MD Community Page: Hacking MiniDisc hacking. For those interested in going beyond the normal Slink CAV1interface details A website describes hacking Sony s Slink CAV-1 http://www.minidisc.org/part_hacking.html
Perl.com: Hacking Perl In Nightclubs By editing Perl programs onthe-fly, in real-time, Alex Mclean is producing somereally interesting computer music. He talks about how it all works. http://www.perl.com/pub/a/2004/08/31/livecode.html
Extractions: August 31, 2004 I've found the experiences of dancing and programming to have a great deal in common. With both I am immersed in an abstract world of animated structures, building up and breaking down many times before finally reaching a conclusion. Indeed, when the operation of even the dullest data-munging computer program is visualized, for example in a debugger, it does seem to be dancing around its loops and conditions moving in patterns through time. In other words, a musical score is a kind of source code, and a musical performance is a kind of running program. When you play from a musical score or run a program you are bringing instructions to life. So a piece of composed music is like a Perl script, but let's not forget improvised music. The rules behind improvised music for example improvised jazz develop during a performance, perhaps with little or no predefined plan. Where is the comparison with code here? Well, how many times have you sat down to write some Perl without first deciding exactly how you were going to structure it? Perl is great for improvising. The question is, can you write improvised Perl scripts on stage? This article hopes to answer this question.
Mac OS X Hacking Tools Amit, Singh, Amit Singh, Art, Computer Art, Drawing, Painting, Sketching, OilPainting, Crayons, Pastels, Pencil Colors, Audi, TT, Roadster, Quattro, Empeg, http://www.kernelthread.com/mac/osx/tools.html
Extractions: Art Comic Fine Arts Mouse Automotive Audi TT Motorcycling Computing Apple Hanoimania Obfuscation OS ... Publications About Blog Forums Home The Jargon File is a popular lexicographic resource amongst hackers (and non-hackers too). Although it might have some subjective definitions I may not agree with, I have conveniently quoted verbatim the definitions of the terms "hacker" and "tool" as a preface to the contents of this page. hacker more tool n.
Extractions: Svenska T Men det hade vi ingen aning om 1986. Då var det bara företag som hade råd med PC, om de nu inte köpte MAC, vilken helt behärskade marknaden för "seriösa" applikationer. Vi andra köpte oss C64 eller Spectrum. Senare var det Amiga och ST som gällde. Nummer Torsten N var lm=document.lastModified; document.write(""+"Senast ändrad: "+lm+"");
CVS Log For Libtool/libtool/HACKING Score List hacking Lessons Learned by Cheating Your Way to Number Score List hacking Lessons Learned by Cheating Your Way to Number One, Part 1 of 2.By Seth Fogie. Date Jul 29, 2005. Save Discuss Print Email http://savannah.gnu.org/cgi-bin/viewcvs/libtool/libtool/HACKING
Extractions: Diff to previous 1.18 * libltdl/m4/ltdl.m4 (LT_WITH_LTDL, LTDL_CONVENIENCE) (LTDL_INSTALLABLE): Use less quoting for expanded LIBLTDL, LTDLINCL. Use m4_default instead of m4_if, to work around AU_ALIAS bug with empty macro arguments. (LTDL_INIT): Likewise. * libltdl/m4/ltoptions.m4 (_LT_WITH_PIC): Likewise. * TODO, HACKING: Updated. Revision (view) annotate [select for diffs] Mon Aug 8 06:48:06 2005 UTC (5 weeks, 4 days ago) by rwild
SecurityRisk :: Index Many topics and threads about Vulnerabilities, hacking, Phreaking, and programming. Informative and active. http://securityrisk.org/index.php
Google Hacking Mini-Guide Google hacking MiniGuide. By Johnny Long. Date May 7, 2004. Save Discuss Print E-mail 2. Google hacking Techniques Next Section http://www.informit.com/articles/article.asp?p=170880
XML.com: Hacking Open Office Peter Sefton shows us how to use XML tools to hack Open Office file formats. http://www.xml.com/pub/a/2005/01/26/hacking-ooo.html
Extractions: If you are using any word processor or editor in a group situation, such as a technical writing team, or an office, then it will probably be in your interest to set up templates for authors to use to ensure consistency, reduce effort, and help automate conversation of documents between formats, such as building web pages from office documents. If you are also trying to store and manipulate content in XML but want to use a word processing environment for authoring, then well-crafted templates are even more important. In this article, I'm going to explore some of the ways that
HK -=[Hacker Kulture]=- Propone una biblioteca virtuale dedicata alla storia dell'hacking a partire dal cyberpunk. http://www.dvara.net/HK/
Extractions: "Chi accetta realisticamente una trasformazione che è regresso e degradazione, vuol dire che non ama chi subisce tale regresso e degradazione, cioè gli uomini in carne ed ossa che lo circondano. Chi invece protesta con tutta la sua forza, anche sentimentale, contro il regresso e la degradazione, vuol dire che ama quegli uomini in carne ed ossa. Amore che io ho la disgrazia di sentire, e che spero di comunicare anche a te".
Hacking The Library Kendall Clark tries to figure out if he can make the librarians and the geekshappy at the same time. http://www.xml.com/pub/at/30
Longwood Equestrian Centre - Showjumping, Dressage, Showing, Riding School Established for over 30 years as a competition centre and BHS Approved riding school. Lessons for beginners to advanced riders, weekly shows and events, and crosscountry hacking. Situated in Essex in the south east of England. http://www.longwoodec.co.uk/
Extractions: September 2005 Friday 2nd September Evening Trailblazers Dressage Sunday 4th September Trailblazers S/J Friday 9th September Evening Trailblazers S/J Friday 16th September Evening Trailblazers Dressage Sunday 18th September Senior BSJA Saturday 24th September Junior BSJA Sunday 25th September Junior BSJA Friday 30th September Evening Trailblazers S/J October 2005 Sunday 2nd October Senior BSJA Saturday 8th October Barnsby Dressage Sunday 9th October Barnsby S/J Friday 14th October Evening Trailblazers S/J Saturday 15th October Junior BSJA Sunday 16th October Junior BSJA Friday 21st October Evening Trailblazers Dressage Sunday 23rd October Showing Wednesday 26th October Fun Show S/J Friday 28th October Evening Trailblazers S/J Sunday 30th October Trailblazers S/J
Slashdot | Hacking The Fluorescent Light hacking the Fluorescent Light article related to Technology and Science. http://science.slashdot.org/article.pl?sid=05/08/06/139200&from=rss
Slashdot | Infosec Career Hacking Infosec Career hacking article related to Book Reviews, Security, and Businesses. http://books.slashdot.org/article.pl?sid=05/08/08/192221&from=rss
Extractions: var keyword="be/li/hacking"; var extra="nl"; metriwebTag ("start", keyword, extra); Populaire links over hacking hack cracking crack cracks crackz hacken groups group groep groepen beveiliging beveiligingen anti-hack anti-hacking antihack antihacking beveilig beveiligd beveiliging emulatie emulator emulators emulatorz phreak phreakin phreaking hackers hackers hackerz bluebox blackbox redbox box boxes telephone telefoon tapping into hack of security secured security breach zoekmachine zoekmachines search engine search engines serial serials serials software softwares softwarez wares warez apps applications appz games gamez programma's programmas spelletjes spelletje spel spelen zaterdag: 17 september 2005 hacking.start.be Altavista Ask Jeeves Astalavista Dogpile Excite Google Hotbot Yahoo of ga naar zoek.start.be zoekafrika.start.be zoekazie.start.be zoekeuropa.start.be zoekoceanie.start.be
Hacking The Atari Flashback 2 Console - Cartridge Port Mod Well then, here are the basic details to help assist you in hacking/modding yourconsole into a full fledged Atari 2600 system that can use your original http://www.atarimuseum.com/fb2hacks/
Extractions: So, you've decided to take your Atari Flashback 2 console to the next level? Well then, here are the basic details to help assist you in hacking/modding your console into a full fledged Atari 2600 system that can use your original cartridges. Okay, first things first, lets get a few things out of the way: Upon breaking the warranty tamper and/or Product ID label you have voided your warranty and the unit is now in your hands, no returns... Secondly and even more important - you do the hacks/mods at your own risk , I am not responsible for damage to you, your console, or anything else within a 100 mile radius that may be directly or indirectly leveled, incinerated or otherwise obliterated to the ground (or neighboring country) by your degree of skill (or here-in lack of) with electronics, test equipment, soldering irons or chewing gum (not all necessarily used at the same time.) ENTER... If you Dare!
Computer Hacking New Tool Of Political Activism Ruffin is among a growing group of outlaw programmers determined to make hacking more than job interviewing as an extreme sport. They are beginning to experiment with the mindblowing skill locked in the global network of hackers as a powerful political tool for what Ruffin calls 'human rights hacking.' Toronto Star http://www.gis.net/~cht/torontostar.html
Extractions: But Ruffin is among a growing group of outlaw programmers determined to make hacking more than job interviewing as an extreme sport. They are beginning to experiment with the mind-blowing skill locked in the global network of hackers as a powerful political tool for what Ruffin calls "human rights hacking."