Geometry.Net - the online learning center
Home  - Computer - Hacking
e99.com Bookstore
  
Images 
Newsgroups
Page 5     81-100 of 199    Back | 1  | 2  | 3  | 4  | 5  | 6  | 7  | 8  | 9  | 10  | Next 20

         Hacking:     more books (100)
  1. Hacking the Human by Ian Mann, 2008-11-01
  2. Hacking GMail (ExtremeTech) by Ben Hammersley, 2005-12-19
  3. Windows Server 2003 (Hacking Exposed) by Joel Scambray, Stuart McClure, 2006-10-27
  4. The CEH Prep Guide: The Comprehensive Guide to Certified Ethical Hacking by Ronald L. Krutz, Russell Dean Vines, 2007-10-22
  5. Hardware Hacking: Have Fun While Voiding Your Warranty by Joe Grand, Ryan Russell, 2004-01-01
  6. Hacking the Earth by Jamais Cascio, 2009-01-01
  7. Hacking Knoppix (ExtremeTech) by ScottGranneman, 2006-01-04
  8. Hacking Exposed Wireless: Wireless Security Secrets & Solutions by Johnny Cache, Vincent Liu, 2007-03-26
  9. uCertify Guide for EC-Council Exam 312-49 Computer Hacking Forensic Investigator: Pass your CHFI Certification in first attempt (Volume 1) by uCertify team, 2010-04-08
  10. Hack Attacks Revealed: A Complete Reference with Custom Security Hacking Toolkit by John Chirillo, 2001-04-05
  11. Hacking Windows Vista: ExtremeTech by Steve Sinchak, 2007-05-29
  12. Hacking BlackBerry: ExtremeTech by Glenn Bachmann, 2006-10-30
  13. Hacking Web Services (Internet Series) by Shreeraj Shah, 2006-08-02
  14. The Oracle Hacker's Handbook: Hacking and Defending Oracle by David Litchfield, 2007-01-30

81. Hacking For Democracy
Interview with Oxblood Ruffin, founder of Hacktivismo, about the ethics of political hacking. By Mark Moyes. Shift
http://www.shift.com/print/web/396/1.html

82. Kernel Hacking HOWTO
By sharing my experience, I hope to make kernel hacking more accessible Kernel hacking may not be hard, but it certainly could not be described as easy.
http://www.kernelhacking.org/docs/kernelhacking-HOWTO/
Kernel Hacking HOWTO Next
Kernel Hacking HOWTO
Andrew Ebling
kh.howto@andyebling.clara.co.uk Revision History Revision 0.17 ajme Grammatical and typo corrections, plus readability enhancements. Added a note on BitKeeper. Added suggested starting points for reading kernel code. Review of structure, audience and aim of the document. Revision 0.16 ajme Complete read through following a good break, spell & grammar review, added abstract, revised Introduction and prerequisites, new email address, added some FAQs, added "Your Turn" sections. Revision 0.15 ajme Conversion to DocBook 3.1 SGML to make maintaining the glossary less time consuming, full spell check and a lot of small fixes and improvements. Revision 0.14 ajme Started glossary, lots of small fixes. Revision 0.13 ajme Added "Boot time Parameters" section in "General Hacking", CVS section added in tools chapter, "The Linux Kernel Development Cycle" section started, more URLs added and lots more small fixes. Revision 0.12

83. Mark Dery's Pyrotechnic Insanitarium
1994.05.00
http://www.levity.com/markdery/barbie.html
Hacking Barbie's Voice Box: 'Vengeance is Mine!' New Media magazine, "Technoculture" column, May '94 issue Barbie is a voodoo doll. Enshrined in the imaginations of millions of American girls as the personification of Breck Girl good looks and prom queen popularity, she has a shoe collection Imelda Marcos would die for, and nothing but perfect hair days. The culture wars of the '90s, however, have turned her into an ideological pincushion. Some of the little girls whose hot-pink-and-turquoise-blue fantasies were filled with Barbie's dream dates and shopping sprees have grown into feminists who revile the bimbette as an embodiment of sexual stereotypes and air-headed consumerism. If this seems like a weighty burden to lay on a piece of polystyrene, bear in mind that the doll casts a long shadow over American girlhood. When Barbie speaks, little girls listen, which is why controversy erupted in 1992 when Teen Talk Barbie exclaimed, "I love shopping," "Meet me at the mall," and "Math class is tough." This last phrase struck an especially sour note, given the under-representation of women in the sciences-a state of affairs Shirley M. Tilghman argues is directly attributable to "the low expectations that our education system sets on the performance of females in physics and math." Thus, it seems inevitable that a group of feminists, anti-war advocates and culture jammers should have hacked Barbie's voice box this past December. The Manhattan-based Barbie Liberation Organization claims to have performed corrective surgery on 300 Teen Talk Barbies and Talking Duke G.I. Joes-switching their sound chips, repackaging the toys, and returning them to store shelves. Consumers reported their amazement at hearing Barbie bellow, "Eat lead, Cobra!" or "Vengeance is mine!," while Joe chirped, "Will we ever have enough clothes?" and "Let's plan our dream wedding!" A spokesman for the BLO told the New York Times, "We are trying to make a statement about the way toys can encourage negative behavior in children, particularly given rising acts of violence and sexism."

84. InfoSec Institute: Ethical Hacking Course Information Network Security Training
Commerical hacker training course on how to write and use exploits.
http://www.infosecinstitute.com/courses/ethical_hacking_training.html
About Us Security Training Courses Current Promotions Why Choose InfoSec? ... Luxury Accommodations
Security Training Courses
Ethical Hacking Advanced Ethical Hacking Intrusion Prevention Computer Forensics Training ... Jack Koziol's Ethical Hacking and Computer Forensics Blog
Ask a Technical Student Coordinator A Network Security Training Question
Name: Business Phone No: Email: Ask a Student Coordinator a Question:
Ethical Hacking: Security Testing and Certified Ethical Hacker
InfoSec Institute: Network Security Training
Ethical Hacking: Security Testing for Professionals
Our most popular information security and hacking training goes in-depth into the techniques used by malicious, black hat hackers with attention getting lectures and hands-on lab exercises . While these hacking skills can be used for malicious purposes, this class teaches you how to use the same hacking techniques to perform a white-hat, ethical hack, on your organization. You leave with the ability to quantitatively assess and measure threats to information assets; and discover where your organization is most vulnerable to hacking in this network security training course. The Best Defense is a Good Offense:
The goal of this course is to help you master a repeatable, documentable hacking methodology that can be used in an ethical penetration testing or hacking situation. This ethical security training course has a significant Return on Investment, you walk out the door with hacking skills that are highly in demand, as well as the Certified Ethical Hacker certification!

85. SpamNEWS : The Anti-spam, Email Abuse Prevention Newsfeed
Daily journals of concise, complete enews for pro's, about hacking, cracking, spam, and security issues.
http://www.petemoss.com/

Get spamNEWS daily
newsBLOG Weekly Digest
Sponsors:

Bernard Shifman
is A Moron Spammer SPAM Resources about peteMOSS
spamnews
the email abuse point of reference since 1996
Welcome to peteMOSS Publications'
spamNEWS resource center! spamNEWS is a concise aggregation of vital information relevant to professionals in the anti-spam sector: Up-to-the-minute press coverage and topical editorials about e-mail abuse, related online security matters, legal and political issues, as well as articles on Internet marketing and privacy. spamNEWS is read by email systems administrators, ISP management, online marketing executives, government officials and the volunteer anti-spammer community; anyone whose personal or professional life is focused on the detrimental impact the avalanche of unsolicited email has had upon Internet users and systems for the better part of a decade.. The weekly spamNEWS digest is available free of charge at Abuse.net Spam page , and is posted to USENET and email anti-abuse discussion groups. Go ahead and poke around in the nooks and crannies of this site - there is much to discover!

86. Audreyhacking.com :: Hacking The Audrey
hacking the Audrey. This site will discuss hacking and exploitation of the3COM Ergo Audrey. The audrey is an internet appliance developed to fill the
http://www.audreyhacking.com/
@import url("themes/Korporate/style/style.css"); Hacking the Audrey Main Menu Home
Your Account

Submit News

Live Chat
...
Files

Who's online There are currently 10 guests and members online
You are not logged on
Recent Forum Activity
  • Re: Audrey Update Servers Officially No Longer Available
  • Re: QNX 6.1 shared libraries?
  • Re: Mount CF card
  • QNX 6.1 shared libraries? ...
  • Mount CF card vist the forum
    Buy Audreyhacking.com Gear Show your Audrey Hacking pride with some audrey hacking gear. Check out our action shots
    Update Server Spoof's Linux Marimba server at: http://2-1b.artoo.net
    Audrey Special Links Viewable only from Audrey
  • Scheduled tasks Primary timeserver System profile Open shell
  • Led Controls Solid Blin k Off Information Produced and hosted by NaTa2.com If you wish to advertise on this site, please email info@nata2.com This is probably the weirdest site on the internet. Hacking the Audrey This site will discuss hacking and exploitation of the Ergo Audrey. The audrey is an internet appliance developed to fill the void between the desktop and the Palm. Running QNX with PalmOS extensions it is ripe to be hacked and used for all sorts of interesting things. For more information check out

    87. Los Alamos Lab Employee Arrested For Alleged Hacking
    CNN
    http://cnn.com/2001/TECH/computing/01/11/nuclear.hacker.01.reut/index.html

    88. Hacking And Hackers - Computer Security Programs Downloading Search Engines Port
    Computer security,network security,hacking,hacker,crackers,cracks,serials,crack,serial,search engines,search engine,search,virus,virii,webpages,downloads
    http://www.infosyssec.com/
    security security news virus news hacking news hacker trojan underground headlines newsticker security news antivirus exploit denial of service DDoS advisories trojan backdoor sniffer smurfwindows securityXP security security products security books security tips security faq authentication computer security crack crackers crash cryptography denial of service DOS email virus alerts encrypting file system encryption exploits firewall firewalls hack hacks hack files hack links hacked webpages hacker hackers hacking hacking files hacking links hot fixes icmp intruder intrusion detection news ip spoof Kerberos key logger logon microsoft security NT nt security nt server ntsecurity ntshop password password crackers patches permssions phreaking boxes port monitors proxy proxy servers secure security security news security firewalls cryptography vulnerabilities vulnerability news encrypting file system hotfixes authentication password permissions proxy servers antivirus virus system policies smart cards smart cards source route spoofing syn flood system policies texts virii virus viruses vulnerabilities vulnerability wardialers win2k sec win2k security win2k sec windows 2000 security windows 2000 windows windows NT windows nt security

    89. { End Bracket }: Hacking The Immune System -- MSDN Magazine, September 2005
    { End Bracket } hacking the Immune System MSDN Magazine, September 2005.
    http://msdn.microsoft.com/msdnmag/issues/05/09/EndBracket/default.aspx
    Microsoft.com Home Site Map MSDN Home Developer Centers ... Worldwide Search for
    MSDN and KB MSDN Library Code and Downloads MSDN Magazine Knowledge Base (KB)
    Advanced Search
    MSDN Magazine Home September 2005 Search ... September 2005 Hacking the Immune System
    Nebojsa Jojic
     and  David Heckerman
    HIV is a major global health problem,   with over 40 million people infected worldwide. Biomedical researchers are working to create a vaccine that would be effective against many different strains, taking into account all the individual differences in people's immune systems. Viral RNA sequences have been extracted from thousands of blood samples from infected patients. Each sequence is a string of about 9000 nucleotides serving as a program for viral assembly. Parts of patients' own genomes are sequenced in order to categorize their immune types, which are known to affect immune response and thus viral diversity through natural selection. The resulting datasets present immense difficulty to biomedical researchers. The genetic code defies visualization in much the same way that computer binary code would without the software tools to parse, convert, and edit it in a higher language. But, as opposed to the binary code which was created by humans, the genetic code follows rules that are not fully understood. Therefore, researchers are turning to modern data-mining techniques to discover patterns of viral evolution. The problem of parsing the structure of the genetic sequences (RNA/DNA or proteins), is similar to the problem of parsing the structure of other natural signals, such as images or sounds. At Microsoft Research, we have been working on machine-learning and data-mining algorithms that aim to automatically parse such data for uses relevant to Microsoft, such as video/image browsing, spam filtering, and speech recognition. These same techniques can be applied to medicine.

    90. N O R T H F E L L . C O M
    Article on website hacking covering footprinting, IP scanning and an example IIS hack. Also has computer security weblog and an overview of BS7799.
    http://www.northfell.com/
    n o r t h f e l l . c o m
    Welcome to our web world
    Welcome to northfell.com. We've been occupying this little corner of the web since 1999 having first checked out the lie of the land back in 1994 (nearly 12 years as netizens, my how things have changed!).
    So what happens here? During the working week we're all silicon, metal and elecric power... that's computers, specifically IT security consultancy. But at the weekend it's back to nature with wood, stone, leather and bone. We like to go in the lo-tech direction where you can find us into traditional archery, flint knapping and generally getting back to a more natural way of life. Also in there somewhere is support for those fighting injustice, corruption and human rights abuses. More power to their collective elbows and we say thanks to the Net: a medium that allows their message to reach a wider audience. Some of our interests are reflected by the links in the "Out there" section on the right.
    Partly bridging the gap between opposed lifestyles is our latest hobby: digital photography. We've had a digital compact camera (Olympus mju 300) for several years and it's good for your average snapper but now we've decided to do things a little more seriously so we've bought a Canon EOS 300D to play with. The pictures will be posted on this site under the "Digital Portfolio" section on the right as and when we have the time, available in a range of sizes and formats for reasonable prices :-) Our latest angle is wildlife photography, although presently that means mostly captive creatures - not having the time or money to fly around the world visiting exotic locations (but if you buy the photos... who knows?). We hope you like what you see and keep checking back for more.

    91. Linux Netfilter Hacking HOWTO
    Linux netfilter hacking HOWTO. Rusty Russell and Harald Welte, mailing listnetfilter@lists.samba.org. $Revision 1.14 $ $Date 2002/07/02 040719 $
    http://www.netfilter.org/documentation/HOWTO/netfilter-hacking-HOWTO.html
    Next Previous Contents
    Linux netfilter Hacking HOWTO
    Rusty Russell and Harald Welte, mailing list netfilter@lists.samba.org
    $Revision: 1.14 $ $Date: 2002/07/02 04:07:19 $ This document describes the netfilter architecture for Linux, how to hack it, and some of the major systems which sit on top of it, such as packet filtering, connection tracking and Network Address Translation.
    Introduction

    92. Your Spectrum 09 - Frontlines & Hacking Away
    POKEs that simplify the Nightmare Room, improve jumping ability, and that automatically collect all the objects in a room on entry.
    http://www.users.globalnet.co.uk/~jg27paw4/yr09/yr09_03.htm
    Your Spectrum
    Home
    Contents KwikPik DOUBLE CHIPS FIRST FORTH ON ROM FOR CURRAH ANIROG DELETE SPECTRUM BBC Radio kicks off with a double-helping of computing this Autumn with Barry Norman re-opening The Chip Shop on Radio 4 and Radio 1 listeners getting their own computer show with the launch of Radio l's Chip Shop which makes up part of the Saturday morning Mark Page Show
    The Radio 1 Chip Shop will be broadcast at 7:33 am on Saturday morning, starting on September 29th and will be presented by David Freeman. Free Basicode software will be broadcast on Sunday morning at 5:55am and repeated at the same time on Saturdays. You'll need a Basicode Kit 2 Cater Road, Bristol B513 7TW
    If you really can't stand the thought of getting up so early on a Saturday morning, you could always tune into The Chip Shop on Radio 4 at the slightly more reasonable time of 4:15pm though you won't get the software.
    Barry Norman broadcast his second show of the series 'live' from the PCW Show on September 22nd this year. Currah, manufacturers of the MicroSpeech unit, has announced a new product to be available from them ... 'soon'.

    93. Phreaking, Caller ID Hacking - Welcome To Artofhacking.com!
    A site dedicated to the pursuit of technical knowledge hacking, phreaking,Caller ID and more!
    http://artofhacking.com/
    FORUMS: Caller ID Mobile Scan Results Privacy ...
    ...and more!

    Text files by
    The Fixer, El Oscuro
    AOH Staff
    and AOH Contributors Recover Passwords
    Phone Sounds

    More Phone Sounds

    The Fixer's
    Box Review ...
    Latest (final?) Issue: #63

    Updated Sep 02/2005
    More Payphone Info
    Felis Nox Media It's Back! Check it out now! Some of our CD graphics were made by the incredibly talented webmistress of Ramona's Café Graphics , a site we host at the AOH complex. If you run a website that needs a makeover, be sure to find out what Sassy can do for you... The Web Page You Have Reached is now... And you thought we had a lot of telephone sounds! Also visit 2600 Magazine , The Hacker Quarterly The resume of George W. Bush? Click here Read this book online for free! Weapons of Mass Delusion America's Real National Emergency The Memory Hole A monkeywrench in the American Brainwashing Machine Our w3bw34rZ store is gone, but hax0r sw4g is still 13370... document.write(''); Miserable Failure What the heck is this about? "In a free society, diversity is not disorder, debate is not strife

    94. I-Hacked.com Taking Advantage Of Technology - Home
    IHacked.com is a hardware hacking based website. Taking apart electronics andmaking them better.
    http://www.i-hacked.com/Misc/Random-Stuff/Hacking-Coke-Machines.html
    Home 16 September 2005 Main Menu Home News Forums Downloads ... Reviews Login Form Username
    Password
    Remember me
    Forgot your password?
    Latest Edge The Edge of I-Hacked Vote for us in Top 100 Security Sites Newsflash Don't wait, I-Hacked T-shirts are going fast! Welcome to I-Hacked.com
    Electronics are everywhere, and technology drives pretty much everything we do in today's world. We show you how to take advantage of these electronics to make them faster, give them added features, or to do things they were never intended to do.
    We are not a "cracking" site, we are hackers. Our inquisitive nature leads us to find ways of making technology work for us. We do not support unauthorized access into systems, breaking into email systems, or anything of that nature. Please do not email me asking me how to do this type of stuff.
    Please enjoy your stay, check out the articles, and submit some of your own. As a community we can share our tips/tricks/and hacks with each other. The I-Hacked.com's "Most Wanted" are articles that we are currently looking for articles to be written about.

    95. CNN.com - Technology - Brazil, NASA Sites Under Attack In International Hacking
    CNN
    http://www.cnn.com/2000/TECH/computing/03/17/brazil.nasa.hackers/index.html
    technology > computing Editions myCNN ... Feedback
    CNN Sites CNN CNN Europe CNNfn CNNSI myCNN CNNfyi AllPolitics Languages
    Search
    CNN.com CNNSI.com CNNfn.com The Web
    TECHNOLOGY

    TOP STORIES
    Consumer group: Online privacy protections fall short

    Guide to a wired Super Bowl

    Debate opens on making e-commerce law consistent

    MORE

    TOP STORIES More than 11,000 killed in India quake Mideast negotiators want to continue talks after Israeli elections MORE BUSINESS ... MORE MARKETS 4:30pm ET, 4/16 DJIA NAS SPORTS Jordan says farewell for the third time ... LOCAL EDITIONS: CNN.com Europe change default edition MULTIMEDIA: video video archive audio multimedia showcase ... more services E-MAIL: Subscribe to one of our news e-mail lists Enter your address: DISCUSSION: chat feedback CNN WEB SITES: CNNfyi.com CNN.com Europe AsiaNow Spanish ... Korean Headlines TIME INC. SITES: Go To ... Time.com People Money Fortune EW CNN NETWORKS: CNN anchors transcripts Turner distribution SITE INFO: help contents search ad info ... jobs WEB SERVICES: Main Page Bracing for Cyberwar Hacking Primer Scenes from the 'Hacker Underground' ... Related Sites
    Brazil, NASA sites under attack in international hacking volley
    March 17, 2000

    96. I-Hacked.com Taking Advantage Of Technology - Hacking Coke Machines
    IHacked.com is a hardware hacking based website. Taking apart electronics andmaking them better., Getting Secret Menus on Coke Machines.
    http://www.i-hacked.com/content/view/12/48/
    Home Misc Random Stuff Hacking Coke Machines 16 September 2005 Main Menu Home News Forums Downloads ... Reviews Login Form Username
    Password
    Remember me
    Forgot your password?
    Latest Edge The Edge of I-Hacked Vote for us in Top 100 Security Sites Newsflash Don't wait, I-Hacked T-shirts are going fast! Hacking Coke Machines Sunday, 26 September 2004
    Thanks to ch0pstickninja for teaching the world about the menu, and for Fire for assisting with research.
    PREFACE
    Coke vending machines are everywhere. They're getting more and more like regular computers with LEDs that show little "ICE COLD" messages and whatnot. Well, there's a lot more to those little built-in computers than you may think. Included in the low-level operating system that these babies run on is an actual debug menu that gives you access to all sorts of machine information and possibly gives you free cokes in older machines.
    WHICH MACHINES WORK?

    97. CNN - Hacking Group Reveals IP-security Glitch - August 13, 1999
    CNN
    http://www.cnn.com/TECH/computing/9908/13/ipglitch.idg/index.html

    MAIN PAGE
    WORLD ASIANOW U.S. ... news quiz
    CNN WEB SITES: TIME INC. SITES: Go To ... Time.com People Money Fortune EW MORE SERVICES: video on demand video archive audio on demand news email services ...
    pagenet

    DISCUSSION: message boards chat feedback
    SITE GUIDES: help contents search
    FASTER ACCESS: europe japan
    WEB SERVICES:
    Main Page
    Bracing for Cyberwar Hacking Primer Scenes from the 'Hacker Underground' ...
    From...
    Hacking group reveals IP-security glitch
    August 13, 1999

    Web posted at: 1:50 p.m. EDT (1750 GMT)
    by Kathleen Ohlson ALSO: Hackers, IT consultants embrace free security tool Hacking your way to an IT career (IDG) A hacking group says it's discovered a security vulnerability affecting Windows 95, 98 and 2000 as well as the SunOS and Solaris operating systems, allowing unauthorized users to intercept outgoing information. The problem is related to the ICMP (Internet Control Message Protocol) Router Discovery Protocol (IRDF), which determines the way computers connect to the Internet. The glitch lets an attacker spoof a route, according to an advisory issued Wednesday by hacker-security specialists L0pht Heavy Industries (link below). As a result, attackers can reroute outbound traffic on vulnerable systems; modify traffic; act as "man in the middle;" or launch denial of service attacks, L0pht said. All of these attacks, excluding denial of service, require the unauthorized user to be on the same network as the victim, the specialists said. Man-in-the-middle attacks occur when an attacker acts as "a proxy between the victim and end host," L0pht said. The victims think they are directly connected to the end host, but they are actually connected to the attacker, who is connected to the end host feeding information through. For example, an attacker acting as man in the middle may access all banking information online without the victim knowing, L0pht said.

    98. BBC News | SCI/TECH | Hacking With A Pringles Tube
    Empty cans of Pringles crisps could soon be helping malicious hackers spot wirelessnetworks that are vulnerable to attack.
    http://news.bbc.co.uk/hi/english/sci/tech/newsid_1860000/1860241.stm
    CATEGORIES TV RADIO COMMUNICATE ... INDEX SEARCH You are in: Sci/Tech Front Page World UK ... AudioVideo
    SERVICES Daily E-mail News Ticker Mobiles/PDAs Feedback ... Low Graphics Friday, 8 March, 2002, 09:23 GMT Hacking with a Pringles tube
    A crisp can is an effective tool for curious hackers
    By Mark Ward
    BBC News Online technology correspondent Empty cans of Pringles crisps could be helping malicious hackers spot wireless networks that are open to attack. Security company i-sec has demonstrated that a directional antenna made with a Pringles can significantly improves the chances of finding the wireless computer networks being used in London's financial district. An informal survey carried out by i-sec using the homemade antenna has found that over two-thirds of networks were doing nothing to protect themselves. The security firm said all the companies at risk could easily thwart anyone that wanted to find and penetrate their network by making a few simple changes to the hardware used to build the wireless networks. Hack here In November last year BBC News Online was shown just how easy it is to find and gain information about wireless networks.

    99. SecureRoot Computer Security Resource. Hacking, Cryptography, Etc
    One of the worlds longest established hacking forums, offering resources covering everything from cracking to phreaking.
    http://www.secureroot.com
    advisories exploits discussions news ... security tools main menu feedback
    about us
    (new)
    advertising

    privacy

    newsletter

    news

    discussions read forum
    new topic

    search

    meetings meetings list
    add your info
    top 100 sites visit top sites sign up now members webmasters add your url add domain search box link to us projects our projects free email FightAIDS sponsors security software secureroot m4d.com SecureRoot now has over 15,000 URLs indexed Anarchy Organizations, files, texts and other materials devoted to anarchy Anonymity Re-mailers, tools, proxies and information regarding anonymity Articles Articles about hackers, computer security... Attacks Denial of service (DOS) attacks, nuking and spamming, disaster recovery Books Books devoted to computer security, hacking and underground Cracking Password cracking, groups and cracks databases

    100. HACKERS HOME PAGE-computer Hacking, Phreaking, Gambling Hacking, Hack, Smart Car
    Huge online catalog dedicated to the serious phone phreaker, casino cheater,fruit machine beater, dss and cable tv user, gambling hacker, magnetic stripe
    http://www.hackershomepage.com/
    hackers, hacking, phreaks, phreaker, phreaking, freaking, red boxing, phrack, phracker, phracking, fracking, red box, lock picking, cracking, spying, warez, viruses, virus, virii, manuals, plans, kits, how to, how-to, DIY, do it yourself, Direct TV, Sega, Genesis, Playstation, games, espionage, bugs, counter measures, cable tv hacking, money, profit, cable tv test chips, red box, computer hacking, cable tv converter boxes, booksellers, dss, technibooks, warez, technical, satellite, videocipher, smartcard, chip, anarchy, computer, communications, cdrom, filez, files, credit cards, cracking, crypto, electronics, phreaking, cellular, telephone, decoder, descrambler, wireless, ecm, pirate, filters, esn, nam, reprogramming, programming, telecode, scanner, security, hacker, cracker, wireless, crypto, digital, communication, scam, scamming.
    Welcome to The Hackers Home Page
    Please turn frames on in your browser in order to view our site properly. Thank you.

    Page 5     81-100 of 199    Back | 1  | 2  | 3  | 4  | 5  | 6  | 7  | 8  | 9  | 10  | Next 20

    free hit counter