Geometry.Net - the online learning center
Home  - Book_Author - Hackers The
e99.com Bookstore
  
Images 
Newsgroups
Page 9     161-180 of 201    Back | 1  | 2  | 3  | 4  | 5  | 6  | 7  | 8  | 9  | 10  | 11  | Next 20
A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

         Hackers The:     more books (99)
  1. Winner-Take-All Politics: How Washington Made the Rich Richer--and Turned Its Back on the Middle Class by Paul Pierson, Jacob S. Hacker, 2010-09-14
  2. A Writer's Reference by Diana Hacker, Nancy Sommers, 2010-10-25
  3. Hackers & Painters: Big Ideas from the Computer Age by Paul Graham, 2010-05-01
  4. Hackers: Heroes of the Computer Revolution - 25th Anniversary Edition by Steven Levy, 2010-05-20
  5. Hacker's Delight by Henry S. Warren, 2002-07-27
  6. The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws by Dafydd Stuttard, Marcus Pinto, 2007-10-22
  7. Rules for Writers by Diana Hacker, 2011-07
  8. CEH Certified Ethical Hacker Study Guide by Kimberly Graves, 2010-04-26
  9. Writer's Reference 6e & MLA Quick Reference Card by Diana Hacker, Barbara Fister, 2006-11-23
  10. Higher Education?: How Colleges Are Wasting Our Money and Failing Our Kids---and What We Can Do About It by Andrew Hacker, Claudia Dreifus, 2010-08-03
  11. Pocket Style Manual: Updated With Mla's 1999 Guidelines by Diana Hacker, 1999-03
  12. Hacker & Moore's Essentials of Obstetrics and Gynecology: With STUDENT CONSULT Online Access (Essentials of Obstetrics & Gynecology (Hacker)) by Neville F. Hacker MD, Joseph C. Gambone DO, et all 2009-02-04
  13. Official Certified Ethical Hacker Review Guide by Steven DeFino, Barry Kaufman, 2009-11-09
  14. The Hacker Crackdown: Law And Disorder On The Electronic Frontier by Bruce Sterling, 1993-11-01

161. Hackers
Hackers. History, definition, difference between hacking and cracking. Hacker s Ethic.The Hacker Manifesto.
http://project.cyberpunk.ru/idb/hackers.html
Subculture
Hackers
Hackers are the elite corps of computer designers and programmers. They like to see themselves as the wizards and warriors of tech. Designing software and inventing algorithms can involve bravura intellection, and tinkering with them is as much fun as fiddling with engines. Hackers have their own culture, their own language. And in the off-hours, they can turn their ingenuity to sparring with enemies on the Nets, or to the midnight stroll through systems you should not be able to enter, were you not so very clever. Dark-side hackers, or crackers , slip into systems for the smash-and-grab, but most hackers are in it for the virtuoso ingress. It's a high-stress life, but it can be amazing fun. Imagine being paid - well paid - to play forever with the toys you love. Imagine. From St. Jude, Mondo 2000: Users's Guide to the New Edge.
A hacker is the one who
  • enjoys exploring the details of programmable systems and how to stretch their capabilities, as opposed to most users, who prefer to learn only the minimum necessary. programs enthusiastically (even obsessively) or who enjoys programming rather than just theorizing about programming.
  • 162. CNN.com - Technology - Denial Of Service Hackers Take On New Targets - February
    CNN
    http://www.cnn.com/2000/TECH/computing/02/09/denial.of.service/index.html
    technology > computing Editions myCNN ... Feedback
    CNN Sites CNN CNN Europe CNNfn CNNSI myCNN CNNfyi AllPolitics Languages
    Search
    CNN.com CNNSI.com CNNfn.com The Web
    TECHNOLOGY

    TOP STORIES
    Consumer group: Online privacy protections fall short

    Guide to a wired Super Bowl

    Debate opens on making e-commerce law consistent

    MORE

    TOP STORIES More than 11,000 killed in India quake Mideast negotiators want to continue talks after Israeli elections MORE BUSINESS ... MORE MARKETS 4:30pm ET, 4/16 DJIA NAS SPORTS Jordan says farewell for the third time ... LOCAL EDITIONS: CNN.com Europe change default edition MULTIMEDIA: video video archive audio multimedia showcase ... more services E-MAIL: Subscribe to one of our news e-mail lists Enter your address: DISCUSSION: chat feedback CNN WEB SITES: CNNfyi.com CNN.com Europe AsiaNow Spanish ... Korean Headlines TIME INC. SITES: Go To ... Time.com People Money Fortune EW CNN NETWORKS: CNN anchors transcripts Turner distribution SITE INFO: help contents search ad info ... jobs WEB SERVICES:
    Denial of service hackers take on new targets
    By D. Ian Hopper CNN Interactive Technology Editor February 9, 2000

    163. Lists.ximian.com Mailing Lists
    evolutionHackers People writing code for Evolution. About evolution-Hackers Subscribe to evolution-Hackers by filling out the following form.
    http://lists.ximian.com/mailman/listinfo/evolution-hackers
    lists.ximian.com Mailing Lists
    No such list evolution-hackers Below is a listing of all the public mailing lists on lists.ximian.com. Click on a list name to get more information about the list, or to subscribe, unsubscribe, and change the preferences on your subscription. To visit the general information page for an unadvertised list, open a URL similar to this one, but with a '/' and the right list name appended. List administrators, you can visit the list admin overview page to find the management interface for your list. If you are having trouble using the lists, please contact mailman@lists.ximian.com List Description Cocoa-sharp [no description available] Connector Ximian Connector user mailing list Glade-announce Announcements of new versions of Glade and closely related packages Glade-devel Discussions about the development of Glade Glade-users Discussions about using Glade Gtk-sharp-list Discussion of the .Net bindings for Gnome Gtkhtml [no description available] Mono-announce-list Mono Project Announcements mono-bugs Mono Bugs Mono-devel-list Mono Development Mono-docs-list Documentation for Mono.

    164. CNN.com - Technology - Insulate Your PC From Hackers - August 10, 2000
    CNN
    http://www.cnn.com/2000/TECH/computing/08/10/diy.hacker.proofing.idg/index.html
    technology > computing Editions myCNN ... Feedback
    CNN Sites CNN CNN Europe CNNfn CNNSI myCNN CNNfyi AllPolitics Languages
    Search
    CNN.com CNNSI.com CNNfn.com The Web
    TECHNOLOGY

    TOP STORIES
    Consumer group: Online privacy protections fall short

    Guide to a wired Super Bowl

    Debate opens on making e-commerce law consistent

    MORE

    TOP STORIES More than 11,000 killed in India quake Mideast negotiators want to continue talks after Israeli elections MORE BUSINESS ... MORE MARKETS 4:30pm ET, 4/16 DJIA NAS SPORTS Jordan says farewell for the third time ... LOCAL EDITIONS: CNN.com Europe change default edition MULTIMEDIA: video video archive audio multimedia showcase ... more services E-MAIL: Subscribe to one of our news e-mail lists Enter your address: DISCUSSION: chat feedback CNN WEB SITES: CNNfyi.com CNN.com Europe AsiaNow Spanish ... Korean Headlines TIME INC. SITES: Go To ... Time.com People Money Fortune EW CNN NETWORKS: CNN anchors transcripts Turner distribution SITE INFO: help contents search ad info ... jobs WEB SERVICES:
    Insulate your PC from hackers
    From... by Jeff Sengstack (IDG) It was getting late, so Jim Jarrard, president of Cinenet, a stock film footage company in Simi Valley, California, decided to leave his computer on overnight to finish downloading a big file. While Jarrard was gone, a hacker accessed his PC over its DSL Internet connection and loaded a program giving the intruder power to commandeer Jarrard's computer, steal valuable film files, and erase the system's hard drives. Allan Soifer, an Ottawa, Ontario, electronic mailing list administrator, didn't realize a distant hacker had been scanning his home PC for hours. The hacker had found a way in and needed only a password to access Soifer's files. So he pelted the machine with computer-generated words, hoping for a lucky match. Fortunately, neither of the hackers got the goods.

    165. Hackers Use Google To Access Photocopiers - ZDNet UK News
    Photocopiers are the latest networked devices to fall prey to Hackers armed with Hackers are using search engines to watch what people photocopy.
    http://news.zdnet.co.uk/internet/security/0,39020375,39167848,00.htm
    Making mobile working work for your company
    All of ZDNet News Insight Comment White Papers Reviews Prices Downloads All the Web newsletters News Internet Security Saturday 10th September 2005
    Hackers use Google to access photocopiers Dan Ilett
    ZDNet UK
    September 24, 2004, 15:50 BST
    Tell us your opinion
    Making copies of something important? Photocopiers are the latest networked devices to fall prey to hackers armed with nothing more than Google's search engine Hackers are using search engines to watch what people photocopy.
    Using Google hacks requests typed into the search engine that bring up cached information on networks hackers are discovering and using login details for networked photocopiers so they can watch what is being copied. "You don't have to be a genius to do this," said Jason Hart, security director at Whitehat UK. "You can see what people are photocopying on your monitor. You just have to search for online devices on Google." Google stores billions of Web URLs and information sent from Web servers. Some Web servers, if configured incorrectly or left to default, can accidentally broadcast network information, such as IP addresses, login details and device information. Google, like many other search engines, stores this information, which can be recalled at any time. "Essentially Google caches everything on the Web," said Hart. "By inputting commands into Google you can extract information and use it as a reverse-engineering tool."

    166. CNN - Kosovo Cyber-war Intensifies: Chinese Hackers Targeting U.S. Sites, Govern
    CNN
    http://www.cnn.com/TECH/computing/9905/12/cyberwar.idg/index.html

    MAIN PAGE
    WORLD ASIANOW U.S. ... news quiz
    CNN WEB SITES: TIME INC. SITES: Go To ... Time.com People Money Fortune EW MORE SERVICES: video on demand video archive audio on demand news email services ...
    pagenet

    DISCUSSION: message boards chat feedback
    SITE GUIDES: help contents search
    FASTER ACCESS: europe japan
    WEB SERVICES:
    Main Page
    Bracing for Cyberwar Hacking Primer Scenes from the 'Hacker Underground' ... Related Sites
    Kosovo cyber-war intensifies: Chinese hackers targeting U.S. sites, government says
    May 12, 1999

    Web posted at: 2:01 p.m. EDT (1801 GMT)
    by Ellen Messmer From...
    ALSO: Insurgency on the Internet Sign up for the Computer Connection email service For more computing stories (IDG) The war in Kosovo has intensified as hackers on either side of the conflict try to take over or block Web servers around the world. The federal government said today that Chinese hackers have joined the online war, targeting U.S. government sites over the accidental bombing of the Chinese embassy in Belgrade last Friday. Web sites at the departments of Energy and the Interior and the National Park Service were hijacked on Sunday by intruders claiming to be from mainland China. The Department of Energy (DOE) has sent an alert to other federal agencies and defense contractor warning them of possible mailbombing attacks from China. Meanwhile, the White House shut down www.whitehouse.gov for three days because of security concerns stemming from a non-stop denial-of-service attack. The site only came back up this morning.

    167. Cisco Hit By Hackers
    Cisco hit by Hackers All your passwords are belong to us Hackers COULD havebeen harvesting passwords and data from under the noses of the networking
    http://www.theinquirer.net/?article=25171

    168. CNN.com - Sci-Tech - Hackers Deface EC Web Site In 2nd Incident - June 14, 2001
    CNN
    http://cnn.com/2001/TECH/internet/06/14/ec.site.hack.idg/index.html
    MAIN PAGE
    WORLD

    U.S.

    WEATHER
    ...
    ABOUT US

    CNN TV what's on
    show transcripts

    CNN Headline News

    CNN International
    ...
    askCNN

    EDITIONS CNN.com Asia CNN.com Europe set your edition Languages Time, Inc. Time.com People Fortune EW
    Hackers deface EC Web site in 2nd incident
    From... By Joris Evers AMSTERDAM, The Netherlands (IDG) Dutch hackers on Tuesday defaced the Safer Internet Exchange, a Web site sponsored by the European Commission that promotes a safer Internet. Security at the site had been increased last week after other hackers raised a red flag about possible vulnerabilities. The cybervandals left a message taunting the server administrators and law enforcement and inserted two hyperlinks, one to a Web site for Hackers at Large 2001, an event to be held in the Netherlands in August, and one to a database elsewhere on SaferInternet.org. The database, which can be downloaded by following the link, contains about 475 e-mail addresses of people who subscribe to the SaferInternet.org mailing list, according to a security expert who examined the database and requested anonymity. IDG.net INFOCENTER

    169. Nmap Hackers: Microsoft Tightens The Noose On Raw Sockets
    Soon Hackers discovered that the substantial technical differences were justa registry key setting. MS backed down and removed the limitation.
    http://seclists.org/lists/nmap-hackers/2005/Apr-Jun/0000.html

    Nmap stealth port scanner

    Intro

    Docs

    Download
    ...
    Sponsors:

    Nmap Hackers: Microsoft Tightens the Noose on Raw Sockets
    Microsoft Tightens the Noose on Raw Sockets
    From fyodor_at_insecure.org
    Date : Sat, 23 Apr 2005 01:25:54 -0700
    Many of us were annoyed last year when Microsoft intentionally broke
    raw sockets on Windows XP, while leaving the feature enabled in
    Windows 2003. MS is well known for maintaining the upgrade treadmill by dubious means such gratuitous file format incompatibilities, but this is a new low. People pay $299.99 for WinXP Pro with working raw sockets, then MS cripples their systems and demands $1019 (WS2003 retail price) to return the functionality. Of course Microsoft claims this change is necessary for security. That is funny, since all of the other major platforms Nmap supports (e.g. Mac OS X, Linux, *BSD) offer raw sockets and yet they haven't become the wasp nest of spambots, worms, and spyware that infest so many Windows boxes. This takes us back to 1996, when MS released Windows NT 4.0

    170. Report Says Tax Returns Were Vulnerable To Hackers
    CNN
    http://cnn.com/2001/TECH/internet/03/15/irs.privacy.ap/index.html

    171. Hackers News - Security & Hacking Information - Index
    Translate this page Hackers News is a daily updated security related site. We offer information onthe latest advisories, viruses, press releases, papers, etc.
    http://www.hackers-news.com/
    Main
    Home

    Forum

    FAQ

    News
    English

    French

    Unix/Linux

    Microsoft
    ...
    White-paper

    Community Affiliates Chat room Memberlist Usergroups ... Register Members Profile Messages Login / Logout Support Antivirus Password Ports list Ports scanner ... Security links Hackers-News.com Site Index Forum Index Login : Username: Password: Log me on automatically each visit News in French / Nouvelle en Français - Reach our forums News in English / Nouvelle en Anglais - Reach our forums Vulnerabilities - Reach our forums Vulnerabilities for Unix-Linux-GNU - Reach our forums Vulnerabilities for Microsoft - Reach our forums White-paper / How-to - Reach our forums HN Panel The time now is 10 Sep 2005 20:27 Who is Online View unanswered posts Latest virus Mesure d'audience ROI frequentation par wc3 : html / css Powered by phpBB Design : c0m création

    172. Battle For The Heart Of The Internet || Kuro5hin.org
    If you're interested in helping to stop this injustice and let the Real World know that Hackers will fight for what's right, there are a number of upcoming events that need your meatspace attendance and support. Editorial and list of August 2001 events.
    http://www.kuro5hin.org/?op=displaystory;sid=2001/8/5/144034/3083

    173. Hackers And Foes Exchange Ideas - Technology - International Herald Tribune
    Even the ATMs were suspect at this year s DefCon conference, an annual meetingwhere Hackers play intrusion games at the bleeding edge of computer security.
    http://www.iht.com/articles/2005/08/02/business/hacker.php

    Subscribe to the newspaper

    ARTICLE TOOLS

    CHANGE FORMAT
    PRINT PAGE

    EMAIL ARTICLE

    • Business Asia by Bloomberg Your Money ... Remove all read clippings
      TODAY IN TECHNOLOGY An iPod phone? Not quite The End User: Next step for Wi-Fi Check on your home, even from the road
      LANGUAGE TOOLS Language Tools What is this? English Definitions English->Spanish English->French English->German English->Italian Eng->Portuguese
      Powered by Ultralingua
      ARTICLE TOOLS CHANGE FORMAT PRINT PAGE EMAIL ARTICLE ) FONT ( ) FONT
      Hackers and foes exchange ideas
      The Associated Press WEDNESDAY, AUGUST 3, 2005 LAS VEGAS Even the ATMs were suspect at this year's DefCon conference, an annual meeting where hackers play intrusion games at the bleeding edge of computer security. With some of the world's best digital break-in artists pecking away at their laptops, even sending e-mails or answering cellphones seemed risky at the hackers convention last weekend. DefCon is a no man's land where customary adversaries - federal agents and digital mavericks - are supposed to share ideas about making the Internet safer. But it is really a showcase for flexing hacker muscle. At the 13th annual meeting this year, hot topics included a demonstration of how easy it may be to attack supposedly foolproof biometric safeguards, which determine a person's identity by scanning things like thumb prints, irises and voice patterns. Banks, supermarkets and even some airports have begun to rely on such systems, but one security specialist, who goes by the name Zamboni, challenged hackers to bypass biometrics by attacking their back-end system networks. "Attack it like you would Microsoft or Linux," he advised.

    174. CNN.com - Decoy PCs Give Hackers A Security Lesson - July 17, 2001
    CNN
    http://cnn.com/2001/TECH/internet/07/17/honeynet.project.idg/index.html
    MAIN PAGE
    WORLD

    U.S.

    WEATHER
    ...
    ABOUT US

    CNN TV what's on
    show transcripts

    CNN Headline News

    CNN International
    ...
    askCNN

    EDITIONS CNN.com Asia CNN.com Europe set your edition Languages Time, Inc. Time.com People Fortune EW
    Decoy PCs give hackers a security lesson
    From... By Andrew Brandt (IDG) For the best security, hack the hackers, suggest security experts who have spent several months watching malicious intruders break into disguised decoy systems on the Internet. The informal study found it was only two to four days before hackers attacked an unprotected Windows 98 system with its file sharing enabled. Hackers attacked one such system four times in a five-day period. The fastest takeover was 15 minutes, when a hacker broke into a PC running Red Hat Linux 6.2. An ongoing organization may form out of this informal research, known as the Honeynet Project. Security researchers created a network of PCs they dubbed honeypots, named for the attractive but troublesome favorite treat of children's book character Winnie the Pooh. In this case, the group placed PCs on the Internet in various states of security and designed to attract hackers, says Lance Spitzner, who described the experiment at the final day of the annual Black Hat Briefings security conference here last week. Some of the computers ran with the default installations of their operating systems, while team members patched others with the latest security fixes. Then they placed the PCs on the Internet in such a way that Honeynet Project members could closely observe the systems without being noticed by hackers. They recorded the exact methods hackers used to break into those and other systems, and even recorded the text conversations of a notorious group of Web page defacement hackers known as GForce Pakistan.

    175. "SCADA Vs. The Hackers," Feature Article, December 2002
    Hackers find modems by dialing phone numbers sequentially until one responds . Yet Hackers have found a way around this, too, Blomgren said.
    http://www.memagazine.org/backissues/dec02/features/scadavs/scadavs.html
    SCADA vs. the hackers
    Can freebie software and a can of Pringles bring down the U.S. power grid?
    by Alan S. Brown
    A s far as we know, no one has ever deliberately hacked into the U.S. electrical grid and pulled the plug on millions or even thousands of people. Just as on Sept. 10, 2001, no one had ever deliberately crashed a jet airliner into a skyscraper.
    Is the power grid vulnerable to cyberattack? What about natural gas pipelines, nuclear plants, and water systems? Or refineries and other industrial facilities that run on similar Internet-enabled digital control systems? Could a terrorist or disgruntled employee cause lethal accidents and millions of dollars of damage? What about a bored 14-year-old?
    "Are we vulnerable?" asked Joseph Weiss, executive consultant for KEMA Consulting, which is based in Fairfax, Va. "Of course, we are. We designed ourselves that way."
    None of the industrial control systems used to monitor and operate the nation's utilities and factories were designed with security in mind. Moreover, their very nature makes them difficult to secure. Linking them to networks and the public Internet only makes them harder to protect.

    176. CNN.com - Technology - Hackers Hit U.S., U.K., Australian Government Sites - Jan
    CNN
    http://cnn.com/2001/TECH/computing/01/22/government.hackers.idg/index.html
    technology > computing Editions myCNN ... Feedback
    CNN Sites CNN CNN Europe CNNfn CNNSI myCNN CNNfyi AllPolitics Languages
    Search
    CNN.com CNNSI.com CNNfn.com The Web
    TECHNOLOGY

    TOP STORIES
    Consumer group: Online privacy protections fall short

    Guide to a wired Super Bowl

    Debate opens on making e-commerce law consistent

    MORE

    TOP STORIES More than 11,000 killed in India quake Mideast negotiators want to continue talks after Israeli elections MORE BUSINESS ... MORE MARKETS 4:30pm ET, 4/16 DJIA NAS SPORTS Jordan says farewell for the third time ... LOCAL EDITIONS: CNN.com Europe change default edition MULTIMEDIA: video video archive audio multimedia showcase ... more services E-MAIL: Subscribe to one of our news e-mail lists Enter your address: DISCUSSION: chat feedback CNN WEB SITES: CNNfyi.com CNN.com Europe AsiaNow Spanish ... Korean Headlines TIME INC. SITES: Go To ... Time.com People Money Fortune EW CNN NETWORKS: CNN anchors transcripts Turner distribution SITE INFO: help contents search ad info ... jobs WEB SERVICES:
    Hackers hit U.S., U.K., Australian government sites
    From... by David Legard (IDG) A group of hackers has attacked government sites in the United States, United Kingdom, and Australia over the weekend, according to Attrition.org, a Web site that monitors hacking attacks.

    177. Foiling E-document Hackers
    PhysOrg news Foiling edocument Hackers. Ref Foiling e-document HackersUsers have told us that on-demand secure file transfer capabilities should
    http://www.physorg.com/news5248.html
    bookmark PhysOrg.com HOME FORUM WEBLOG ...
    Xbox Rocks

    last post by the resident alien
    last post by NSNBT
    Holy Crap

    last post by WaterBreath
    432 pools per second? - can this man count

    last post by shaunlamont
    A Flaw of General Relativity, a Fix, etc.

    last post by thingumbobesquire
    question about speed of light
    last post by Good Elf End of lithography at 32 nm? last post by Empyre Gravitational Theory Refuted last post by J. Wensveen I want to traverse time.please answer my questions last post by Empyre last post by Maxim All today's posts News archive Search Help us make our site better! ... Take PhysOrg.com Survey The survey takes less than two minutes, there's nothing to identify you personally, and you won't receive any email or other sales pitches by participating.
    Foiling e-document hackers
    July 18, 2005 A worker sends an office colleague an e-mail with a corporate document attached, but the seeming routine message turns out to harbor a malicious passenger, because the attachment contains hidden pornographic images that were inserted by a hacker during it's transmission over the Internet. When the document is opened by a female employee, she files a lawsuit for sexual harassment. Today's news: Electronic Devices

    178. CNN.com - Instant-messaging Tool For Hackers Poses A Threat - November 26, 2001
    CNN
    http://cnn.com/2001/TECH/internet/11/26/instant.hacker.tool.idg/index.html
    MAIN PAGE
    WORLD

    U.S.

    WEATHER
    ...
    ABOUT US/HELP

    CNN TV what's on
    show transcripts

    CNN Headline News

    CNN International
    ...
    askCNN

    EDITIONS CNN.com Asia CNN.com Europe CNNenEspanol.com CNNArabic.com ... set your edition Languages Spanish Portuguese German Italian Korean Arabic Japanese Time, Inc. Time.com People Fortune EW InStyle Business 2.0
    Instant-messaging tool for hackers poses a threat
    From... By Laura Rohde (IDG) A new hacking tool using the instant messaging platform Internet Relay Chat (IRC) is rapidly spreading across the Internet and has the potential to shut down Web servers. Called "Voyager Alpha Force," the tool has already been used to infect about 300 computers, according to various reports, but its biggest threat lies in its ability to be used in distributed denial-of-service attacks, according to security experts. IDG.net INFOCENTER Related IDG.net Stories Features

    179. CNN In-Depth Specials - Hackers
    CNN
    http://www.cnn.com/TECH/specials/hackers/news.archive/index.html

    MAIN PAGE
    WORLD ASIANOW U.S. ... news quiz
    CNN WEB SITES: TIME INC. SITES: Go To ... Time.com People Money Fortune EW MORE SERVICES: video on demand video archive audio on demand news email services ...
    pagenet

    DISCUSSION: message boards chat feedback
    SITE GUIDES: help contents search
    FASTER ACCESS: europe japan
    WEB SERVICES:
    Main Page
    Bracing for Cyberwar Hacking Primer Scenes from the 'Hacker Underground' ... Related Sites
    News articles on hacking and computer security
    Computer Network Security Cyberterrorism and Government Security Privacy and Encyption Hackers on the Web Hackers and the Courts More recent articles
    COMPUTER NETWORK SECURITY

    180. O'Reilly Network: Hackers And Trackers: CP4E
    Hackers and Trackers CP4E. by Stephen Figgins 01/31/2000. Hackers and trackersshare a highly tuned sense of their environments, as well as an ability to
    http://www.oreillynet.com/pub/a/network/2000/01/31/hacktrack/
    Sign In/My Account View Cart Articles Weblogs ... eDocuments SAP TechEd '05. Learn to innovate. Search Login
    Register

    Manage Newsletters

    Register Your Books
    Sponsored Zones
    Novell Learning Channel
    Sites
    codezoo.com

    Databases

    LinuxDevCenter.com

    MacDevCenter.com
    ...
    WebServices.XML.com
    Affiliate Sites
    LinuxQuestions.org
    OSDir.com Servlets.com Resource Centers Bioinformatics C/C++ Databases Digital Media ... XML oreillynet.com supported by: Computer Community Print Email Add to Project Trackbacks Blog this Bookmark with del.icio.us
    Hackers and Trackers: CP4E
    by Stephen Figgins Hackers and trackers share a highly tuned sense of their environments, as well as an ability to move easily around and manipulate that environment. But just as few people share the skills of a natural tracker, most people also lack the ability a hacker has to control the online environment. In this column series, O'Reilly Network editor Stephen Figgins explores the similarities and discusses an effort to boost programming literacy Sometimes seemingly unrelated interests in my life overlap. This happened to me recently when I read Guido van Rossum's proposal to teach computer programming for everybody (CP4E). At the time, I had been listening to some insights Jon Young had into how tribal people teach their children the vast amount of knowledge they have about their environment. Jon Young is one of the founders of the Wilderness Awareness School in Duvall, Washington. He was the first student of Tom Brown, Jr., the author of

    A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

    Page 9     161-180 of 201    Back | 1  | 2  | 3  | 4  | 5  | 6  | 7  | 8  | 9  | 10  | 11  | Next 20

    free hit counter