Geometry.Net - the online learning center
Home  - Computer - Hacking
e99.com Bookstore
  
Images 
Newsgroups
Page 2     21-40 of 199    Back | 1  | 2  | 3  | 4  | 5  | 6  | 7  | 8  | 9  | 10  | Next 20

         Hacking:     more books (100)
  1. Hacking Exposed:Malware & Rootkits Secrets & Solutions by Michael Davis, Sean Bodmer, et all 2009-09-23
  2. Hacking Exposed Web Applications, 2nd Ed. (Hacking Exposed) by Joel Scambray, Mike Shema, et all 2006-06-05
  3. Hacking Harvard by Robin Wasserman, 2007-09-11
  4. Wi-Foo: The Secrets of Wireless Hacking by Andrew Vladimirov, Konstantin V. Gavrilenko, et all 2004-07-08
  5. Hacking Exposed: Network Security Secrets & Solutions, Second Edition (Hacking Exposed) by Stuart McClure, George Kurtz, 2000-10-11
  6. Hacking Wireless Networks For Dummies (For Dummies (Computer/Tech)) by Kevin Beaver, Peter T. Davis, 2005-09-13
  7. The Emergence of Probability: A Philosophical Study of Early Ideas about Probability, Induction and Statistical Inference (Cambridge Series on Statistical and Probabilistic Mathematics) by Ian Hacking, 2006-07-31
  8. Mad Travelers: Reflections on the Reality of Transient Mental Illnesses by Ian Hacking, 2002-11-30
  9. The Social Construction of What? by Ian Hacking, 2000-11-15
  10. Hacking Ubuntu: Serious Hacks Mods and Customizations (ExtremeTech) by Neal Krawetz, 2007-04-16
  11. Hands-On Ethical Hacking and Network Defense by Michael T. Simpson, 2005-10-19
  12. Home Hacking Projects for Geeks (Hacks) by Eric Faulkner, Tony Northrup, 2004-12-16
  13. Hacking Exposed Cisco Networks: Cisco Security Secrets & Solutions by Andrew Vladimirov, Konstantin Gavrilenko, et all 2005-12-15
  14. Hacking Exposed Windows: Microsoft Windows Security Secrets and Solutions, Third Edition by Joel Scambray, 2007-12-04

21. Puto Amo
Manuales de hacking y troyanos.
http://www.putoamo.host.sk

22. SecurityFocus
that kids should be taught computer programming and hacking skills from Excerpts more. hacking the Code ASP.NET Web Application Security
http://tmsyn.wc.ask.com/r?t=an&s=hb&uid=24312681243126812&sid=343126

23. Hacking The Xbox
After a period of direct distribution by the author, hacking the Xbox is hacking the Xbox includes numerous practical guides, such as where to get
http://hackingthexbox.com/
Xbox Security Secrets - Hardware Mod Tutorials - Interviews with Master Hackers - The Chilling Effects of the DMCA
(An Introduction to Reverse Engineering) Andrew "bunnie" Huang

Sample Pages
Table of Contents

Starter Hacks

Circuit Boards

Hardware
... Has my order shipped yet?
This hands-on guide to hacking was cancelled by the original publisher, Wiley, out of fear of DMCA-related lawsuits. After a period of direct distribution by the author, "Hacking the Xbox" is brought to you by the No Starch Press . The book begins with a few step-by-step tutorials on hardware modifications that teaches basic hacking techniques as well as essential reverse engineering skills. The book progresses into a discussion of the Xbox security mechanisms and other advanced hacking topics, with an emphasis on educating the readers on the important subjects of computer security and reverse engineering. Hacking the Xbox includes numerous practical guides, such as where to get hacking gear, soldering techniques, debugging tips and an Xbox hardware reference guide.
"Hacking the Xbox" confronts the social and political issues
facing today's hacker. The book introduces readers to the humans

24. Napolifirewall.com Primo Network Security-Underground In Campania
Portale sulla sicurezza informatica. Offre informazioni, news e soluzioni su firewalling, software e hacking.
http://www.napolifirewall.com/
Pagina Iniziale Preferiti Contact Forum Amici nel Mondo Merchandising Menu Home Antivirus Anti-Dialers Antivirus Open Source ... XP Firewall Included Distrazioni Immagini dal Web Dividere un file MP3 Da MP3 a CD Game - Pacman ... Languages Links ACCESSI DAL 02/02/2002
Work with us ! Write your own paper.
It will be issued as soon as possible. info@napolifirewall.com
Anti-Dialers

Buffer Overflow Attacks

Downloads
...
Game - A-Blast

Napolifirewall.com Benvenuti al sito napoletano della Sicurezza Informatica.
Per tenervi informati degli ultimi Virus e sul danno che questi provocano, su programmi per la difesa dei vostri computer e tantissime altre "dritte" del mondo informatico.
"non commerciale"

25. @stake, Inc. - Where Security Business Intersect
@stake, Inc., the premier digital security consulting company, provides security services and awardwinning products to assess and manage risk in
http://tmsyn.wc.ask.com/r?t=an&s=hb&uid=24312681243126812&sid=343126

26. Johnny.ihackstuff.com :: I'm J0hnny. I Hack Stuff.
Blackhat USA / Defcon 2005 Google hacking added 08/02/05. Passive Cache 0.4added 07/20/05 Welcome to the Google hacking Database (GHDB)!
http://johnny.ihackstuff.com/index.php?module=prodreviews

27. Computeruz.tk
Publicaţie lunară ce oferă articole despre hacking, telefoane mobile, sisteme de operare şi probleme hard şi soft.
http://computeruz.tk/

28. Attrition.org
Attrition is an eclectic collection of internet and computer security resources.
http://tmsyn.wc.ask.com/r?t=an&s=hb&uid=24312681243126812&sid=343126

29. Johnny.ihackstuff.com :: I'm J0hnny. I Hack Stuff.
Google hacking. That tour went (both live and taped) to approximately 25 major I m proud to announce the release of Infosec Career hacking by Syngress
http://johnny.ihackstuff.com/
@import url("themes/ambertech2/style/style.css"); Navigate Home
Who's Johnny?

Books

The Forums
...
Site Search

Newest Googledorks! intitle:"Powered by ... intitle:"Owl Intrane... intitle:"Cisco CallM... "Summary View of Sen... ... "Powered by SilverNe... Recent Files Defcon 2005 - Death by 1000 cuts added 08/02/05 Blackhat USA / Defcon 2005 - Google Hacking added 08/02/05 Passive Cache 0.4 added 07/20/05 detectwall.sh (Mac/BSD version!!!) added 06/03/05 Blackhat Europe 2005 added 04/01/05 ...more files... top downloads The Google Hacker's Guide (34817 hits) web hacking walkthrough (doc) (16632 hits) Attack Scenarios: Hackers in Action (14960 hits) Watching the Watchers: Hacking with Google (13985 hits) Gooscan Google Scanner (13163 hits) Google Masters User Points murfie jimmyneutron klouw golfo Jbrashars MILKMAN ThePsyko wolveso cybercide df yeseins MacUK rgod Deadlink digital.revolution urban hermes wasabi staplerkid Main Menu Home
Account/Login

Hurricane Katrina
Posted by: j0hnny - on Thursday, September 01, 2005 - 04:43 PM Update! I've put together an auction on ebay to aid the World Vision Hurricane Katrina fund. Up for auction are

30. ASTALAVISTA.NET - Advanced Security Member Portal V2.0
Eine Seite zu Untergrund Informationen und Suchmaschinen. Informations Verzeichnis rund ums Thema hacking, Exploits und IT Sicherheit. Teilweise Englisch und nur via Anmeldung. Mitgliedschaft erforderlich
http://www.astalavista.net/new/?lang=de

31. Insecure.Org - Nmap Free Security Scanner, Tools Hacking Resources
News articles covering Nmap version detection Slashdot, hacking Linux Exposed, Security Wire Digest.
http://tmsyn.wc.ask.com/r?t=an&s=hb&uid=24312681243126812&sid=343126

32. Hacker - Wikipedia, The Free Encyclopedia
On the US East Coast, cars were substituted for horses, and hacking was a A possible middle ground position observes that hacking describes a
http://en.wikipedia.org/wiki/Hacker
Hacker
From Wikipedia, the free encyclopedia.
For other uses, see Hacker (disambiguation) or Hacker (computer security)
Hacker is a term used to describe people proficient in computers . In programming communities, the term refers to people skilled in computer programming, administration and security with legitimate goals. Popular media and the general population use the word hacker to mean a black hat hacker , that is, a network security hacker who partakes in illegal activity or lacks in ethics. Those inside some programming communities have taken to calling these criminals "crackers". In computer programming hacker means a programmer who hacks or reaches a goal by employing a series of modifications to exploit or extend existing code or resources. In computer security hacker translates to a person able to exploit a system or gain unauthorized access through skill and tactics. This usually refers to a black hat hacker. In other technical fields, hacker is extended to mean a person who makes things work beyond perceived limits through their own technical skill, such as a hardware hacker , or reality hacker Types of hacker include Guru and Wizard . They have an atypical level of skill, even beyond other hackers. In some portions of the computer community, a Wizard is one who can do anything a Hacker can, but elegantly; while a Guru not only can do so elegantly, but instruct those who do not know how. In other portions, a Guru is one with a very broad degree of expertise, while a Wizard is expert in a very narrow field.

33. Welcome To HackFurby.com! - Site News
Another Furby hacking site, and free email forwarding as well.
http://www.hackfurby.com/
Home Secrets Protocol Schematic Rebuild HackFurby Alias HACKFURBY.COM
Quick Links: Contact: furby@hackfurby.com
Welcome to HackFurby.com
This site is designed to be the central location on the Internet for any and all Furby-hacking related stories. Whether you found a new sequence of petting and shakes that makes him do the Chicken Dance or you've discovered that Furby runs on fusion, we'll post it here, for all to read. Recent News:
  • May 9, 2000: Wow, a lot of people have been writing to me, wondering the status of Buck the Hacked Furby , and I haven't been able to give a good answer... So here's my quick update, just so everybody knows the score. I really will try to get some more info up, as I have a bunch of it: Just not the time... Buck has been completely rebuilt and reassembled, and looks pretty normal, except for four sets of wires coming out his back (servo 1, 2, 3, and speaker). I wrote a quick app in Visual Basic that takes a .wav file (which you provide) and syncs it with motion/time commands (which you write in a horribly manual process into a text file) which are sent via the serial port of your computer to the serial servo control (SSC) board that I bought for about $50. The result is a furby that talks like yoda, or whatever you want (That's what I did, at least).
    I do plan on releasing the code to do this, but there's no way I'm going to release Visual Basic code into the world. If I can stop just one person in this world from using VB, it'll be worth it. I may release a binary of the program at some point, though. The only problem is that I no longer have VB installed on my system, and I don't plan on reinstalling it... I'm doing some work with java serial controls, so I may do a port at some point, and then everyone will be happy.

34. Hacking - Wikipedia, The Free Encyclopedia
The term hacking has a number of meanings, not always very welldefined Retrieved from http//en.wikipedia.org/wiki/hacking
http://en.wikipedia.org/wiki/Hacking
Hacking
From Wikipedia, the free encyclopedia.
It has been suggested that this article or section be merged into Hack Discuss Look up hacking in Wiktionary , the free dictionary. New York street sign, c. 1965 The term hacking has a number of meanings, not always very well-defined:

35. Freaks Macintosh Archive Mac Hacks Hacking Exploits Mac Hackers Warez Internet S
Largest Macintosh (Hackintosh) security and hacking related site for the MacOS.
http://freaky.staticusers.net/
HACKINTOSH CDROM
About Us
Why do we do this?

Who Am I?

Contact Freak

Freaks Mac Archives

Site of the Week:
Mac Troubles

Archives
Newest Files

America Online
BBS Cracking ... XXX Site Related Site Updates Site Search Net Linked BBS rc5 Cracking Team ... Promotions Newest Files America Online BBS Cracking Denial of Service Faqs and Texts Internet Tools Network Tools Programming Security Viruses XXX Dumpster Diving Static- News: Updates and News: 6.28.2005 - FMA 2.0 = Soon :) It is headed your way, tieing up lose ends. Hacker News provided by HackWire and all the information you could ever want on mac virus - mac viruses 4.01.2003 - Been working on getting FMA 2.0 online for some time, the database is ready however Im still working on the perfect design for the site. Ive been staying up all hours drinking Coffee working on the perfect solution for it. 5.07.2002 - Just visited CellPhoneHacks.com - I like this site there are lots of help and messages about Hacking Cell Phones changing logos, along with hardware hacking and more. Amazon.com Toll Free # 18002017575

36. ASTALAVISTA SECURITY GROUP | Information And Internet Security Portal
Meta search engine for computer security, hacking, cracking, serials, freeware,and Open Source related material.
http://www.astalavista.com/
  • Home Top 10 Tools Security Directory
    Test your network security from a hacker's point of view with GFI LANguard N.S.S.!

    You're here: Home > Information and Internet Security Portal - Astalavista Security Search Underground Search CRACKINFO.NET (clean) ASTALAVISTA.BOX.SK (porn, popup) CRACKSPIDER.NET (clean) CRACKDB.COM (NEW) CRACKPORTAL.COM (NEW) SERIALSITE.COM (clean) New SUBSERIALS.NET (clean) New SERIALSPOT.COM (NEW) FREESERIALS.COM (porn pop-ups) MSCRACKS.COM (NEW) ALLSEEK.INFO (clean) FREELINE.WS (clean) TRINSIC.ORG (exe) ASTASERIALS (clean) FUNKYSEARCH.COM (clean) PHAZEDDL.COM (porn popup) CRACKS.ST (popup) DELUXESERIALS.COM (popup) SERIALS.WS (popups) CRACKFOUND.COM (banners, meta search) CRACK.RU (pop-up) THEBUGS.WS (clean) FULIR.COM SERIALS(clean) DARKSERIALS (clean) CRACKFIND.COM (clean) CRACKCRAWLER.NET (porn banner) CRACKSEARCH.WS (porn banner) NEWCRACKS.NET (porn popup, exe-installer) CLEANSERIALS.COM (NEW) GAMECOPYWORLD.COM (clean) STARTNOW.COM[web] (clean) MEGAGAMES[cheats] (banners, popups, exe) CHEAT-ZONE[cheats] (clean) CRACKYARD.COM (popup, dialer)

37. About Bardwell Manor Equestrian Centre.
A full service facility offering riding lessons for all ages and all levels, boarding, training, crosscountry hacking, plus shows and events year-round. Includes prices and event calendar. Located at Bardwell, near Bury St Edmunds, Suffolk.
http://www.bardwell-equestrian.co.uk
Bardwell Manor Equestrian Centre is situated just off the A143 outside of Ixworth,Suffolk.
We offer lessons for all ages and abilities and our facilities include:
  • Over 35 horses and ponies 3 full time qualified instructors An indoor school, so lessons can continue in all weathers Hacking out for experienced riders

We also hold competitions and pony days throughout the year. All our riders are encouraged to improve by tackling the Association of British Riding Schools tests, which are offered in both riding and horsecare.
Please see our events page for details of scheduled events

38. Slashdot | Hacking Hotels 101
hacking Hotels 101 article related to Security and IT.
http://it.slashdot.org/article.pl?sid=05/07/30/2350219&from=rss

39. The Official Unofficial C=Hacking Homepage
Technical publication for the Commodore 8bit community. Last updated in 2002but twenty one issues dating back to 1992 are available.
http://www.ffd2.com/fridge/chacking/
C=Hacking
Welcome to the cutting edge.
C=Hacking is an electronic technical publication for the Commodore 8-bit community, by the Commodore 8-bit community. The subject matter covers a broad range of topics including software, hardware, and other areas of interest to technically-minded readers. Articles are contributed on a voluntary basis and represent the cutting edge of Commodore 8-bit technical developments from its most innovative and productive members. For comments, or to contribute an article or article idea, either email the editor, OR... Visit the Hacking Exchange a C=Hacking message board. <- Check it out! Issues

40. Veridyn : Information Security Consulting
Network security consultants specializing in IT security assessments, policy development, and ethichal hacking.
http://www.veridyn.com
Your browser does not support script Need for Security Services
Companies have long known that failure to properly address network security vulnerabilities can bring heavy repercussions. The dangers include not only the disclosure of confidential information, but also damage to credibility, loss of access to resources during downtime, even fines and possible jail time for absence of due care or violation of security regulations. The frequency and impact of these threats are on the rise.
  • Newly discovered operating system vulnerabilities have increased to an average of over 80 vulnerabilities per month, Security Alert Consensus report.
  • A 2003 FBI/Computer Security Institute (CSI) investigation found that 75% of surveyed companies reported security breaches for an average financial loss of over $2 million.
  • An ISCA Labs report reveals that virus outbreaks have more than tripled in the past 6 years from 32 to over 100 encounters per 1,000 machines per month. Some data puts the proportion of affected companies at 77%.

Value of Outsourcing
The range of skills required for proper security program implementation is daunting. A business could spend upwards of $750,000 per year to retain a security staff with the requisite knowledge. Trained security professionals have spent years acquiring and applying these skills. Experience with advanced security administration and proficiency in technological and regulatory advances cannot be earned overnight. Through creation of business solutions for modern industries these professionals continuously develop means to streamline security program creation while increasing integrity.

Page 2     21-40 of 199    Back | 1  | 2  | 3  | 4  | 5  | 6  | 7  | 8  | 9  | 10  | Next 20

free hit counter