Geometry.Net - the online learning center
Home  - Computer - Hacking

e99.com Bookstore
  
Images 
Newsgroups
Page 4     61-80 of 186    Back | 1  | 2  | 3  | 4  | 5  | 6  | 7  | 8  | 9  | 10  | Next 20

         Hacking:     more books (100)
  1. Handmade Electronic Music: The Art of Hardware Hacking by Nicolas Collins, 2009-04-13
  2. Hardware Hacking Projects for Geeks by Scott Fullam, 2003-11-01
  3. Professional Penetration Testing: Creating and Operating a Formal Hacking Lab by Thomas Wilhelm, 2009-08-28
  4. The Taming of Chance (Ideas in Context) by Ian Hacking, 1990-10-26
  5. Geek House: 10 Hardware Hacking Projects for Around Home (ExtremeTech) by Barry Press, Marcia Press, 2005-05-06
  6. Network Intrusion Alert: An Ethical Hacking Guide to Intrusion Detection by Ankit Fadia, 2007-06-12
  7. Hacking Exposed Web 2.0: Web 2.0 Security Secrets and Solutions by Rich Cannings, Himanshu Dwivedi, et all 2007-12-17
  8. Hacking Mac OS X Tiger : Serious Hacks, Mods and Customizations by Scott Knaster, 2005-07-14
  9. Representing and Intervening: Introductory Topics in the Philosophy of Natural Science by Ian Hacking, 1983-11-25
  10. Hacking Video Game Consoles: Turn your old video game systems into awesome new portables (ExtremeTech) by Benjamin Heckendorn, 2005-02-18
  11. Hacking Matter: Levitating Chairs, Quantum Mirages, and the Infinite Weirdness of Programmable Atoms by Wil Mccarthy, 2004-04-14
  12. Historical Ontology by Ian Hacking, 2004-09-15
  13. Hacking Google Maps and Google Earth (ExtremeTech) by Martin C. Brown, 2006-07-24
  14. The Unofficial Guide to Ethical Hacking by Ankit Fadia, 2005-09-13

61. Hacking Log 2.0
hacking Log 2.0. Googlespace, XML, hacking Log 2.0. 20030214 Friday February14, 2003. US to UN Do what we say or you're an irrelevant debating society.
http://www.freeroller.net/page/acoliver

62. Test Page For Apache Installation
Hvad er hacking? Hvad er hacking.dk? hacking.dk er hjemsted for en række af de projekterjeg arbejder med når jeg udøver den ædle kunst beskrevet ovenover.
http://hacking.dk/index
If you can see this, it means that the installation of the Apache web server software on this system was successful. You may now add content to this directory and replace this page.
Seeing this instead of the website you expected?
This page is here because the site administrator has changed the configuration of this web server. Please contact the person responsible for maintaining this server with questions. The Apache Software Foundation, which wrote the web server software this site administrator is using, has nothing to do with maintaining this site and cannot help resolve configuration issues. The Apache documentation has been included with this distribution. You are free to use the image below on an Apache-powered web server. Thanks for using Apache!

63. Hacking Movies Top Ten
Top ten mainstream films related to computer hacking.
http://www.btinternet.com/~ianmaxwelljones1/
Hacking Movies Top Ten
This is the best of the 'hacksploitation' movies that currently exist. Most of them are now available on DVD/Video. They are not in any particular order because they are incomparable.
Enjoy….
TOP TEN
HACKERS
Unrealistic but great fun. Probably annoying if you know much about real hacking/cracking.
ANTITRUST
Look out Bill Gates! This is a tight cyber-thriller that was criminally undersold. Give it a try, you won't be sorry!
ENEMY OF THE STATE
Very stylish and very entertaining. Will Smith has rarely been better. This film will leave you out of breath!
THE MATRIX No explanation needed, if you don't own this movie then ask yourself this questionwhat is the matrix? THE NET A little dated in this fast moving world of computers but nonetheless great fin and a must for fans of Sandra Bullock. WARGAMES The original 'daddy' of cyber/hacking movies. Back in the days when audiences were amazed that you could connect a computer TRON Very ahead of its time. Totally stunning animation/effects. Tron 2.0 in pre-production so stay tuned. CYBER@TAQUE (AKA TAKEDOWN) Still unreleased in the English speaking world but available in France, Denmark and Iceland!! (French version has English audio option) This is the fictionalised story of Kevin Mitnickthe

64. Audreyhacking.com :: Hacking The Audrey
hacking the Audrey, Buy Audreyhacking.com Gear. Show your Audrey hacking pridewith some audrey hacking gear. Check out our action shots. Update Server.
http://www.audreyhacking.com/
@import url("themes/Korporate/style/style.css"); Hacking the Audrey Main Menu Home
Your Account

Submit News

Live Chat
...
Files

Support Us:
Supported Links Buy a Link Now
Who's online There is currently 1 guest and members online
You are not logged on
Recent Forum Activity
  • Re: Hey people!!!
  • Re: Audrey to control AudioTron?
  • Network Hotsync
  • Audrey Flash Upgrade ...
  • Re: Turning off auto power off? vist the forum
    Buy Audreyhacking.com Gear Show your Audrey Hacking pride with some audrey hacking gear. Check out our action shots Update Server Spoof's Linux Marimba server at: http://2-1b.artoo.net Audrey Special Links Viewable only from Audrey
  • Scheduled tasks Primary timeserver System profile Open shell
  • Led Controls Solid Blin k Off Information Produced and hosted by NaTa2.com If you wish to advertise on this site, please email info@nata2.com This is probably the weirdest site on the internet. Hacking the Audrey This site will discuss hacking and exploitation of the Ergo Audrey. The audrey is an internet appliance developed to fill the void between the desktop and the Palm. Running QNX with PalmOS extensions it is ripe to be hacked and used for all sorts of interesting things. For more information check out

    65. Secureroot.com - Computer Security Resource
    Web directory and search engine dedicated to computer security, hacking, phreaking, encryption, anonymity and cyberculture.
    http://www.secureroot.com/
    advisories exploits discussions news ... security tools main menu feedback
    advertising

    privacy

    FightAIDS
    ...
    news

    discussions read forum
    new topic

    search

    meetings meetings list
    recent additions

    add your info
    top 100 sites visit top sites sign up now members webmasters add your url add domain search box link to us projects our projects free email m4d network medialeech secureroot m4d.com Search for: over 15,000 urls indexed add url contact us search box Anarchy Organizations, files, texts and other materials devoted to anarchy Anonymity Re-mailers, tools, proxies and information regarding anonymity Articles Articles about hackers, computer security... Attacks Denial of service attacks, nuking and spamming Books Books devoted to computer security, hacking and underground Cyberlaw Organizations, cyber crimes, computer espionage, interesting cases and etc

    66. The Register
    Is the RIAA hacking you back ? By Andrew Orlowski in San FranciscoPosted 14/01/2003 at 0029 GMT The RIAA is preparing to infect
    http://www.theregister.co.uk/content/6/28842.html
    18 March 2003
    Updated: 10:06 GMT
    Register Services Register ISP Reg Jobsearch Reg Merchandise IT-minds bookstore Sections Front Page Software Enterprise Systems Servers ... Contact us The Reg Newsletter
    Enter your email address here for our daily news update.
    Get the Reg Screensaver.

    Join the Reg SETI group.

    Join Reg Cancerbusters.
    Is the RIAA "hacking you back"? By Andrew Orlowski in San Francisco Posted: 14/01/2003 at 00:29 GMT
    The RIAA is preparing to infect MP3 files in order to audit and eventually disable file swapping, according to a startling claim by hacker group Gobbles. In a posting to the Bugtraq mailing list, Gobbles himself claims to have offered his code to the RIAA, creating a monitoring "hydra".
    "Several months ago, GOBBLES Security was recruited by the RIAA (riaa.org) to invent, create, and finally deploy the future of antipiracy tools. We focused on creating virii/worm hybrids to infect and spread over p2p nets," writes Gobbles.
    "Until we became RIAA contracters [sic], the best they could do was to passively monitor traffic. Our contributions to the RIAA have given them the power to actively control the majority of hosts using these networks."
    Gobbles claims that when a peer to peer host is infected, it catalogs media and sends the information "back to the RIAA headquarters (through specifically crafter requests over the p2p networks) where it is added to their records", and also propagates the exploit to other nodes.

    67. HackingSalta.8k.com
    Herramientas y textos descargables.
    http://hackingsalta.8k.com/
    Free Web site hosting - Freeservers.com Free Web site hosting - Freeservers.com

    68. The Register
    Bloomberg extortion, hacking case opens in New York By John Leyden Posted 06/02/2003at 1431 GMT The trial of a Kazakhstan man accused of attempting to
    http://www.theregister.co.uk/content/55/29218.html
    18 March 2003
    Updated: 09:37 GMT
    Register Services Register ISP Reg Jobsearch Reg Merchandise IT-minds bookstore Sections Front Page Software Enterprise Systems Servers ... Contact us The Reg Newsletter
    Enter your email address here for our daily news update.
    Get the Reg Screensaver.

    Join the Reg SETI group.

    Join Reg Cancerbusters.
    Bloomberg extortion, hacking case opens in New York By John Leyden Posted: 06/02/2003 at 14:31 GMT
    The trial of a Kazakhstan man accused of attempting to extort $200,000 from the founder of the Bloomberg financial news service began New York this week.
    Oleg Zezov, 29, allegedly hacked into Bloomberg's computer system, then emailed Bloomberg founder Michael Bloomberg threatening that the financial news service's reputation would be put at risk if he wasn't paid. The alleged threat was made in March 2000, prior to Bloomberg's election as New York's mayor.
    Assistant US Attorney Robert Strang told the court that within weeks of his initial contact, Zezov was demanding that $200,000 be sent to an offshore bank account in exchange for telling Bloomberg how he was able to crack into his company's computer system.
    After receiving this threat, Bloomberg contacted the FBI and arranged to meet Zezov and alleged accomplice Igor Yarimika in London, where the pair was arrested in an FBI sting operation. The two men were subsequently extradited from the UK to face trial in the US.

    69. Untitled Document
    Raccolta di una grande quantit  di pubblicazioni mondiali di hacking.
    http://hackerzine.interfree.it/

    70. Underground: Hacking, Madness And Obsession On The Electronic Frontier
    Underground hacking, madness and obsession on the electronic frontier by SueletteDreyfus. Tales of hacking, madness and obsession on the electronic frontier.
    http://www.underground-book.com/
    Tales of hacking, madness and obsession on the electronic frontier
    `Gripping, eminently readable.. Dreyfus has uncovered one of this country's best kept secrets and in doing so has created a highly intense and enjoyable read' Rolling Stone
    `Underground' by Suelette Dreyfus
    with research by Julian Assange
    475 pages with bibliography
    ISBN: 1 86330 595 5
    RRP $21.90 AUD (approx. $12 USD)
    Published June 1997 by Random House Australia
    About Underground
    What the Critics say
    What the Readers Say (1997 edition)
    What the Readers Say (2001 edition) ...
    Related articles by the Author
    `Keeps the reader glued to the page' Danny Yee, Danny Yee's review of books

    71. Computeruz.tk
    Publicaţie lunară, articole despre hacking, telefoane mobile, linux, windows, probleme hard şi soft.
    http://computeruz.tk/

    72. How To Modify A Servo
    hacking a Servo by Kevin Ross. Whets a Servo? A Servo is a small devicethat has an output shaft. This shaft can be positioned to
    http://www.rdrop.com/~marvin/explore/servhack.htm

    73. Nethacker.de - Back To The R00ts
    Informationen zu den Themen hacking und Sicherheit. Angeboten werden u.a. Texte, Tools, eine Linksammlung, ein Diskussionforum sowie ein Chatroom.
    http://www.nethacker.de
    n e t h a c k e r d e c o m i n g s o o n http://www.whitehouse.org/initiatives/purity/index.asp /*no comment*/

    74. Kernel Hacking: An Introduction To Linux Kernel Programming
    A new kernelhackingHOWTO.Category Computers Software Operating Systems Linux Kernel...... Why no updates for so long? I've been taking a bit of a break fromkernel hacking recently and doing some music using Fruityloops.
    http://www.kernelhacking.org/
    Welcome!
    Welcome to this Linux kernel programming resource! The aim of this site is to: If you would like to keep up to date with the latest developments (site and HOWTO updates), please subscribe to the announce only mailing list Although most of the information on the site is aimed at Linux users, a fair amount should be transferable to other open source operating systems. Feedback is very welcome; send all comments/suggestions to author (remove numbers from address). Use this public key. Thankyou to UKLINUX for hosting this site.
    News
    19th April 2002 We now have an announce only mailing list . If you would like to be informed when the HOWTO is updated, please subscribe to this list. 11th April 2002 HOWTO updated; largely typos, gramatical corrections. Currently I am reviewing the structure, content and aims of the document as a whole. If you are particularly interested in the development of the document I would appreciate feedback and suggestions. 27th March 2002 I'm looking for people to help out with the HOWTO; it will never get finished if I am left on my own. I also need feedback on the document, even if you can't see anything wrong with it. I'm in danger of losing all motivation to continue working on it; so if you find it helpful please let me know.

    75. Welcome To HackFurby.com! - Site News
    Another Furby hacking site, and free email forwarding as well.
    http://www.hackfurby.com/
    Home Secrets Protocol Schematic Rebuild HackFurby Alias HACKFURBY.COM
    Quick Links: Contact: furby@hackfurby.com
    Welcome to HackFurby.com
    This site is designed to be the central location on the Internet for any and all Furby-hacking related stories. Whether you found a new sequence of petting and shakes that makes him do the Chicken Dance or you've discovered that Furby runs on fusion, we'll post it here, for all to read. Recent News:
    • May 9, 2000: Wow, a lot of people have been writing to me, wondering the status of Buck the Hacked Furby , and I haven't been able to give a good answer... So here's my quick update, just so everybody knows the score. I really will try to get some more info up, as I have a bunch of it: Just not the time... Buck has been completely rebuilt and reassembled, and looks pretty normal, except for four sets of wires coming out his back (servo 1, 2, 3, and speaker). I wrote a quick app in Visual Basic that takes a .wav file (which you provide) and syncs it with motion/time commands (which you write in a horribly manual process into a text file) which are sent via the serial port of your computer to the serial servo control (SSC) board that I bought for about $50. The result is a furby that talks like yoda, or whatever you want (That's what I did, at least).
      I do plan on releasing the code to do this, but there's no way I'm going to release Visual Basic code into the world. If I can stop just one person in this world from using VB, it'll be worth it. I may release a binary of the program at some point, though. The only problem is that I no longer have VB installed on my system, and I don't plan on reinstalling it... I'm doing some work with java serial controls, so I may do a port at some point, and then everyone will be happy.

    76. Hacking Food
    hacking Food. Which brings me to the hacking Food recipe of the week Chow Meinfor 200. 15 lb. meat (beef, veal, pork) 30 lb. coarsely chopped onions 30 lb.
    http://clark.dallas.tx.us/
    Hacking Food
    Wherein the author a mostly underemployed writer writes about his food adventures: from reading MFK Fisher to perfecting spaghetti aglio y olio March 2003 Sun Mon Tue Wed Thu Fri Sat Search Search this site:
    Archives November 2002
    October 2002

    Recent Entries Of Picadillo con Papitas Fritas
    Of Feeding a Crowd, Or: A Boy Who Loved Eggrolls

    Of Food Not Known, Or: You Ordered What?

    Of Repurposed Content
    ...
    Of Overcooked Pasta and the Brevity of Life

    Links Looka Monkeyfist
    Syndicate this site (XML)
    Powered by
    Movable Type 2.63

    77. Hacking And Hackers - Computer Security Programs Downloading Search Engines Port
    Comprehensive directory of security and hacking articles, links, downloads, FAQs, tools, utilities, virus, antivirus, trojans, cellular, phreaking, physical security, tutorials, telecommunications, and daily security news.
    http://www.prognosisx.com/infosyssec/
    security security news virus news hacking news hacker trojan underground headlines newsticker security news antivirus exploit denial of service DDoS advisories trojan backdoor sniffer smurfwindows securityXP security security products security books security tips security faq authentication computer security crack crackers crash cryptography denial of service DOS email virus alerts encrypting file system encryption exploits firewall firewalls hack hacks hack files hack links hacked webpages hacker hackers hacking hacking files hacking links hot fixes icmp intruder intrusion detection news ip spoof Kerberos key logger logon microsoft security NT nt security nt server ntsecurity ntshop password password crackers patches permssions phreaking boxes port monitors proxy proxy servers secure security security news security firewalls cryptography vulnerabilities vulnerability news encrypting file system hotfixes authentication password permissions proxy servers antivirus virus system policies smart cards smart cards source route spoofing syn flood system policies texts virii virus viruses vulnerabilities vulnerability wardialers win2k sec win2k security win2k sec windows 2000 security windows 2000 windows windows NT windows nt security

    78. An Interview On Hacking And Denial Of Service Attacks With Brian Martin And Davi
    An interview on hacking and denial of service attacks with Brian Martin and David Dittrich. Available Category Computers Internet Abuse Denial of Service......hacking the DoS Attacks. Interview by Brian S. McWilliams, PCradio.com,February 22, 2000. The recent denial of service attacks on
    http://www.pc-radio.com/otr/hacking.html
    Hacking the DoS Attacks Interview by Brian S. McWilliams , PC-radio.com, February 22, 2000 The recent denial of service attacks on several major Web sites are being termed a "wake-up call" for Internet security. But many experts have been ringing the alarm for months, trying to convince Netizens of the dangers that a few poorly secured systems can present to the network as a whole. In this interview, DoS expert David Dittrich and security expert/hacker Brian Martin (aka Jericho) debug the attacks, the reaction by victims, the media coverage, the Feds' response, and the prospects for securing the Net in the future. Dittrich , a software engineer and consultant for the University of Washington, says the number of vulnerable systems will only increase as new holes are discovered and more systems are connected to the Net. Martin , one of the operators of the Attrition hacking information site, argues that the individuals who attacked Yahoo, eBay, and other popular sites don't deserve to use the title hacker, and calls for stronger laws against Internet crime will not deter them.

    79. Freaks Macintosh Archive Mac Hacks Hacking Exploits Mac Hackers Warez Internet S
    Largest Macintosh (Hackintosh) security and hacking related site for the MacOS.
    http://freaky.staticusers.net/
    HACKINTOSH CDROM
    About Us
    Why do we do this?

    Who Am I?

    Contact Freak

    Freaks Mac Archives

    Site of the Week:
    Art of Deception

    Archives
    Newest Files

    America Online
    BBS Cracking ... XXX Site Related Site Updates Site Search Net Linked BBS rc5 Cracking Team ... Promotions Newest Files America Online BBS Cracking Denial of Service Faqs and Texts Internet Tools Network Tools Programming Security Viruses XXX Static- News: Updates and News: 5.07.2002 - Just visited CellPhoneHacks.com - I like this site there are lots of help and messages about Hacking Cell Phones changing logos, along with hardware hacking and more. Amazon.com Toll Free # 18002017575 08/29/2001 Welp it was just my birthday a few days ago! Had a great time. Check this out, all the updates are on the newest file page. HERE always the newest files, when it gets too long we make a previous update page. which i will probably do tonight. Why the delay in the update? well its pretty simple. No time, many of my other projects have used all my time. When I do the site I want to do it right. It took forever to compile this site but its here. Now it is time for a new site. (: Special thanks go out to the programmers for the macintosh that make this site possible. Like Weasel Enterprises we do support banners. Thanks to all the people that are making this site possible and to the staff of Freak's Macintosh Archives

    80. Barleyfields Equestrian Centre - Home
    Established in 1994, this BHS approved center offers a riding education for students wishing to train for BHS Exams and NVQ Awards. Lessons for all levels and all ages, livery yard, cross country schooling and pleasure hacking in the beautiful countryside of Derby in England.
    http://www.barleyfields.com/
    Barleyfields Equestrian Centre
    Ash Lane
    Etwall
    Derby
    Barleyfields is a purpose built riding school and livery yard, now nine years old. We are British Horse Society approved and are also recommended by them as a "Where to Train" centre for students wishing to train for BHS Exams and NVQ Awards. We are a friendly, down to earth centre, from providing lessons for complete beginners up to quite advanced competition, we cater for all levels. For ALL ages - children and adults - ages 4 to 74+!!! We have a large selection of friendly horses and ponies to suit every standard. There are five fully qualified members of staff - 4 BHSAI and 1 BHSII. The beautiful Derbyshire countryside makes hacking pleasant all year round, with all day "pub hacks" every bank holiday Monday. We also have a Saddlery Shop selling all clothing and tack required for the job!! Facilities available Large Indoor Arena 60m x 25m with viewing gallery, drinks, snacks and toilet.

    Page 4     61-80 of 186    Back | 1  | 2  | 3  | 4  | 5  | 6  | 7  | 8  | 9  | 10  | Next 20

    free hit counter