Geometry.Net - the online learning center
Home  - Book_Author - Hackers The
e99.com Bookstore
  
Images 
Newsgroups
Page 2     21-40 of 201    Back | 1  | 2  | 3  | 4  | 5  | 6  | 7  | 8  | 9  | 10  | 11  | Next 20
A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

         Hackers The:     more books (99)
  1. The Database Hacker's Handbook: Defending Database Servers by David Litchfield, Chris Anley, et all 2005-07-14
  2. The Hacker Diaries : Confessions of Teenage Hackers by Dan Verton, 2002-03-26
  3. The Downhill Lie: A Hacker's Return to a Ruinous Sport (Vintage) by Carl Hiaasen, 2009-05-05
  4. The Mac Hacker's Handbook by Charles Miller, Dino Dai Zovi, 2009-03-03
  5. Certified Ethical Hacker Exam Prep by Michael Gregg, 2006-04-17
  6. The Best of 2600: A Hacker Odyssey by Emmanuel Goldstein, 2008-07-28
  7. Developmental Exercises to Accompany Rules for Writers by Diana Hacker, 2007-10-15
  8. The Ultimate Pipe Book by Richard Carleton Hacker, 1989-09
  9. Off Center: The Republican Revolution and the Erosion of American Democracy; With a new Afterword by Professor Jacob S. Hacker, Professor Paul Pierson, 2006-09-26
  10. Developmental Exercises to Accompany A Writer's Reference by Diana Hacker, 2006-12-06
  11. A Hacker Manifesto by McKenzie Wark, 2004-10-04
  12. Love, Death, and the Changing of the Seasons by Marilyn Hacker, 1995-03-17
  13. Hackers: Heroes of the Computer Revolution by StevenLevy, Steven Levy, 2000-12-31
  14. The Bedford Handbook by Diana Hacker, 2010-06

21. Hackers And Painters
What Hackers and painters have in common is that they re both makers. Along withcomposers, architects, and writers, what Hackers and painters are trying to
http://www.paulgraham.com/hp.html
May 2003
(This essay is derived from a guest lecture at Harvard, which incorporated an earlier talk at Northeastern.)
When I finished grad school in computer science I went to art school to study painting. A lot of people seemed surprised that someone interested in computers would also be interested in painting. They seemed to think that hacking and painting were very different kinds of work that hacking was cold, precise, and methodical, and that painting was the frenzied expression of some primal urge.
Both of these images are wrong. Hacking and painting have a lot in common. In fact, of all the different types of people I've known, hackers and painters are among the most alike.
What hackers and painters have in common is that they're both makers. Along with composers, architects, and writers, what hackers and painters are trying to do is make good things. They're not doing research per se, though if in the course of trying to make good things they discover some new technique, so much the better.
I've never liked the term "computer science." The main reason I don't like it is that there's no such thing. Computer science is a grab bag of tenuously related areas thrown together by an accident of history, like Yugoslavia. At one end you have people who are really mathematicians, but call what they're doing computer science so they can get DARPA grants. In the middle you have people working on something like the natural history of computers studying the behavior of algorithms for routing data through networks, for example. And then at the other extreme you have the hackers, who are trying to write interesting software, and for whom computers are just a medium of expression, as concrete is for architects or paint for painters. It's as if mathematicians, physicists, and architects all had to be in the same department.

22. CNN - Hackers Target More Federal Computers - June 1, 1999
CNN
http://www.cnn.com/TECH/computing/9906/01/hackers/index.html

MAIN PAGE
WORLD ASIANOW U.S. ... news quiz
CNN WEB SITES: TIME INC. SITES: Go To ... Time.com People Money Fortune EW MORE SERVICES: video on demand video archive audio on demand news email services ...
pagenet

DISCUSSION: message boards chat feedback
SITE GUIDES: help contents search
FASTER ACCESS: europe japan
WEB SERVICES:
Main Page
Bracing for Cyberwar Hacking Primer Scenes from the 'Hacker Underground' ... Related Sites
Hackers target more federal computers
Threat: 'Hit them where it hurts'
June 1, 1999

Web posted at: 5:02 a.m. EDT (0902 GMT)
WASHINGTON (CNN) Computer hackers are vowing to attack more government sites on the Internet, because of an FBI investigation. Hackers defaced a Web page on Monday within the Interior Department and a site run by a federal supercomputer laboratory in Idaho Falls, Idaho, claiming "It's our turn to hit them where it hurts."
  • Bracing for Cyberwar
  • Hacking Primer
  • Hacking: Two Views
  • Timeline ...
  • Related Sites Last week, hackers defaced the U.S. Senate Web site, causing it to be taken offline until the weekend. The FBI also was forced to take down its own Internet site last week after hackers launched an electronic attack against it. It remained inaccessible Monday, along with the Web site for its National Infrastructure Protection Center, which helps investigate computer crimes.
  • 23. Chinese Hackers Warn Of Attacks On U.S. Web Sites
    CNN
    http://cnn.com/2001/TECH/internet/05/01/china.usa.hackers.reut/index.html

    24. Old And New Hacker Ethics
    Is there a Hacker Ethic for 90s Hackers?
    http://www.fiu.edu/~mizrachs/hackethic.html
    Is there a Hacker Ethic for 90s Hackers?
    by Steven Mizrach
    Introduction
    The goal of this text analysis project was to take the texts of the computer underground and to analyze them for the presence of a) knowledge about the Hacker Ethic and b) evolution of that Ethic. Many writers, such as Steven Levy, bemoan the fact that modern-day hackers (the computer underground) are not worthy of the name because they do not live up to the principles of the original Hacker Ethic, and as unethical individuals, should simply be called "computer terrorists" or "juvenile delinquents." I sought to examine whether 90s new hackers knew of the old Hacker Ethic, if they had added anything to it, and the reasons why they felt they acted differently from their predecessors. I broadened my text analysis to look at what they saw as ethical violations, and reasons why some might repudiate the Hacker Ethic or the idea of having an ethic. As my text project evolved, I found that after discovering the existence of a new hacker ethic for new hackers, I was wondering if people expressing the principles of the new ethic also expressed the old. I expected that the adoption of a new set of ethics would not necessarily mean the complete abandonment of the old. This would establish some continuity between both groups of hackers, and some familiarity by new hackers with the old ideals. If the hypothesis of continuity turns out to be true, then new hackers are not as different from old hackers as authors like Levy (or certain computer security professionals) might claim. They would then not only have their own ethics, but also utilize some ethical principles of their predecessors.

    25. Hoylake Hackers Homepage
    Based in Cheshire UK. Includes team scores, individual scores, pictures, and player details.
    http://www.hoylakehackers.org.uk
    Pen pictures of the Stars
    Player Details
    Send an email

    Handicaps

    Last updated 23rd July 2005
    Holiday pics

    Serious stuff
    Home course details

    Portugal golf stats

    British Open 2006

    Handy handicap calculator
    ... Friends' page
    Contact Ryder Cup 2006 Views round home course

    26. TLC :: Hackers: Computer Outlaws
    Enter the minds of computer hacking pioneers to learn why hacking began and howit has contributed to technologies taken for granted today.
    http://tlc.discovery.com/convergence/hackers/hackers.html
    var oasPositionArray = "x21,x24,TopLeft,Top3,x29,x12"; OAS_RICH("TopLeft");
    September 10, 2005 Hacking 101 Hackers' Hall of Fame
    Check out the inductees and get updates on all the current members. The Lingo of Hackerdom
    Do you know the difference between a hacker and a cracker? Find out here! Hacker History A Brief History of Hacking
    Follow the hackers' trail, from early phone company cheats to the Love Bug. Hacker Hoaxes
    Many notorious hacks were not feats of programming, but psychological ploys. On TV Sorry, you missed Hackers: Outlaws and Angels on TLC, but you can still check our TV schedule for similar programming. Cyber Defense Cyber Terrorism
    Go inside the electronic front of the war on terrorism. Hacker Psych 101
    Who are hackers, and what makes them tick? Defense Methods
    You have to think like a hacker to stop a hacker attack. Your Opinion What do you think is the biggest hack of all time? Cast Your Vote! Advertisement
    By visiting this site, you agree to the terms and conditions
    of our Visitor Agreement . Please read. 2005 Discovery Communications Inc.

    27. CNN - Technology - Clinton Fights Hackers, With A Hacker - February 14, 2000
    CNN
    http://www.cnn.com/2000/TECH/computing/02/15/hacker.security/index.html
    computing Editions myCNN Video ... Feedback
    CNN Sites CNN CNN Europe CNNfn CNNSI myCNN CNNfyi AllPolitics Languages
    Search
    CNN.com CNNSI.com CNNfn.com The Web
    TECHNOLOGY

    TOP STORIES
    Consumer group: Online privacy protections fall short

    Guide to a wired Super Bowl

    Debate opens on making e-commerce law consistent

    MORE

    TOP STORIES More than 11,000 killed in India quake Mideast negotiators want to continue talks after Israeli elections MORE BUSINESS ... MORE MARKETS 4:30pm ET, 4/16 DJIA NAS SPORTS Jordan says farewell for the third time ... LOCAL EDITIONS: CNN.com Europe change default edition MULTIMEDIA: video video archive audio multimedia showcase ... more services E-MAIL: Subscribe to one of our news e-mail lists Enter your address: DISCUSSION: chat feedback CNN WEB SITES: CNNfyi.com CNN.com Europe AsiaNow Spanish ... Korean Headlines TIME INC. SITES: Go To ... Time.com People Money Fortune EW CNN NETWORKS: CNN anchors transcripts Turner distribution SITE INFO: help contents search ad info ... jobs WEB SERVICES: Main Page Bracing for Cyberwar Hacking Primer Scenes from the 'Hacker Underground' ... Related Sites
    Clinton fights hackers, with a hacker
    February 15, 2000

    28. TLC :: Hackers: Hackers' Hall Of Fame
    Biographies and photographs of 15 famous Hackers. Requires Flash.
    http://tlc.discovery.com/convergence/hackers/bio/bio.html
    var oasPositionArray = "x21,x24,TopLeft,Top3,x29,x12"; OAS_RICH("TopLeft");
    September 10, 2005 Hackers' Hall of Fame Richard Stallman Handle: None (nothing to hide!)
    Claim to fame: A hacker of the old school, Stallman walked in off the street and got a job at MIT's Artificial Intelligence Lab in 1971. He was an undergraduate at Harvard at the time. Disturbed that software was viewed as private property, Stallman later founded the Free Software Foundation. First encountered a computer: In 1969, at the IBM New York Scientific Center. He was 16 years old. Unusual tools: Little-known fact: Recipient of a $240,000 MacArthur Foundation genius grant. Current status: Richard Stallman has just published his latest book, Free Software, Free Society: Selected Essays of Richard M. Stallman , available through GNU Press. Advertisement
    By visiting this site, you agree to the terms and conditions
    of our Visitor Agreement . Please read.
    2005 Discovery Communications Inc.
    The leading global real-world media and entertainment company.

    29. CNN - Shopping-cart Glitch Could Give Hackers A Discount - February 4, 2000
    CNN
    http://www.cnn.com/2000/TECH/computing/02/04/shop.glitch.idg/index.html

    MAIN PAGE
    WORLD U.S. LOCAL ... daily almanac
    MULTIMEDIA:
    video
    video archive audio multimedia showcase ... more services
    E-MAIL:
    Subscribe to one of our news e-mail lists.
    Enter your address: document.write(' '); Or:
    Get a free e-mail account

    E-MAIL
    DISCUSSION: message boards chat feedback
    CNN WEB SITES:
    AsiaNow
    Svenska Norge Danmark ... Italian FASTER ACCESS: europe japan TIME INC. SITES: Go To ... Time.com People Money Fortune EW CNN NETWORKS: more networks transcripts SITE INFO: help contents search ad info ... jobs WEB SERVICES: Main Page Bracing for Cyberwar Hacking Primer Scenes from the 'Hacker Underground' ... From...
    Shopping-cart glitch could give hackers a discount
    February 4, 2000 Web posted at: 12:19 p.m. EDT (1219 GMT) by Ann Harrison (IDG) An Internet security firm has issued an alert for what it said are tampering vulnerabilities in several Web-based shopping cart applications. Internet Security Systems Inc. (ISS) in Atlanta Tuesday released a statement that said the company had identified 11 shopping-cart applications that used flawed online forms that intruders could exploit to change prices or discounts at e-commerce sites. Many shopping-cart applications use hidden fields in HTML forms to define product parameters such as quantity, name and price. That hidden data gets submitted from the customer back to the site along with information filled in on a form when the form is submitted. However, "hidden" data is only obscured from the customer's view when looking at the form through a browser; anyone can find this data by choosing to view the form's HTML source code.

    30. Hackers Attack Mozilla Site To Spread Spam | The Register
    Hackers attacked a site promoting Firefox last weekend in order to commandeer itto send spam, the Mozilla Foundation said on Friday.
    http://www.theregister.co.uk/2005/07/15/firefox_spam_hack/
    Skip to content Biting the hand that feeds IT SetPromptText('q', 'Search');
    Security:
    Reg Shops
    News Services
    Top Stories
  • Searching for failure? Try George W. Bush Rollercoaster gets woman pregnant Apple pipped to Nano name by arch-rival Subpoenas at 6Gbps? RIAA, MPAA join Internet2 ... Network Security
    Hackers attack Mozilla site to spread spam
    By John Leyden Published Friday 15th July 2005 15:51 GMT Get breaking Security news straight to your desktop - click here to find out how Hackers attacked a site promoting Firefox last weekend in order to commandeer it to send spam, the Mozilla Foundation said on Friday. The attack was limited to community marketing site SpreadFirefox.com . In a statement, the Mozilla Foundation said the unspecified security vulnerabilities were exploited to mount the attack. SpreadFirefox.com was taken down after the attack was discovered on Tuesday, 12 July but has now been restored online. The Mozilla Foundation said the break-in on 10 July by unknown attackers did not affect other mozilla.org web sites or Mozilla software.
  • 31. CNN.com - Technology - For Hire: Hackers To Help Pentagon Prevent Attacks - Augu
    CNN
    http://www.cnn.com/2000/TECH/computing/08/01/pentagon.at.defcon.idg/index.html
    technology > computing Editions myCNN ... Feedback
    CNN Sites CNN CNN Europe CNNfn CNNSI myCNN CNNfyi AllPolitics Languages
    Search
    CNN.com CNNSI.com CNNfn.com The Web
    TECHNOLOGY

    TOP STORIES
    Consumer group: Online privacy protections fall short

    Guide to a wired Super Bowl

    Debate opens on making e-commerce law consistent

    MORE

    TOP STORIES More than 11,000 killed in India quake Mideast negotiators want to continue talks after Israeli elections MORE BUSINESS ... MORE MARKETS 4:30pm ET, 4/16 DJIA NAS SPORTS Jordan says farewell for the third time ... LOCAL EDITIONS: CNN.com Europe change default edition MULTIMEDIA: video video archive audio multimedia showcase ... more services E-MAIL: Subscribe to one of our news e-mail lists Enter your address: DISCUSSION: chat feedback CNN WEB SITES: CNNfyi.com CNN.com Europe AsiaNow Spanish ... Korean Headlines TIME INC. SITES: Go To ... Time.com People Money Fortune EW CNN NETWORKS: CNN anchors transcripts Turner distribution SITE INFO: help contents search ad info ... jobs WEB SERVICES:
    For hire: Hackers to help Pentagon prevent attacks
    From... by Mathew Schwartz LAS VEGAS (IDG) At the opening of the annual Def Con hackers convention here Friday, the Pentagon's CIO pleaded with attendees to leave government systems alone and outlined proposed new laws aimed at prosecuting computer crimes more expeditiously. But he also said the government's doors are open to hackers who want to help prevent attacks.

    32. Linux Bluetooth Hackers Hijack Car Audio | The Register
    Linux Hackers have demonstrated a way to inject or record audio signals from Once connected Hackers can interact with other drivers or even eavesdrop
    http://www.theregister.co.uk/2005/08/02/car_whisperer/
    Skip to content Biting the hand that feeds IT SetPromptText('q', 'Search');
    Mobile:
    Reg Shops
    News Services
    Top Stories
  • Searching for failure? Try George W. Bush Rollercoaster gets woman pregnant Apple pipped to Nano name by arch-rival Subpoenas at 6Gbps? RIAA, MPAA join Internet2 ... Mobile Data
    Linux Bluetooth hackers hijack car audio
    By John Leyden Published Tuesday 2nd August 2005 13:21 GMT Get breaking Mobile news straight to your desktop - click here to find out how Linux hackers have demonstrated a way to inject or record audio signals from passing cars running insecure Bluetooth hands-free units. The Trifinite group showed how hackers could eavesdrop on passing motorists using a directional antenna and a Linux Laptop running a tool it has developed called Car Whisperer The software was demonstrated during a Bluetooth Security talk at last week's What the Hack hacker festival in The Netherlands. Trifinite has developed a specialism in unearthing Bluetooth security shortcomings, the latest of which illustrates implementation problems rather than more deep-seated security concerns with the protocol. Car Whisperer only works because many car manufacturers use standard Bluetooth passkeys such as "0000" or "1234" which are easy to guess. "This is often is the only authentication that is needed to connect," according to Trifinite.
  • 33. CNN - DOD Overhauls Network To Thwart Hackers - May 4, 1999
    CNN
    http://www.cnn.com/TECH/computing/9905/04/overhaul.idg/index.html

    MAIN PAGE
    WORLD ASIANOW U.S. ... news quiz
    CNN WEB SITES: TIME INC. SITES: Go To ... Time.com People Money Fortune EW MORE SERVICES: video on demand video archive audio on demand news email services ...
    pagenet

    DISCUSSION: message boards chat feedback
    SITE GUIDES: help contents search
    FASTER ACCESS: europe japan
    WEB SERVICES:
    Main Page
    Bracing for Cyberwar Hacking Primer Scenes from the 'Hacker Underground' ... Related Sites
    DOD overhauls network to thwart hackers
    May 4, 1999

    Web posted at: 3:19 p.m. EDT (1919 GMT)
    by Bob Brewin From...
    (IDG) The Defense Department has started an overhaul of its global unclassified network to fight off the barrage of hacker attacks the department's systems suffer and to increase capacity to handle a huge rise in traffic to and from the Internet. The Defense Information Systems Agency plans to redesign its Non-Classified Internet Protocol Router Network, DOD's primary entry into commercial World Wide Web sites, to take advantage of enhanced security measures and to improve overall performance. The NIPRNET redesign, scheduled for completion in December with main network components slated for installation no later than June, will provide DOD with a network better designed to stave off hacker attacks that hit DOD systems at a rate of 250,000 a year, according to a DOD source briefed on the network plan.

    34. Frontline: Hackers
    This FRONTLINE documentary explores the hacker community, from the mischievouspranksters to serious criminals who cost businesses billions of dollars.
    http://www.pbs.org/wgbh/pages/frontline/shows/hackers/
    var loc = "../../";
    a closer look at why they do it and how they do it
    examining the impact on corporations, government and national security; links on cyberterrorism
    the focus on new laws, liability proposals and software makers like microsoft
    tips on how to safeguard your computer files and personal data
    with 4 hackers and 14 security analysts in government and the private sector
    Funding for FRONTLINE is provided through the support of PBS viewers. Additional support for FRONTLINE is provided by EarthLink.
    who are hackers?
    risks of the internet who's responsible how to be vigilant ... pbs online
    web site 1995-2005 wgbh educational foundation
    Hackers
    Designed to facilitate the free exchange of ideas, the Internet has become home to confidential-even classified-information from virtually every nation in the world. Financial information, national infrastructure, even state secrets can be accessed via the complex computer network that is the World Wide Web. But how safe is that information if computer-literate teenagers can break into top-security computer systems, infect them with viruses, or steal sensitive-even dangerous-documents? FRONTLINE investigates the role of hackers and reveals how their exploits highlight the profound insecurities of the Internet and the software that drives it. Through interviews with teenagers, information warriors, security experts, and law enforcement officials, FRONTLINE illuminates a virtual world where many of our most sacred beliefs-including the very notion of bordered nations-are called into question.

    35. University Computers A Prime Targets For Hackers
    CNN
    http://cnn.com/2001/TECH/internet/06/01/hacking.colleges.ap/index.html

    36. Frontline: Hackers: Who Are Hackers?
    s of some of the most popular techniques that Hackers use to break There are numerous sites published by and about Hackers, representing a......
    http://www.pbs.org/wgbh/pages/frontline/shows/hackers/whoare/
    var loc = "../../../";
    This young hacker was caught breaking into NASA's computers and sentenced to six months in jail. The government says that at one time, he took possession of $1.7 million in software. In his interview he talks about the weaknesses he found in the government's computers and how he had warned them. Because of his age, FRONTLINE is protecting his identity.
    Reid and Count Zero are members of the Cult of the Dead Cow , a hacker organization which developed "Back Orifice," a computer program which allows the user to remotely view and control any computer running Windows 95 or later. They say the developed the program to demonstrate the weak security in Microsoft products.
    Curador is a 18-year old hacker from rural Wales who in the winter of 2000 stole an estimated 26,000 credit cards numbers from a group of e-commerce web sites, and posted the numbers on the web. After ex-hacker Chris Davis tracked him down, Curador was arrested in March 2000, and charged under the United Kingdom's computer crime statute.
    The views of Bruce Schneier, an expert in cryptography and computer security; Reid and Count Zero, members of the Cult of the Dead Cow hacker organization; Robert Steele of Open Source Solutions; Robert Giovagnoni of iDEFENSE; Martha Stansell-Gamm, chief of the U.S. Justice Dept's Computer Crime section; and Steven Lipner, Microsoft security analyst.

    37. Honeypots Tracking Hackers
    Honeypots Tracking Hackers. A honeypot is an information system resource whosevalue lies in unauthorized or illicit use of that resource.
    http://www.tracking-hackers.com/

    38. CNN.com - Sci-Tech - Hackers Tap Credit Card Info At Bibliofind - March 5, 2001
    CNN
    http://cnn.com/2001/TECH/internet/03/05/bibliofind/index.html
    MAIN PAGE
    WORLD

    U.S.

    WEATHER
    ...
    ABOUT US

    CNN TV what's on
    show transcripts

    CNN Headline News

    CNN International
    ...
    askCNN

    EDITIONS CNN.com Asia CNN.com Europe set your edition Languages Spanish Portuguese German Italian Danish Japanese Korean Arabic Time, Inc. Time.com People Fortune EW
    Hackers tap credit card info at Bibliofind
    By Daniel Sieberg CNN.com Technology Editor (CNN) Bibliofind, an online bookseller service, announced Monday that it has learned of a security violation that compromised the credit card information of 98,000 users. However, company spokesperson Jim Courtovich said Monday that no misuse of the data has thus far been reported. The breach was discovered during an internal investigation last week after the Bibliofind Web site was defaced in February, said Courtovich. Upon looking into the defacement, it was discovered that an individual or individuals managed to access the servers on a monthly basis between October 2000 and February 2001. MESSAGE BOARD Security on the Net Bibliofind, founded in 1996, said it has contacted the various credit card companies so they can take the necessary steps to protect cardholders. The company also said it has removed all credit card information, physical addresses and phone numbers from its servers. Courtovich said all 98,000 customers would be notified of the incident via e-mail.

    39. Book
    Honeypots Tracking Hackers The first and only book to explore the fascinatingworld of Honeypots! Honeypots Tracking Hackers
    http://www.tracking-hackers.com/book/

    40. Wired News: Congress No Haven For Hackers
    Even as the world's geeks march against the Digital Millennium Copyright Act, key legislators and lobbyists are dismissing concerns about the controversial law as hyperbole. By Declan McCullagh.
    http://www.wired.com/news/politics/0,1283,45522,00.html
    Welcome to Wired News. Skip directly to: Search Box Section Navigation Content Search:
    Wired News Wired Magazine HotBot (the Web)
    Congress No Haven for Hackers
    Page 1 of 2 next
    By Declan McCullagh Also by this reporter 02:00 AM Jul. 25, 2001 PT The law that led to the arrest of Russian programmer Dmitry Sklyarov last week and an immediate outcry among programmers continues to enjoy remarkably broad support on Capitol Hill. No bill has yet been introduced in Congress to amend the DMCA for one simple reason: Official Washington loves the law precisely as much as hackers and programmers despise it.
    See also
    Today's Top 5 Stories
    Breaking News
    Special Partner Promotion Find local technology jobs "The law is performing the way we hoped," said

    A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

    Page 2     21-40 of 201    Back | 1  | 2  | 3  | 4  | 5  | 6  | 7  | 8  | 9  | 10  | 11  | Next 20

    free hit counter