Geometry.Net - the online learning center
Home  - Book_Author - Hackers The
e99.com Bookstore
  
Images 
Newsgroups
Page 7     121-140 of 201    Back | 1  | 2  | 3  | 4  | 5  | 6  | 7  | 8  | 9  | 10  | 11  | Next 20
A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

         Hackers The:     more books (99)
  1. Wittgenstein. Sur la nature humaine by PMS Hacker, 2000-10-02
  2. Hacker Cracker: A Journey from the Mean Streets of Brooklyn to the Frontiers of Cyberspace by David Chanoff, Ejovi Nuwere, 2002-10-01
  3. A Writer's Reference with 2009 MLA and 2010 APA Updates by Diana Hacker, 2010-05-24
  4. Developmental Exercises for The Bedford Handbook by Diana Hacker, Wanda Van Goor, 2010-01-20
  5. Hacker's Challenge : Test Your Incident Response Skills Using 20 Scenarios
  6. The Ultimate Cigar Book (Tenth Anniversary Edition 1993-2003) by Richard Carleton Hacker, 2003-08
  7. A Writer's Reference with 2009 MLA Update by Diana Hacker, 2009-07-06
  8. The High Cost of Low Morale...and what to do about it by Carol Hacker, 1997-04-03
  9. Bead And Wire Jewelry Exposed: 50 Designer Projects Featuring Beadalon And Swarovski by Margot Potter, Katie Hacker, et all 2009-01-14
  10. A Writer's Reference 6th Edition (With a Guide to Writing in All Disciplines At Loyola College in Maryland) by Diana Hacker, 2007
  11. OS X for Hackers at Heart by Bruce Potter, Chris Hurley, et all 2005-11-19
  12. CEH Certified Ethical Hacker Certification Exam Preparation Course in a Book for Passing the CEH Certified Ethical Hacker Exam - The How To Pass on Your First Try Certification Study Guide by William Manning, 2009-06-12
  13. Hackers: Crime and the Digital Sublime by Paul Taylor, 1999-11-03
  14. A Pocket Style Manual 5e with 2009 MLA by Diana Hacker, 2009-06-05

121. CNN.com - Technology - Justice Dept. Says New Laws Needed To Track Hackers - Mar
CNN
http://www.cnn.com/2000/TECH/computing/03/02/hack.track.idg/index.html
technology > computing Editions myCNN ... Feedback
CNN Sites CNN CNN Europe CNNfn CNNSI myCNN CNNfyi AllPolitics Languages
Search
CNN.com CNNSI.com CNNfn.com The Web
TECHNOLOGY

TOP STORIES
Consumer group: Online privacy protections fall short

Guide to a wired Super Bowl

Debate opens on making e-commerce law consistent

MORE

TOP STORIES More than 11,000 killed in India quake Mideast negotiators want to continue talks after Israeli elections MORE BUSINESS ... MORE MARKETS 4:30pm ET, 4/16 DJIA NAS SPORTS Jordan says farewell for the third time ... LOCAL EDITIONS: CNN.com Europe change default edition MULTIMEDIA: video video archive audio multimedia showcase ... more services E-MAIL: Subscribe to one of our news e-mail lists Enter your address: DISCUSSION: chat feedback CNN WEB SITES: CNNfyi.com CNN.com Europe AsiaNow Spanish ... Korean Headlines TIME INC. SITES: Go To ... Time.com People Money Fortune EW CNN NETWORKS: CNN anchors transcripts Turner distribution SITE INFO: help contents search ad info ... jobs WEB SERVICES: Main Page Bracing for Cyberwar Hacking Primer Scenes from the 'Hacker Underground' ... Related Sites
Justice Dept. says new laws needed to track hackers
From...

122. PCWorld.com - 'Car Whisperer' Puts Hackers In The Driver's Seat
Software connects car Bluetooth systems with a remote PC so Hackers can eavesdrop.
http://www.pcworld.com/news/article/0,aid,122077,pg,1,00.asp
Special Offer! close
Name:
Address:
City: State: Zip:

Canada, click here
E-mail (optional):
Please enter my order and I'll get 2 Risk-Free Issues of PC World plus 15 Instant Free Power Guides and Bonus Windows Tips CD-ROM. If I like PC World, I'll get 18 more issues (20 in all) for only $20. If not, I'll write "cancel" on the bill, send it back and owe nothing.
Annual newsstand rate is $83.88 ($6.99 per issue).
To learn more about our information practices, read our close document.write(pcw_AdRender('iframe','leader',undefined)); document.write(''); Cameras PCs Laptops Printers ... DVD
RELATED ARTICLES Microsoft to Host Hacker Meetings Hackers Crack Microsoft's Antipiracy System Hacker Mitnick Advises on Security Bulletin Board Service Hit by Hacker Attack ... See all related items
SUBSCRIBE Get 2 Trial Issues + 15 FREE Gifts! Renew your subscription ... Give a gift subscription FREE NEWSLETTERS Get our weekly news recap or daily downloads digest, or both. Weekly Brief Daily Downloads Enter your e-mail: See all newsletters Topics Hackers 'Car Whisperer' Puts Hackers in the Driver's Seat Software connects car Bluetooth systems with a remote PC so hackers can eavesdrop.

123. CNN - Hackers As Hired Guns - February 8, 2000
CNN
http://www.cnn.com/2000/TECH/computing/02/08/hired.guns.idg/index.html

MAIN PAGE
WORLD U.S. LOCAL ... daily almanac
MULTIMEDIA:
video
video archive audio multimedia showcase ... more services
E-MAIL:
Subscribe to one of our news e-mail lists.
Enter your address: document.write(' '); Or:
Get a free e-mail account

E-MAIL
DISCUSSION: message boards chat feedback
CNN WEB SITES:
AsiaNow
Svenska Norge Danmark ... Italian FASTER ACCESS: europe japan TIME INC. SITES: Go To ... Time.com People Money Fortune EW CNN NETWORKS: more networks transcripts SITE INFO: help contents search ad info ... jobs WEB SERVICES: From...
Hackers as hired guns
February 8, 2000 Web posted at: 8:36 a.m. EST (1336 GMT) by Ellen Messmer (IDG) Security start-up @Stake has caused quite a sensation since its recent launch as a professional services firm employing members of the hacker nether world as hired guns sent out to test corporate networks for vulnerabilities. So far, @Stake has no marquee corporate customers willing to state they have actually hired any of the company's two dozen or so hacker employees to give them advice on how to secure their networks, from selecting firewalls and antivirus software to setting up e-commerce applications. These employees include Mudge - the leader of the underground group L0pht - and even more amazingly, Dildog, top dog in the notorious Cult of the Dead Cow (CDC).

124. H2K2
Com; Hackers Challenge Internet Monitoring, ZDnet News; Staying Anonymous on the Web Com; H2K2 Hackers Say They Want A Revolution, Security Focus Online
http://www.h2k2.net/
//pre-loads mouseover buttons Image1= new Image(165,36) Image1.src = "images/btn_introduction_on.gif" Image2 = new Image(165,22) Image2.src = "images/btn_panels_on.gif" Image3 = new Image(165,22) Image3.src = "images/btn_music_on.gif" Image4 = new Image(165,22) Image4.src = "images/btn_location_on.gif" Image5 = new Image(165,20) Image5.src = "images/btn_travel_on.gif" Image6 = new Image(165,22) Image6.src = "images/btn_registration_on.gif" Image7 = new Image(165,28) Image7.src = "images/btn_volunteering_on1.gif" // >
H2K2 - NYC 07.12_14.2002 - the 4th HOPE conference, sponsored by Articles Speaker's References Films Shown at H2K2 Pictures ... AUDIO FILES FROM H2K2 are now online! If you have H2K2 pictures you'd like added to the archive, please email pictures@h2k2.net Visit the 2600 online store for H2K2 merchandise
Now that most of us have finally gotten back to a degree of normalcy, it's time to offer our sincere thanks for making the H2K2 conference the smashing success it was. While we've become used to the good karma that emanates from the HOPE conferences, this was our biggest effort by far and none of it would have been possible without so many people doing everything they could to make it fun and educational. It was also the first time we've had one conference so closely followed by another - H2K2 followed H2K by only two years as opposed to the three year gap we normally had between conferences. This year space was most definitely not the problem it was in the past, thanks to our having so much more of it. Each of our two main speaker tracks was able to sustain the huge crowds they attracted while our third track, reserved for last minute and self scheduled speakers, had ample space as well. The film room worked out very nicely for both small and large presentations. And, of course, we had all of downstairs for the network and musical performances, all of which ran around the clock. The 24 hour environment of midtown Manhattan lent itself very well to the 24 hour environment of the hacker world. For many, H2K2 was their first taste of New York and it proved to be an overwhelmingly positive one.

125. CNN.com - Pentagon Still Under Assault From Hackers - August 9, 2000
CNN
http://www.cnn.com/2000/TECH/computing/08/09/cybersecurity.reut/index.html
technology computing Editions myCNN ... Feedback
CNN Sites CNN CNN Europe CNNfn CNNSI myCNN CNNfyi AllPolitics Languages
Search
CNN.com CNNSI.com CNNfn.com The Web
TECHNOLOGY

TOP STORIES
Consumer group: Online privacy protections fall short

Guide to a wired Super Bowl

Debate opens on making e-commerce law consistent

MORE

TOP STORIES More than 11,000 killed in India quake Mideast negotiators want to continue talks after Israeli elections MORE BUSINESS ... MORE MARKETS 4:30pm ET, 4/16 DJIA NAS SPORTS Jordan says farewell for the third time ... LOCAL EDITIONS: CNN.com Europe change default edition MULTIMEDIA: video video archive audio multimedia showcase ... more services E-MAIL: Subscribe to one of our news e-mail lists Enter your address: DISCUSSION: chat feedback CNN WEB SITES: CNNfyi.com CNN.com Europe AsiaNow Spanish ... Korean Headlines TIME INC. SITES: Go To ... Time.com People Money Fortune EW CNN NETWORKS: CNN anchors transcripts Turner distribution SITE INFO: help contents search ad info ... jobs WEB SERVICES:
Pentagon still under assault from hackers
BETHESDA, Maryland (Reuters) U.S. Defense Department pleas to computer hackers to quit mischief-making appear to be falling largely on deaf ears, making spotting potential national security threats more difficult, a top Pentagon expert said on Tuesday. Despite recent appeals, "we're not seeing any diminishing" of the pace of attacks on Defense Department systems, said Richard Schaeffer, who heads the cyber-security office in the Pentagon arm responsible for command, control, communications and intelligence.

126. Hackers Cash In On 802.1x Confusion - The Community's Center For Security
Wireless Security Companies are leaving their wireless networks exposed to hackersbecause of widespread failure to understand or implement 802.11x security
http://www.linuxsecurity.com/content/view/120015/65/
GuardianDigital.com LinuxSecurity.com EnGarde Secure Linux Guardian Digital Online Store ... Archives
What LinuxSecurity.com feature do you find most valuable? News Updates News Archive Advisories Whitepapers HOWTOs Link Archive Dictionary Forums Feature Stories Newsletters Advisories RDF
Latest News RDF

Features RDF

Hybrid RDF
...
RDF FAQ

Hackers cash in on 802.1x confusion Source: IT Week - Posted by: Pax Dickinson
Date: Wednesday, 03 August 2005 Companies are leaving their wireless networks exposed to hackers because of widespread failure to understand or implement 802.11x security systems, a survey has claimed. Discuss this article on the forums. (0 posts)
The study commissioned security vendor nCipher revealed less than half of firms plan to introduce the technology in the next two years. It comes as another blow to producers of 802.1x equipment, following Forrester research in March which showed the technology is more costly to implement than originally thought. 802.1x is an IEEE standard that protects network ports from unauthorised access and is particularly designed for wireless networks. The report concludes that another hampering factor in adoption of 802.1x is management of associated cryptographic keys. The survey found an average of ten per cent of companies had more than 10,000 keys on their servers and desktops.

127. CNN - Hackers Attack U.S. Government Web Sites In Protest Of Chinese Embassy Bom
CNN
http://www.cnn.com/TECH/computing/9905/10/hack.attack/index.html

MAIN PAGE
WORLD ASIANOW U.S. ... news quiz
CNN WEB SITES: TIME INC. SITES: Go To ... Time.com People Money Fortune EW MORE SERVICES: video on demand video archive audio on demand news email services ...
pagenet

DISCUSSION: message boards chat feedback
SITE GUIDES: help contents search
FASTER ACCESS: europe japan
WEB SERVICES:
Hackers attack U.S. government Web sites in protest of Chinese embassy bombing
May 10, 1999

Web posted at: 5:20 p.m. EDT (2120 GMT)
WASHINGTON (CNN) Computer hackers protesting NATO's bombing of the Chinese embassy in Belgrade attacked three U.S. government Web sites on Sunday, government officials tell CNN. The hackers briefly planted messages condemning the bombing, prompting at least one Cabinet department Web site to remain closed through Monday. It is not clear whether the hackers were located in China or elsewhere. The main Web sites for the Energy and Interior departments and the National Park Service were targeted Sunday. Hackers inserted messages of protest of the NATO bombing of the Chinese embassy into the agencies' home pages. The pictures of three Chinese journalists who died in the bombing were briefly posted on the Interior Department Web page. The Interior and Park Service sites were only briefly disrupted, but the main Energy Department site was still off line as of 3 p.m. EDT Monday for what a DOE spokesman said was "investigation" of the hacking episode. Sub-sites for Energy Department programs were protected by electronic "firewalls" and were not affected by the hacking, the spokesman said.

128. Hackers Demonstrate Their Skills In Vegas - The Community's Center For Security
Hackers play intrusion games at the bleeding edge of computer security. but a security analyst who goes by the name Zamboni challenged Hackers to
http://www.linuxsecurity.com/content/view/119998/65/
GuardianDigital.com LinuxSecurity.com EnGarde Secure Linux Guardian Digital Online Store ... Archives
What LinuxSecurity.com feature do you find most valuable? News Updates News Archive Advisories Whitepapers HOWTOs Link Archive Dictionary Forums Feature Stories Newsletters Advisories RDF
Latest News RDF

Features RDF

Hybrid RDF
...
RDF FAQ

Hackers Demonstrate Their Skills in Vegas Source: ChinaBroadcast.ca - Posted by: Benjamin D. Thomas
Date: Tuesday, 02 August 2005 Even the ATM machines were suspect at this year's Defcon conference, where hackers play intrusion games at the bleeding edge of computer security. With some of the world's best digital break-in artists pecking away at their laptops, sending e-mails or answering cell phones could also be risky. Defcon is a no-man's land where customary adversaries — feds vs. digital mavericks — are supposed to share ideas about making the Internet a safer place. But it's really a showcase for flexing hacker muscle. Discuss this article on the forums. (0 posts)
This year's hot topics included a demonstration of just how easy it may be to attack supposedly foolproof biometric safeguards, which determine a person's identity by scanning such things as thumb prints, irises and voice patterns. Banks, supermarkets and even some airports have begun to rely on such systems, but a security analyst who goes by the name Zamboni challenged hackers to bypass biometrics by attacking their backend systems networks. "Attack it like you would Microsoft or Linux," he advised.

129. CNN.com - European 'safer Internet' Site Hit By Hackers - June 11, 2001
CNN
http://cnn.com/2001/TECH/internet/06/11/safer.net.hack.idg/index.html
MAIN PAGE
WORLD

U.S.

WEATHER
...
ABOUT US

CNN TV what's on
show transcripts

CNN Headline News

CNN International
...
askCNN

EDITIONS CNN.com Asia CNN.com Europe set your edition Languages Time, Inc. Time.com People Fortune EW
European 'safer Internet' site hit by hackers
From... By Joris Evers (IDG) Hackers embarrassed the European Commission last week by identifying and exploiting two security holes on a new commission-sponsored Web site that promotes safer use of the Internet. One of the holes allowed the hackers to get administrator privileges on the server that powers the Safer Internet Exchange site, according to a security analyst who asked not to be identified. The other flaw involved an e-mail distribution list that was left unsecured, allowing intruders to retrieve the names and e-mail addresses of the people on the list. Tara Morris, project manager for the Web site and a consultant at Birmingham, England-based Ecotec Research and Consulting Ltd., said the two holes have been plugged. The incident is still being investigated, he added, while declining to detail how deeply the hackers were able to penetrate the affected server. MESSAGE BOARD What laws would you like to see in place to protect users of the Internet? Is complete Net security a possibility, if so, how?

130. Hiring Hackers As Security Consultants
The subject of whether it is ethical to use former Hackers to evaluate a network’ssecurity is a topic that is often hotly debated.
http://www.windowsecurity.com/articles/Hackers-Security-Consultants.html

Anti Virus Section
Authors Books Email Security Test ... White Papers Site Search
Anti Virus Section Intrusion Detection Misc Network Security Viruses, trojans and other malware ... White Papers Featured Products Featured Book Recommended Sites
Hiring Hackers As Security Consultants
Date Launched: Jun 14, 2005 Last Updated: Jun 14, 2005 Section: Articles :: Misc Network Security Author: Brien Posey Company: Brien Posey Printable Version Rating: 3.7/5 - 42 Votes The subject of whether it is ethical to use former hackers to evaluate a network’s security is a topic that is often hotly debated. In this article, I will explore the pros and cons of using former hackers in such roles. Although the practice has been going on for quite some time, the subject of whether or not you should hire reformed hackers as security consultants has been receiving a lot of press lately. This seems to be a very touchy issue, and there are strong opinions on both sides. Being that this issue has been generating so much heat, I wanted to take the opportunity to discuss both sides of the issue.
Before I Begin
Before I get started, I want to get a few things out of the way up front. First of all, every time that I write any type of article on hacking, I always get at least a few E-mails from readers describing my misuse of the word “hacker”. In actuality, the term hacker refers to someone who likes to tinker with hardware or software in an effort to enhance its capabilities. The media and popular culture have twisted the word’s meaning into someone who breaks into computer systems. For the purposes of this article, I will use the word hacker to refer to someone who breaks into computer systems.

131. Hacker Stickers Computer Stickers For Hackers And Geeks And T-Shirts, Energy Can
Features gear for Hackers, coders and geeks such as caffeine Candy, energy mints, hacker Tshirts and stickers.
http://www.hackerstickers.com/
Order/Checkout GEEK
BSD Daemon

BOMB
...
Kola

Penguin Mints
Penguin Mints

Penguin Chocolate

Penguin Reds

Geek Clothes
...
SUGGESTION BOX

LINKS/LINKING AFFILIATES
Hacker Stickers Stickers for Geeks, Nerds and Computers or Cars Free Sticker! Spoof up your laptop a little with this brightly or darkly colored fused bomb is ready to blow. Hackers and geeks will place this on their computers and feel like their in the movies, after your gear is pimped out make sure you use and always enhance your skills. Ever see the word 'Hacker' in Japanese? The japanese hacker sticker shows real ninja skills when placed on your computer. The sticker is bound to bring you either stealthyness or attraction depending on your location and surroundings. Hacker stickers are available in white, black and red in vinyl sticker which is weatherproof so it works perfectly for car windows and laptops or the home computer case. Give this as a gift to your son or daughter or surprise your parents by sporting this specialty sticker. Many who subscribe to 2600 The Hackers Quarterly enjoy the Hacker sticker as they are not afraid to show their pride in being a hacker.

132. CNN.com - Technology - 'Decoy Nets' Gain Backers In Battle Against Hackers - Mar
CNN
http://cnn.com/2001/TECH/internet/03/07/decoy.nets.idg/index.html
MAIN PAGE
WORLD

U.S.

WEATHER
...
ABOUT US

CNN TV what's on
show transcripts

CNN Headline News

CNN International
...
askCNN

EDITIONS CNN.com Asia CNN.com Europe set your edition Languages Spanish Portuguese German Italian Danish Japanese Korean Arabic Time, Inc. Time.com People Fortune EW
'Decoy nets' gain backers in battle against hackers
From... By Ellen Messmer (IDG) As hackers obtain ever more dangerous and easy-to-use tools, they are being countered by novel defense strategies. Witness the experimental idea of setting up a decoy network separate from your real one to fool intruders as they try to fool you. This so-called "deception" network is envisioned as more than just a single server set up to be a "honeypot," where hackers may break in, find a dead end and have their activities recorded with an eye toward prosecution. Rather, the decoy net is an entire fake network, complete with host computers on a LAN with simulated traffic, to convince hackers for as long as possible that it's real. MESSAGE BOARD Security on the Net Experts debate whether such nets will be worth the effort, but agree they can be a way to slow hackers long enough to sort the curious from the truly destructive. A group calling itself The Honeynet Project has quietly begun testing decoy networks on the Internet and soon plans to publish a paper on how to build one.

133. BetaNews | Cisco Web Site Breached By Hackers
So real Hackers won t hack for anything but the intellectual challenge. Most of the Hackers are way above the average people concerning intelligence
http://www.betanews.com/article/Cisco_Web_Site_Breached_by_Hackers/1123086248
@import "http://www.betanews.com/images/resources/markup.css"; BetaNews Home FileForum Home Login: Password: Lost Password? Search: All Articles All Downloads Only Betas Advanced
Search
  • Preferences Help ... Comment on this article
    Cisco Web Site Breached by Hackers
    By Nate Mook , BetaNews
    August 3, 2005, 12:24 PM
    Facing a second embarrassing security situation in as many weeks, Cisco on Wednesday began notifying customers that its Web site, Cisco.com , had been compromised and asked users to change their passwords. News of the breach followed a report that Cisco's routers were vulnerable to a serious exploit. "It has been brought to our attention that there is an issue in a Cisco.com search tool that could expose passwords for registered users," the company wrote. "As a result, to protect our registered Cisco.com users, we're taking the proactive step of resetting Cisco.com passwords." Cisco said the problem was apparently not related to its own hardware products or technologies, and simply stemmed from a poorly coded Web application. "Needless to say, we're investigating the incident, which does not appear to be due to a weakness in our security products and technologies or with our network infrastructure."

134. Association Of American Publishers
Press release by Association of American Publishers (of which Adobe is a member) in which CEO Pat Schroder compares Dmitry Sklyarov's actions to distributing keys to unlock a bookstore.
http://www.publishers.org/press/releases.cfm?PressReleaseArticleID=54

135. Entering >> [ Dot Hackers ] . . . Preloading Images
.Hackers please wait preloading images.
http://www.blackwings.net/hack/
.hackers
please wait... pre-loading images

136. SF 2600
Where Hackers, crackers, phreaks, and geeks hang out and discuss technology and network security with other likeminded folks.
http://www.sf2600.org/
What sf2600 is a meeting where hackers, crackers, phreaks, and geeks hang out and discuss technology and network with other like-minded folks. When / Where First Friday of every month Schroeder's 240 Front Street , SF - Free meatballs at 5PM 4 Embarcadero Center , SF
Ground level, center of building, near the fountain Schroeder's 240 Front Street , SF - Back Room The back room of Schroeder's is reserved starting at 7Pm. We have talks and presentations at the meeting. Come prepared if you wish to give a presentation.
Avg. entrée price: ~$13, Beer is $9 for a liter, $5 for a pint. THIS IS A RESTAURANT, ALL AGES ARE WELCOME! Keeping in Touch SF2600 mailing list: send e-mail to listserv@sf2600.org with subscribe sf2600 in the body or click here Sign onto efnet at , find a server here or connect to IRC using our chat client here Links SF2600 website sponsored by Phoenix IT
TVSG
2600.org La2600.org ... Wi2600.org Spread The Word
Use this banner link www.sf2600.org
Take a look at our flier ©2002-2004 sf2600.org

137. Salon.com Technology | Hackers On Atkins
Hackers on Atkins Geeks who go lowcarb see it as more than just taking off But low-carb diets do appear to hold a special attraction for Hackers,
http://www.salon.com/tech/feature/2003/10/30/low_carb_hackers/

Search Salon

Directory
Hot Topics

Ask the Pilot

The Matrix

Computer Games

Globalization
...
Joyce McGreevy

Articles by date
  • All of Salon.com By department

  • Opinion
    Books ... Table Talk [Spirited Salon forums] What do you need to look for in a laptop? Have you tried VOIP?
  • Posts of the week
  • The Well [Pioneering members-only discussions] What do Miles Davis and hurricanes have in common? Sound Off
  • Letter to the Editor Salon Blogs
  • NYC: Short fiction NYC: Personal Essay SF: Personal Essay LA: Personal Essay Seattle: Personal Essay NYC: Poetry writing NYC: Joyce Maynard lecture Suggest a city or class Subscribe Gift Subscriptions Upgrade your account ... Investor Relations Hackers on Atkins Geeks who go low-carb see it as more than just taking off pounds they're reengineering the human organism, overclocking their own bodies. By Katharine Mieszkowski For Dave Sifry, 35, attending LinuxWorld in the summer of 2002 meant more than just a chance to luxuriate in the latest insider buzz about Red Hat, Suse and Debian. It also was an unexpected chance to learn about a body-reengineering hack increasingly popular with computer programmers and affiliated geeks. There's nothing particularly bleeding-edge about eating the hamburger but not the bun, now that low-carb dieting has

    138. Hackers Develop Anti-censorship Software
    CNN
    http://cnn.com/2001/TECH/internet/07/17/censorship.reut/index.html

    139. Linux Fights Off Hackers - Vnunet.com
    Linux systems are getting tougher for Hackers to crack, security experts havereported today. A study by notfor-profit IT security testing organisation
    http://www.vnunet.com/vnunet/news/2126530/linux-fights-hackers
    View UK websites Accountancy Age Active Home Computer active Computing CRN Financial Director Infomatics Information World Review IT Week Management Consultancy Network IT Week Personal Computer World PC Magazine VNU Web seminars vnunet.com Web active What PC? Register Update details HOME NEWS ... More... All articles News Reviews Downloads Forums Jobs White Papers vnunet.com News Operating Systems Print Discuss Send to friend Default installations of Linux getting harder to compromise R E L A T E D C O N T E N T Similar articles News centre More from vnunet.com ADVERTISEMENT
    Linux fights off hackers
    Open source no easy pickings Iain Thomson

    140. Computer Security Company To Hackers Bring It On
    CNN
    http://cnn.com/2001/TECH/computing/01/15/hacking.contest.ap/index.html

    A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

    Page 7     121-140 of 201    Back | 1  | 2  | 3  | 4  | 5  | 6  | 7  | 8  | 9  | 10  | 11  | Next 20

    free hit counter