephen Downes.
http://www.atl.ualberta.ca/downes/threads/column052599.htm
Stephen's Web Threads Hacking Memes
    by Stephen Downes
    27 May 1999 This essay is about subversion. 1. The Essence of the Meme The concept of the meme has been working its way around the web for a while now, instantiating itself in Wired 's regular feature, Hype List , in articles , and in general currency. As David Bennahum writes at the top of each issue of Meme , a meme is a contagious idea that replicates like a virus, passed on from mind to mind. Memes function the same way genes and viruses do, propagating through communication networks and face-to-face contact between people. The tune you can't get out of your head, the phrase you keep using in your conversation, the image of the perfect donut - these are all memes, ideas which have passed from somewhere out there into your head and into your consciousness. Transference is the essence of the meme. Principia Cybernetica Web defines it as "an information pattern, held in an individual's memory, which is capable of being copied to another individual's memory." The

54. The Village Voice: Books: Happy Hacking By Julian Dibbell
Happy hacking by Julian Dibbell June 26 July 2, 2002 Happy hacking — Free asin Freedom Richard Stallman's Crusade for Free Software by Sam Williams;
http://www.villagevoice.com/issues/0226/dibbell.php
New Every Monday
Resources
(advertisements) Free Software Giveaway
Say Goodbye to Verizon

Lose Weight

In Debt Get Help
...
Buy Gourmet CoffeeAM

Happy Hacking
by Julian Dibbell
June 26 - July 2, 2002
Richard Stallman grants permission to steal the bejesus out of his work. (photo: O'Reilly Publications) Free as in Freedom: Richard Stallman's Crusade for Free Software By Sam Williams O'Reilly, 227 pp., $22.95 Buy this book more on books at VLS long time ago, in a reality far, far away, a certain legendary hippie freedom fighter lobbed a cunning little think bomb at the publishing industry of his day. The bomb was a book, a bestselling how-to manual for the author's fellow revolutionaries, loaded with practical tips on copping dope, constructing Molotov cocktails, incapacitating riot police, defrauding record-of-the-month clubs, and otherwise hastening the downfall of the Pig Empire. Incendiary stuff for sure, and no doubt the 30-plus publishing houses that rejected the manuscript (before the author finally published it himself) did so well-advised by their own freaked-out legal departments. But probably nothing advocated in the pages of the book rattled publishers as much as the advice framed, famously, in its title. In an era when the book business could still barely admit it was a business—let alone contemplate the overthrow of its 300-year-old business model—Abbie Hoffman's Steal This Book dared it to do both.

55. Your Spectrum 12 - Hacking Away & QL Affairs
Adds a platform to the First Landing allowing Willy to reach the cross and the hidden object.
http://www.users.globalnet.co.uk/~jimg/yr12/yr12_05.htm
Your Spectrum
Home
Contents KwikPik HACKING
AWAY
All the POKEs and more! Send your hacking hints to Andrew Pennell, Hacking Away, Your Spectrum, 14 Rathbone Place, London W1P 1DE.
Welcome to this month's hacking column - and have we got some strange POKEs for you! I'll start off with Mr Wimpy from Ocean. Peter Ball wrote in with POKE 33501,0 to skip the first screen, or alternatively you can POKE 33501 with a one or a two to make the game a little harder to complete. You can also POKE 33509 with the required number of lives (though beware of high numbers corrupting the screen display), or POKE 33693,0 for more straightforward infinite lives. You can also POKE 33721 with the number of peppers required, or POKE 43105 for unlimited peppers (this has to be one of the strangest POKEs ever!).
A couple of months ago I described the annoying aspect of Ultimate's loading programs, in that they include all the important bits in line number zero; this meant you had to duplicate the line to make them work. Well, I had loads of letters telling me that POKE 23756,1 changes it into line 1 (which I must admit I did know). Trouble is, it doesn't work if you've invested in an Interface 1 unit. Lucky (?) Interface 1 owners should resort to:
POKE (1+PEEK 23635+256'PEEK 23636),1

56. BBC News | SCI/TECH | Hacking With A Pringles Tube
Friday, 8 March, 2002, 0923 GMT hacking with a Pringles tube A crispcan is an effective tool for curious hackers, By Mark Ward
http://news.bbc.co.uk/hi/english/sci/tech/newsid_1860000/1860241.stm
CATEGORIES TV RADIO COMMUNICATE ... INDEX SEARCH You are in: Sci/Tech Front Page World UK ... AudioVideo
SERVICES Daily E-mail News Ticker Mobiles/PDAs Feedback ... Low Graphics Friday, 8 March, 2002, 09:23 GMT Hacking with a Pringles tube
A crisp can is an effective tool for curious hackers
By Mark Ward
BBC News Online technology correspondent Empty cans of Pringles crisps could be helping malicious hackers spot wireless networks that are open to attack. Security company i-sec has demonstrated that a directional antenna made with a Pringles can significantly improves the chances of finding the wireless computer networks being used in London's financial district. An informal survey carried out by i-sec using the homemade antenna has found that over two-thirds of networks were doing nothing to protect themselves. The security firm said all the companies at risk could easily thwart anyone that wanted to find and penetrate their network by making a few simple changes to the hardware used to build the wireless networks. Hack here In November last year BBC News Online was shown just how easy it is to find and gain information about wireless networks.

57. GameBoy Dev'rs - What's New?
Detailed information concerning the programming, modification, and hacking of Game Boy hardware.
http://www.devrs.com/gb/
Do you develop for other things? Devrs.com GameBoy Dev'rs http://www.devrs.com/ gb/ GameBoy Got info to post? Modify FAQs ... Search What's New? What's New? Jobs Jobs Apps Assemblers C Compilers GBCamera Compression ... Sound Asm Code Compression Games Graphics Macros ... Random #'s C Code Games Graphics Misc Sound Data Fonts Misc Docs FAQs Misc Patents Sound ... Tutorials Hardware Cart Writers Game Link GB/Cart Misc Links DemoArchives Discussion Misc
K:concept - Posted by: Keldon Alleyne
Basically notes I wrote up about animation and in game engines. If you don't understand it, feel free to send some e-mails.
Wristwatch Gameboy? Maybe! - Posted by: Samuel Daline
Online assembly running - Posted by: Keldon Alleyne
This is basically a tool to teach assembly language. It has an example set of instructions, and is basically used to teach the basics of assembly language. Requires IE :-)
GBCamC 1.0RC1 - Posted by: Vinicius Kursancew
GBCameraConvert is a program (4linux) that allows you to view and convert .sav files for the GB Camera. The Release Candidate 1 of gbcamc 1.0 fixes some bugs of 0.7 plus adds a GTK+ gui which allows preview and easy palette picking.
Tom Atom - Posted by: JuPiTeR
Tom Atom is our action RPG game. You can await six different weapons, tons of enemies including bosses, great graphics, dialogs with other characters and good time playing the game.

58. BBC News | SCI/TECH | Hacking: A History
A brief guide to the history of hacking from BBC News Online's internet reporterMark Ward. Wargames, a film that glamorises hacking, is released.
http://news.bbc.co.uk/hi/english/sci/tech/newsid_994000/994700.stm
low graphics version feedback help You are in: Sci/Tech Front Page World UK ... AudioVideo
Friday, 27 October, 2000, 17:57 GMT 18:57 UK Hacking: A history
The ILOVEYOU virus as victims saw it
By BBC News Online internet reporter Mark Ward Great hacks of our time The original meaning of the word "hack" was born at MIT, and originally meant an elegant, witty or inspired way of doing almost anything. Many early hacks took the form of elaborate practical jokes. In 1994, MIT students put a convincing replica of a campus police car on top of the Institute's Great Dome. Now the meaning has changed to become something of a portmanteau term associated with the breaking into or harming of any kind of computer or telecommunications system. Purists claim that those who break into computer systems should be properly called "crackers" and those targeting phones should be known as "phreaks". Arpanet, the forerunner of the internet, is founded. The first network has only four nodes. First e-mail program written by Ray Tomlinson and used on Arpanet which now has 64 nodes. John Draper, also known as Captain Crunch, finds that a toy whistle given away in the cereal with the same name could be used to mimic the 2600 hertz tones phone lines used to set up long distance calls.

59. Cornish Riding Holidays
A family run equestrian centre open all the year round for hacking, tuition and residential riding holidays, with up to fifty horses and ponies to suit all tastes and abilities.Redruth, Cornwall.
http://www.cornish-riding-holidays.co.uk
accommodation
location

holidays
Buller Hill, Redruth, Cornwall, TR16 6ST,
Contact Karen or Janet Dallimore on tel: (01209) 211852.
Home Location Holidays Accommodation

60. Computer Hacking And Ethics
Paper about developing ethics in teenage hackers.Category Computers hacking Ethics......Computer hacking and Ethics. Brian Harvey University of California,Berkeley A slightly different version of this paper was written
http://www.cs.berkeley.edu/~bh/hackers.html
Computer Hacking and Ethics
Brian Harvey
University of California, Berkeley [A slightly different version of this paper was written for the ``Panel on Hacking'' held by the Association for Computing Machinery in April, 1985. Thanks to Batya Friedman, Donn Parker, and Carter Sanders for their comments on early drafts.] [Neal Patrick] said he and his friends, who named themselves the ``414s'' after the Milwaukee area code, did not intend to do any damage and did not realize they were doing anything unethical or illegal. In fact, when asked [at a Congressional subcommittee hearing] at what point he questioned the ethics of his actions, he answered, ``Once the FBI knocked on the door.'' It's no secret that a mature sense of ethics is something a person develops over time. Parents are supposed to exercise authority over their children because the children are not expected to know how to make certain decisions for themselves. We have a juvenile court system separate from the adult criminal court system because we believe that a young person is not capable of criminal intent in the same sense that an adult is capable of it.

Page 3     41-60 of 186    Back | 1  | 2  | 3  | 4  | 5  | 6  | 7  | 8  | 9  | 10  | Next 20

free hit counter