Geometry.Net - the online learning center
Home  - Computer - Hacking
e99.com Bookstore
  
Images 
Newsgroups
Page 3     41-60 of 199    Back | 1  | 2  | 3  | 4  | 5  | 6  | 7  | 8  | 9  | 10  | Next 20

         Hacking:     more books (100)
  1. Hands-On Ethical Hacking and Network Defense by Michael T. Simpson, Kent Backman, et all 2010-03-17
  2. Live Hacking: The Ultimate Guide to Hacking Techniques & Countermeasures for Ethical Hackers & IT Security Experts by Ali Jahangiri, 2009-10-21
  3. Hacking the Code: ASP.NET Web Application Security by Mark Burnett, 2004-05
  4. Hacking iSeries by Shalom Carmel, 2006-02-10
  5. Hacking the Cable Modem: What Cable Companies Don't Want You to Know by DerEngel, 2006-09-10
  6. Every Woman's Nightmare: The True Story Of The Fairy-Tale Marriage And Brutal Murder Of Lori Hacking by Steven Long, 2006-04-04
  7. Hacking World of Warcraft (ExtremeTech) by Daniel Gilbert, James Whitehead II, 2007-06-05
  8. Rewriting the Soul by Ian Hacking, 1998-08-03
  9. Hacking Roomba: ExtremeTech by Tod E. Kurt, 2006-11-20
  10. Hacking College by Dean Kohrs, 2010-06-23
  11. Hacker's Challenge 3: 20 Brand New Forensic Scenarios & Solutions (Hacking Exposed) (v. 3) by David Pollino, Bill Pennington, et all 2006-04-25
  12. Scientific Revolutions (Oxford Readings in Philosophy)
  13. Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions by David Endler, Mark Collier, 2006-11-28
  14. Hacking the PSP: Cool Hacks, Mods, and Customizations for the SonyPlayStationPortable (ExtremeTech) by Auri Rahimzadeh, 2006-10-30

41. Mozilla Hacking In A Nutshell
(If you re looking for the document called hacking Mozilla that used to live atthis page, hacking Mozilla with Bonsai (aka Being on the Hook )
http://www.mozilla.org/hacking/
Skip to main content
Mozilla
search mozilla:
Hacking Mozilla Table of Contents
To get your code checked into mozilla.org's CVS repository you'll need to understand our code development cycle coding practices , and checkin requirements . You probably also want to have a reasonable understanding about the project's organization (If you're looking for the document called Hacking Mozilla that used to live at this page, go to the first link below.)
A. Code Development
Life Cycle of a Patch (formerly "Hacking Mozilla")
An overview of how to get the source, develop patches, get them reviewed, super-reviewed and checked in the tree. Mozilla Hacker's Getting Started Guide
How is the source code organized, where to start, critical tools, rules to follow to contribute. Good First Bugs
Want to help, but don't know where to start? Here are a few suggestions. Code review
An FAQ about mozilla.org's code review and super-review process - what it's for, how it works, what to expect. Super-review
What code needs super-review, what to do if you're seeking a super-review, a list of super-reviewers, plus some tips about what to consider in your code before seeking super-review.

42. The Hacking Depot - Kies Je Taal - Choose Your Language
Informatie over cryptografie, computerbeveiliging, hacken en phreaking.
http://mediatheek.thinkquest.nl/~ll152
Enter Je hebt de Macromedia Flash 4 plugin nodig om deze site te kunnen bekijken.
Zet je boxen aan, want er zit geluid bij de intro.
Je kunt deze site het beste in een resolutie van 800 x 600 of 1024 x 768 en minstens 16-bits kleuren. © 2000, ThinkQuest Leerlingteam 152

43. C++ Portability Guide
Module Owners hacking Get the Source Build It Testing Releases Nightly Builds Report A Bug Tools Bugzilla Tinderbox Bonsai LXR
http://www.mozilla.org/hacking/portable-cpp.html
Skip to main content
Mozilla
search mozilla: C++ portability guide
version 0.8

originally by David Williams , 27 March 1998
Updated and maintained by Scott Collins Christopher Blizzard , and David Baron What follows is a set of rules, guidelines, and tips that we have found to be useful in making C++ code portable across many machines and compilers. insert favorite C++ feature We will endeavor to keep the information up to date (for example, sometimes a new compiler revision will lift a restriction). If you have updates on any of these tips, more information, more ideas, please forward them to Christopher Blizzard Scott Collins , or David Baron If you find code in Mozilla that violates any of these rules, please report it as a bug . You can use bonsai to find the author. None of these rules is absolute. If patch authors can demonstrate that what they want to do works on all the compilers we support, they're welcome to break, and revise, these rules. However, this is a lot of work, and is not recommended unless you have a very good reason for wanting to do it.
C++ portability rules.

44. Hacking For Human Rights?
Article about the Cult of the Dead Cow, the Hong Kong Blondes, and hacktivism. Wired
http://www.wired.com/news/news/politics/story/13693.html

45. Mark Dery
Mark Dery popularized the term culture jamming , and wrote a pamphlet titled Culture Jamming hacking, Slashing and Sniping in the Empire of Signs .
http://www.levity.com/markdery/

46. Annual Hacking Game Teaches Security Lessons
We did intentionally deemphasize defense, because it is a hacking competition,after all, said the organizer. By agreement, the group that ran the game
http://www.securityfocus.com/news/11269
Search: Home Bugtraq Vulnerabilities Mailing Lists ... Product Search Annual hacking game teaches security lessons
Robert Lemos SecurityFocus
LAS VEGAS The weekend-long Capture the Flag tournament stressed code auditing as a measure of hacking skill this year, a move that emphasized more real-world skills, but not without controversy. Giovanni Vigna, associate professor of computer science at the University of California, Santa Barbara, and leader, team Shellphish, winner of WarGamez at DEF CON The annual Capture the Flag tournament at DEF CON has always attracted participants from a variety of background, looking to try their hands at online attack and defense. Under a new set of organizers this year, the game pitted teams and individuals against each other to find and exploit vulnerabilities in their opponents' systems to score points. The game, dubbed "WarGamez" this year, put more emphasis on real-world skills compared to previous years, said Giovanni Vigna , associate professor of computer science at the University of California at Santa Barbara and the leader of team Shellphish, which won the event "The game required skills that are also required by both security researchers and hackers, such as ability to analyze attack vectors, understanding and automating attacks, finding new, unpredictable ways to exploit things," Vigna said. "It's about analyzing the security posture of a system that is given to you and about which you initially know nothing."

47. Network Security Archive
Archive of network security related lists.
http://www.networksecurityarchive.org
Network Security Archive
Archives listed from most recently updated to oldest updated. Name Current Index Last Updated FullDisclosure [Date] [Thread] Bugtraq ...
Hack In The Box

48. SFF Net
By Wil McCarthy; Basic Books, 2003, ISBN 046504428X. Programmable matter, via quantum dots, will someday change our lives. Author visits labs of major firms, talks to researchers developing this extraordinary technology. SFF Net
http://www.sff.net/people/wmccarth/hm.htm
In Memoriam
Dan Patterson

Robert Wise
Home Help ... Join SFF Net
Menu 404 (Page Not Found)

Sorry, but the document you requested was not found on this server. Please inform the webmaster on the referring site. You can try searching for the information you want, or you can go directly to SFF Net's Home Page Search for: Home Help Search Contact Us ...
SFF Net
(tm)
We welcome your Feedback at any time.

49. Hacking The TiVo
This site contains information and utilities to use to hack your TiVo.
http://www.tivofaq.com/hack/
The unofficial TiVo Hackers Site
This site contains information and utilities to use to hack your TiVo. It should be noted that most of the things detailed here will void your TiVo's warranty. You do this at your own risk. Do not come crying if you damage your TiVo. The first thing you should check out is the "Hacking the TiVo FAQ". This contains the most update information on hacking your TiVo and lots of interesting info about the TiVo unit in general. Click to read the TiVo Hacking FAQ To add a second drive to your TiVo you will need the BlessTiVo program. It is available on a standalone Linux bootdisk created by an AVS member named Dlyan. Be sure to read the above FAQ first and the readme included with the BlessTiVo program before attempting this upgrade. Click to download BlessTiVo Version 3 , click to view the readme file (also included in the BlessTiVo archive). If you would like to download the C source code to the BlessTiVo program you can download it here . The code is released under the GPL. If you make any changes to it, feel free to send them to me for inclusion in the official version. If you port the program to another OS or platform please send your changes to me for inclusion into the official version. Also to see many of the latest stuff for hacking the TiVo, check out the following links.

50. U.S. Arrests Los Alamos Lab Employee For Alleged Hacking
CNN
http://cnn.com/2001/TECH/computing/01/10/losalamos.hacker.reut/index.html

51. Hacking The TiVo FAQ
You have no frames! So, click here to go to the TiVo Hack FAQ.
http://www.tivofaq.com/hack/faq.html
You have no frames! So, click here to go to the TiVo Hack FAQ.

52. Hacking Exposed - Web Applications
Book that covers how to hack web applications, and how to secure against the attacks detailed. Author profiles, links to tools referenced in the book and reviews.
http://www.webhackingexposed.com/

AUTHORS

PRODUCTS

CONTENTS

ERRATA
...
HackingExposed.com

Over three years ago, Hacking Exposed introduced many people to the ease with which computer networks and systems are broken into. Although there are still many today who are not enlightened to this reality, large numbers are beginning to understand the necessity for firewalls, secure operating system configuration, vendor patch maintenance, and many other previously arcane fundamentals of information system security. Unfortunately, the rapid evolution brought about by the Internet has already pushed the goalposts far upfield. Firewalls, operating system security, and the latest patches can all be bypassed with a simple attack against a Web application. Although these elements are still critical components of any security infrastructure, they are clearly powerless to stop a new generation of attacks that are increasing in frequency every day now. Meeting the Web App Security Challenge
Hacking Exposed: Web Applications shows you how to meet this challenge with the two-pronged approach adapted from the original Hacking Exposed, now in its third edition. First, we catalog the greatest threats your Web application will face and explain how they work in excruciating detail. How do we know these are the greatest threats? Because we are hired by the world's largest companies to break into their Web applications, and we use them on a daily basis to do our jobs.

53. Hacking Linux Exposed
Companion Website to hacking Linux Exposed, Osborne/McGrawHill. Source code fromthe book, updates, and other tools to secure your Linux system.
http://www.hackinglinuxexposed.com/
Secure your Linux network by thinking like an attacker. In Hacking Linux Exposed, Second Edition we are able to cover Linux hacking in more detail than ever before. We are able to show you where Linux may differ from other Unix-like systems and give you Linux-specific countermeasures that you can implement immediately. In the hard-hitting style of Hacking Exposed Hacking Linux Exposed, Second Edition once again dives into the actual attacks used by the enemy. Look no further for the actual exploitation techniques used to surreptitiously gain access to Linux systems. Hacking Linux Exposed, Second Edition covers the myriad ways a malicious hacker will attack your Linux system, and the rationale behind such behaviour. While the bad guys are well versed in such techniques, this book serves to educate the home user as well as the overworked and underpaid system administrator who is not only responsible for the operation of mission-critical Linux servers, but who must vigilantly secure them on a daily basis. For more information, see the

54. Your Spectrum 12 - Hacking Away & QL Affairs
Adds a platform to the First Landing allowing Willy to reach the cross and the hidden object.
http://www.users.globalnet.co.uk/~jg27paw4/yr12/yr12_05.htm
Your Spectrum
Home
Contents KwikPik HACKING
AWAY
All the POKEs and more! Send your hacking hints to Andrew Pennell, Hacking Away, Your Spectrum, 14 Rathbone Place, London W1P 1DE.
Welcome to this month's hacking column - and have we got some strange POKEs for you! I'll start off with Mr Wimpy from Ocean. Peter Ball wrote in with POKE 33501,0 to skip the first screen, or alternatively you can POKE 33501 with a one or a two to make the game a little harder to complete. You can also POKE 33509 with the required number of lives (though beware of high numbers corrupting the screen display), or POKE 33693,0 for more straightforward infinite lives. You can also POKE 33721 with the number of peppers required, or POKE 43105 for unlimited peppers (this has to be one of the strangest POKEs ever!).
A couple of months ago I described the annoying aspect of Ultimate's loading programs, in that they include all the important bits in line number zero; this meant you had to duplicate the line to make them work. Well, I had loads of letters telling me that POKE 23756,1 changes it into line 1 (which I must admit I did know). Trouble is, it doesn't work if you've invested in an Interface 1 unit. Lucky (?) Interface 1 owners should resort to:
POKE (1+PEEK 23635+256'PEEK 23636),1

55. Hacking Linux Exposed
The hacking Linux Exposed Companion Website. hacking Linux Exposed Authorswrite more than they wish to admit. Brian Hatch has coauthored Building
http://www.hackinglinuxexposed.com/articles/
Hacking Linux Exposed Authors write more than they wish to admit. Brian Hatch has co-authored Building Linux VPNs . James has lead-authored Open Source Web Development with LAMP In addition, Brian has written several articles for SecurityFocus
  • Filtering E-Mail with Postfix and Procmail. Discusses the UCE/UBE filters available in the Postfix mail server, integrating spam prevention and filtering strategies in the Procmail local mail delivery agent, and two top-notch filters, Vipul's Razor and SpamAssasssin. part one part two part three part four
  • An Overview of LIDS, the Linux Intrusion Detection System, teaches you in depth about how LIDS can extend the traditional Linux security model to enforce stricter file and capabilities ACLs. part one part two part three part four ...
  • Firewall-related /proc entries on Linux , an expanded version of one of the Linux Security: Tips, Tricks, and Hackery newsletters.
Brian also speaks at conferences. You can find all of his Presentations available on his Home Page Brian Hatch also writes the " Linux Security: Tips, Tricks, and Hackery

56. Computer Hacking And Ethics
Computer hacking and Ethics. Brian Harvey paper was written for the ``Panelon hacking held by the Association for Computing Machinery in April, 1985.
http://www.cs.berkeley.edu/~bh/hackers.html
Computer Hacking and Ethics
Brian Harvey
University of California, Berkeley [A slightly different version of this paper was written for the ``Panel on Hacking'' held by the Association for Computing Machinery in April, 1985. Thanks to Batya Friedman, Donn Parker, and Carter Sanders for their comments on early drafts.] [Neal Patrick] said he and his friends, who named themselves the ``414s'' after the Milwaukee area code, did not intend to do any damage and did not realize they were doing anything unethical or illegal. In fact, when asked [at a Congressional subcommittee hearing] at what point he questioned the ethics of his actions, he answered, ``Once the FBI knocked on the door.'' It's no secret that a mature sense of ethics is something a person develops over time. Parents are supposed to exercise authority over their children because the children are not expected to know how to make certain decisions for themselves. We have a juvenile court system separate from the adult criminal court system because we believe that a young person is not capable of criminal intent in the same sense that an adult is capable of it.

57. GameBoy Dev'rs - What's New?
Detailed information concerning the programming, modification, and hacking of Game Boy hardware.
http://www.devrs.com/gb/
Do you develop for other things? Devrs.com GameBoy Dev'rs http://www.devrs.com/ gb/ GameBoy Got info to post? Modify FAQs ... Search What's New? What's New? Jobs Jobs Apps Assemblers C Compilers GBCamera Compression ... Sound Asm Code Compression Games Graphics Macros ... Random #'s C Code Games Graphics Misc Sound Data Fonts Misc Docs FAQs Misc Patents Sound ... Tutorials Hardware Cart Writers Game Link GB/Cart Misc Links DemoArchives Discussion Misc
PDRC #3.33 - Started GB/C accepted - Posted by: Kojote
To celebrate Kojote's first quarter century of life on 20th June 2005, here is another competition. PD Roms Coding Competition #3.33. The compo will start on the 20th June 2005 @ 00:00 GMT +2 and will end 25 days later on the 14th July 2005 @ 23:59 GMT +2.
Minigame competition - Posted by: RoboNes
This years minigame competition is running, and is open to all 8,16 and 32bit machines and ends on the end of september, visit site for more details
Original GameBoy Bootstrap Finally Extracted! - Posted by: DuoDreamer
Being that we haven't been able to extract the DMG bootstrap in the entire history of the dev scene, this is a very exciting announcement.
2-Bit Epic - An Epic filmed with a GameBoy Camera - Posted by: DuoDreamer
Hasn't been much in the way of news on here lately, so here is something odd and new, an "Epic" filmed with a GameBoy Camera, or something like that. Just go see. =)

58. A History Of Hacking
hacking has been around for more than a century. An Indiana hacker knownas Fry Guy so named for hacking McDonald s is raided by law enforcement
http://www.sptimes.com/Hackers/history.hacking.html
Hackers WE ARE HACKERS A history of hacking Florida's hacker connections Altering a Web site STREET SMARTS The bible of phreaking faithful ... Home
A history of hacking Hacking has been around for more than a century. In the 1870s, several teenagers were flung off the country's brand new phone system by enraged authorities. Here's a peek at how busy hackers have been in the past 35 years. Early 1960s University facilities with huge mainframe computers, like MIT's artificial intelligence lab, become staging grounds for hackers. At first, "hacker" was a positive term for a person with a mastery of computers who could push programs beyond what they were designed to do. Early 1970s John Draper John Draper makes a long-distance call for free by blowing a precise tone into a telephone that tells the phone system to open a line. Draper discovered the whistle as a give-away in a box of children's cereal. Draper, who later earns the handle "Captain Crunch," is arrested repeatedly for phone tampering throughout the 1970s. Yippie social movement starts YIPL/TAP (Youth International Party Line/Technical Assistance Program) magazine to help phone hackers (called "phreaks") make free long-distance calls.

59. CNN.com - Technology - Mitnick Schools Feds On Hacking 101 - March 3, 2000
CNN
http://www.cnn.com/2000/TECH/computing/03/03/mitnick.the.prof/mitnick.the.prof.h
technology > computing Editions myCNN ... Feedback
CNN Sites CNN CNN Europe CNNfn CNNSI myCNN CNNfyi AllPolitics Languages
Search
CNN.com CNNSI.com CNNfn.com The Web
TECHNOLOGY

TOP STORIES
Consumer group: Online privacy protections fall short

Guide to a wired Super Bowl

Debate opens on making e-commerce law consistent

MORE

TOP STORIES More than 11,000 killed in India quake Mideast negotiators want to continue talks after Israeli elections MORE BUSINESS ... MORE MARKETS 4:30pm ET, 4/16 DJIA NAS SPORTS Jordan says farewell for the third time ... LOCAL EDITIONS: CNN.com Europe change default edition MULTIMEDIA: video video archive audio multimedia showcase ... more services E-MAIL: Subscribe to one of our news e-mail lists Enter your address: DISCUSSION: chat feedback CNN WEB SITES: CNNfyi.com CNN.com Europe AsiaNow Spanish ... Korean Headlines TIME INC. SITES: Go To ... Time.com People Money Fortune EW CNN NETWORKS: CNN anchors transcripts Turner distribution SITE INFO: help contents search ad info ... jobs WEB SERVICES: Main Page Bracing for Cyberwar Hacking Primer Scenes from the 'Hacker Underground' ... Related Sites
Mitnick schools feds on hacking 101
From...

60. Elevator Hacking - Engadget - Www.engadget.com
Elevator hacking. Posted Aug 2, 2005, 1212 PM ET by Peter Rojas Related entriesMisc. Gadgets elevator buttons. Calling this a hack is way too generous,
http://www.engadget.com/entry/1234000340052853/
Atticus Wu on Engadget Chinese Available in: Chinese Japanese Spanish Have great gadget news? Let us know
Elevator hacking
Posted Aug 2, 2005, 12:12 PM ET by Peter Rojas
Related entries: Misc. Gadgets
[Via Digg Read Permalink Email this ... Comments
Recent Entries
Cambridge Silicon Radio pitching Apple on Bluetooth iPod
How would you change the Motorola ROKR E1?

Dell DJ Ditty now available

Apple may upgrade Power Mac G5 line as early as next week
...
Add your comments
Reader Comments
Posted Aug 2, 2005, 12:17 PM ET by Adam awesome! muahaha Posted Aug 2, 2005, 12:23 PM ET by Alcaron lol I wanna go take an elevator ride just to test this! I'll wait till my co-worker gets back though.
Hahaha, forget falling to your death, try being beaten to a bloody pulp by a bunch of angry elevator goers. :) Posted Aug 2, 2005, 12:25 PM ET by Chaz Very cool that this is here. Having worked in construction before my current occupation as a networking geek I know of this but rarely used it for fear of getting my @$$ kicked by the other people on the elevator. Posted Aug 2, 2005, 12:29 PM ET by Justin Turner

Page 3     41-60 of 199    Back | 1  | 2  | 3  | 4  | 5  | 6  | 7  | 8  | 9  | 10  | Next 20

free hit counter