Geometry.Net - the online learning center
Home  - Computer - Hacking
e99.com Bookstore
  
Images 
Newsgroups
Page 6     101-120 of 199    Back | 1  | 2  | 3  | 4  | 5  | 6  | 7  | 8  | 9  | 10  | Next 20

         Hacking:     more books (100)
  1. To Dakar and Back: 21 Days Across North Africa by Motorcycle by Lawrence Hacking, Wil De Clercq, 2008-04-01
  2. Hacking Windows XP (ExtremeTech) by Steve Sinchak, 2004-08-06
  3. Hacking Java: The Java Professional's Resource Kit by Mark Wutka, David Baker, et all 1996-11
  4. Hacking the IT Cube: The Information Technology Department Survival Guide by Douglas Chick, 2006-01-03
  5. Why Does Language Matter to Philosophy? by Ian Hacking, 1975-09-26
  6. Hacking Vim: A Cookbook to get the Most out of the Latest Vim Editor: From personalizing Vim to productivity optimizations: Recipes to make life easier for experienced Vim users by Kim Schulz, 2007-05-25
  7. Against Method (Fourth Edition) by Paul Feyerabend, 2010-05-11
  8. Asterisk Hacking by Ben Jackson, Champ Clark, 2007-06-29
  9. The Hacking of America: Who's Doing It, Why, and How by Bernadette H. Schell, John L. Dodge, 2002-11-30
  10. Linux (Hacking Exposed) by Brian Hatch, James B. Lee, et all 2001-03-27
  11. Hacking MySpace: Mods and Customizations to make MySpace Your Space (ExtremeTech) by John Pospisil, 2006-08-28
  12. Windows 2000 (Hacking Exposed) by Joel Scambray, Stuart McClure, 2001-08-29
  13. Hacking Red Hat Enteprise Linux by Paul T. Ammann, 2009-10-19
  14. Designing BSD Rootkits: An Introduction to Kernel Hacking by Joseph Kong, 2007-04-10

101. Delitos Informaticos -- Información Legal Nuevas Tecnologías
Noticias de delitos en la red, generalmente relacionadas con el hacking.
http://www.delitosinformaticos.com/

Abogados Portaley
Asesoramiento legal. Especialistas Nuevas Tecnologías. DivorciosySeparaciones.com.es Publicidad
Avanzada
Servicios Consultas jurídicas Protección Datos Contratos Propiedad Intelectual ... Seguridad/PGP Comunidad Agenda Archivo Boletines Lista correo Buzón sugerencias ... Bibliografía Temas Portada Audiovisual Ciberderechos Delitos ... Delitos I. Venezuela Jurisprudencia Laboral Especiales Biotecnología Seguridad Protección P. WEB Sobre .... Sobre el sitio Contacta Quiénes Somos En los medios ...
Abogados Portaley.com

NOTICIAS
  • La venta de segundamano en Internet, en el punto de mira de los estafadores [12-09-05] Sigue
  • EL USO DEL CORREO ELECTRÓNICO EN EL LUGAR DE TRABAJO [12-09-05] Sigue
  • Nace una tarjeta segura para pagos por Internet [05-09-05] Sigue
  • Ontinet.com advierte sobre posibles engaños a través de correo electrónico relacionados con el Huracán Katrina [05-09-05] Sigue
  • El presunto autor del gusano Zotob está relacionado con la creación de otros 20 virus [05-09-05] Sigue
  • Estafa de venta de vehículos de segundamano [29-08-05] Sigue
  • Los usuarios han de ser resarcidos por los bancos de los gastos ocasionados por el uso fraudulento de sus tarjetas de crédito [29-08-05]
  • 102. Hacking Pl Security
    (c) 20002005 hacking.pl Linux Windows Security. TOP 10. ·, root.pl hacked. ·,Zabójstwo rosyjskiego spammera. ·, Vodafone zablokuje Skype?
    http://hacking.pl/
    aktualno¶ci archiwum testy o nas Vista: koniec z zakurzon± kryptografi±
    2005-09-17 02:01:23, Security, autor: Damian Zelek, czytañ: 70
    Microsoft zabroni³ u¿ywania s³abych metod kryptograficznych w swoim przysz³ym systemie Windows Vista. Do funkcji tych zalicza siê m. in. DES, MD4, MD5 oraz SHA-1. wiêcej Piracki program wart milion dolarów!
    2005-09-16 21:32:14, Inne, autor: Rafa³ Pawlak, czytañ: 1212
    Policjanci Zespo³u Przestêpstw Gospodarczych Komendy Powiatowej Policji w Z³otoryi i Wydzia³u dw. z Przestêpczo¶ci± Gospodarcz± Komendy Wojewódzkiej Policji we Wroc³awiu dokonali przeszukania i kontroli w jednej z firm, maj±cych siedzibê na terenie powiatu z³otoryjskiego. wiêcej Rekrutacja do ENISA
    2005-09-16 19:02:31, Inne, autor: Rafa³ Pawlak, czytañ: 532
    Europejska Agencja ds. Bezpieczeñstwa Sieci (European Network and Information Security Agency - ENISA) przed³u¿y³a o miesi±c rekrutacjê na stanowiska tzw. Seconded National Experts (SNE). Zainteresowani mog± zg³aszaæ swoje kandydatury. wiêcej Wyszukiwarka blogów Google
    2005-09-16 18:38:34, Sieæ, autor: Rafa³ Pawlak, czytañ: 468

    103. Macintosh Underground :: View Forum - Underground Italiano Del Mac
    Forum Macintosh su hacking, Sicurezza e altro.
    http://freaky.staticusers.net/ugboard/viewforum.php?f=16

    104. Hacking Billy Mouth Bass In Linux
    The beginning of a project to control Bigmouth Billy Bass from a PC.
    http://bigmouth.here-n-there.com/
    For the no frames version, please start with the introduction

    105. IndianZ Webplace
    Eine Seite mit Informationen und Tools zu den Themen hacking und Sicherheit, sowie einer Linksammlung zu verschiedenen Themen. Die Seite ist teilweise in Englisch.
    http://www.indianz.ch

    Welcome

    compatible with all popular web-browsers Bienvenu
    compatible avec tout les navigateurs web courants Willkommen
    kompatibel mit allen gaengigen Web-Browsern
    last update: 15.09.2005

    106. Infrared Exploits Open The Door To Hotel Hacking | The Register
    As more devices become network enabled the scope for hacking increases. Laurie s workshows the issue is not just confined to devices connected to the web.
    http://www.theregister.co.uk/2005/08/02/hotel_hacking/
    Skip to content Biting the hand that feeds IT SetPromptText('q', 'Search');
    Security:
    Reg Shops
    News Services
    Top Stories
  • Hackers are all B'stards now BOFH: Bloody computer room tourists! NZ finds Black Cocks hard to swallow A Million Nation States of One fears Google Balkanization ... Network Security
    Infrared exploits open the door to hotel hacking
    By John Leyden Published Tuesday 2nd August 2005 10:34 GMT Get breaking Security news straight to your desktop - click here to find out how Insecure hotel infra-red systems create a means for hackers to read other guest's emails, watch porno films for free and put false charges onto other guest's accounts. Adam Laurie, technical director at secure hosting outfit The Bunker, was able to demonstrate the attacks to Wired prior to giving a talk on the vulnerabilities at last week's DefCon conference in Las Vegas.
  • 107. Welcome To Cullinghood Equestrian Centre
    BHS approved 400 acre riding facility offering lessons, livery, local hacking, and riding holidays. Also offering courses in riding and stable management leading to NVQ, ABRS and BHS Stages. Located in Royal Berkshire within easy reach of London, Oxford, Bath, Windsor, as well as Ascot and Newbury.
    http://www.cullinghood.co.uk/
    CULLINGHOOD Herons Farm Pangbourne Royal Berkshire England Tel: +44 (0)118 974 5228 Fax: +44 (0)118 974 5229 The Farm and Equestrian Centre is located in Royal Berkshire, within easy reach of London, Oxford, Bath, Windsor, as well as Ascot and Newbury (famous for their racecourses) The closest town, Reading, runs frequent train services to the Eurostar terminal at Waterloo, and is approximately 50kms from Heathrow airport. Set in an area of outstanding natural beauty (including large areas of open accessible estate and common land), Herons Farm extends to some 400 acres, encompassing woodland, open fields, farm tracks and gallops, where racehorses were previously trained. The riding complex and holiday accommodation includes two large schools with period stable blocks. It also has an enclosed mews courtyard with tithe barn, a listed octagon shaped barn and 18th century farmhouse with lovely views. The house has an Aga, wood-burning fires, multiple bedded rooms, plus all the usual facilities associated with comfort. The garden has beautiful lawns, flower beds and a heated swimming pool. Click Here to see dates for the Cullinghood Show Centre Riding Examination Courses - We can offer courses in riding and stable management leading to NVQ, ABRS and BHS Stages.

    108. MS UK Defaced In Hacking Attack | The Register
    MS UK defaced in hacking attack. By John Leyden. Published Wednesday 6th July2005 1557 GMT. Microsoft s UK web site was defaced late on Tuesday night with
    http://www.theregister.co.uk/2005/07/06/msuk_hacked/
    Skip to content Biting the hand that feeds IT SetPromptText('q', 'Search');
    Security:
    Reg Shops
    News Services
    Top Stories
  • Hackers are all B'stards now BOFH: Bloody computer room tourists! NZ finds Black Cocks hard to swallow A Million Nation States of One fears Google Balkanization ... Network Security
    MS UK defaced in hacking attack
    By John Leyden Published Wednesday 6th July 2005 15:57 GMT Microsoft's UK web site was defaced late on Tuesday night with a message in support of Venezuelan hacker Rafa. Defacement archive Zone-H reports that well-known defacer Apocalypse hacked into Microsoft's UK web site (microsoft.co.uk) and uploaded a picture with the message "FREE RAFA - HACK IS NOT A CRIME" (recorded in an archive here The site has since been restored to normal operation and the offending GIF removed. A Microsoft spokesman said it was aware of the attack, which technical staff are investigating. "There is no reason to believe customer data or any other sensitive information has been compromised," he said. Although somewhat embarrassing all early indications are that the attack was not serious. Apocalypse has been targeting US institutions and the government sites for months, always posting messages in support of Venezuelian hacker Rafael (Rafa) Nunez-Aponte, a suspected member of the
  • 109. Information Risk Group LLC: Home
    Offering information security and risk management services to companies throughout the Americas. Specializing in security assessments, ethical hacking, incident response and computer forensics, electronic discovery, and professional training.
    http://www.inforiskgroup.com
    Home Security Assessment Ethical Hacking Incident Response ... Contact
    Download our brochure now Information Risk Group.PDF
    Information Risk Group
    Information Risk Group LLC
    Last year a study of the Slammer worm led by CAIDA
    Information Risk Group approaches protecting systems and networks holistically. Our enterprise-wide information security framework focuses on: asset classification, asset protection, asset management, vulnerability assessment, security awareness, threat assessment, monitoring and incident response. Our consultants have the industry experience and knowledge to answer your questions. Let the experts at IRG help you assess and mitigate your risk.
    Information Risk Group, offering information security and risk management services to companies throughout the Americas.
    What's New?
    IRG is pleased to release our "Top 10" Information Security ideas for 2004. Each of them have been chosen by our security analyst based on the following three factors:
    • ability to lower corporate risk ability to lower overall IT cost ability to increase employee productivity
    Download our presentation on " Cost Justifiying Information Security " now.

    110. Boing Boing: Salad Bar Hacking
    Salad bar hacking. Picture 11 This is the best thing I ve seen in a long while.Robyn Miller sez This is a photo from a Chinese PDF manual.
    http://www.boingboing.net/2004/12/10/salad_bar_hacking.html
    @import url(http://www.boingboing.net/table.css); suggest a site rss archives store ... john
    Sponsored by:
    HOWTO: Get a link posted to Boing Boing
    Boing Boing Mobile powered by Winksite Fark rules! Our Linking Policy
    This work is licensed under a Creative Commons License Stats (About our stats) Our first five years' worth of posts in one file
    Friday, December 10, 2004
    Salad bar hacking
    This is the best thing I've seen in a long while. Robyn Miller sez: "This is a photo from a Chinese PDF manual. The manual explains, via text and a lot of fun photos, how to cram as much food as possible on one of those tiny Pizza Hut bowls at the salad bar. They're only allowed one trip. My cousin lives in Beijing. When he goes to Pizza Hut, he says this is what most people are busy building." (Click image for enlargement) UPDATE: Kurt Groetsch sez: "Two more photos of salad bowl extensions here and here . They made the rounds of the office when I was working in Beijing." Gregory Lam sez: I have a friend of mine who currently lives and works in China, described the same phenomenon here . "I quote: 'For one price (I think it's approximately 20 RMB), you get a single trip to the salad bar. You get a medium-sized soup bowl to put your salad in. Of course, this is a challenge any structural engineer would love to take upon: putting the most salad you can in this small bowl. I saw people at the salad bar for 5-7 minutes just trying to force more and more salad into their bowl. The highest salad I saw must have rose 9 inches off the top of the bowl.'

    111. CableCrypt, Free Pay Tv On Your Pc
    Een verzameling van teksten over hacking en phreaking.
    http://www.com-crime.net/
    Welcome to cablecrypt.org
    On this website you will find all the info about the cablecrypt decoder, links, and downloads and you can discuss about the decoder in the forum.
    with the cablecrypt decoder you can decrypt the encrypted pay channels like canal+.

    112. Underground: Hacking, Madness And Obsession On The Electronic Frontier
    Underground hacking, madness and obsession on the electronic frontier by SueletteDreyfus.
    http://www.underground-book.com/
    Tales of hacking, madness and obsession on the electronic frontier
    `Gripping, eminently readable.. Dreyfus has uncovered one of this country's best kept secrets and in doing so has created a highly intense and enjoyable read' Rolling Stone
    `Underground' by Suelette Dreyfus
    with research by Julian Assange
    475 pages with bibliography
    ISBN: 1 86330 595 5
    RRP $21.90 AUD (approx. $12 USD)
    Published June 1997 by Random House Australia
    About Underground
    What the Critics say
    What the Readers Say (1997 edition)
    What the Readers Say (2001 edition) ...
    Related articles by the Author
    `For those sick of bullish cyberpiffle, Underground contains any amount of counterintelligence.." Gideon Haigh, Australian Literary Suppliment

    113. Hacktivists Or Cyberterrorists? The Changing Media Discourse On Hacking
    This paper scrutinizes the language of government reports and news media sources to shed light on their role in forming a negative image of politically motivated hacking in general, and online political activism, in particular. It is argued that the mass media's portrayal of hacking conveniently fits the elite's strategy to form a popular consensus in a way that supports the elite's crusade under different pretexts to eradicate hacking, an activity that may potentially threaten the dominant order. First Monday
    http://www.firstmonday.org/issues/issue7_10/vegh/index.html
    Hacktivists or Cyberterrorists? The Changing Media Discourse on Hacking by Sandor Vegh
    This paper scrutinizes the language of government reports and news media sources to shed light on their role in forming a negative image of politically motivated hacking in general, and online political activism, in particular. It is argued that the mass media's portrayal of hacking conveniently fits the elite's strategy to form a popular consensus in a way that supports the elite's crusade under different pretexts to eradicate hacking, an activity that may potentially threaten the dominant order.
    Contents
    Introduction
    Discourse on hacktivism

    The media's role

    Conclusion
    Introduction
    Especially after September 11, the national debate on the security of cyberspace has intensified. It has negatively influenced movements that rely on hacking (like hacktivism), or other anti-hegemonic forms of Internet use, such as free access, open source, or privacy protection. Hackers and online political activists are now forced to defend themselves against being labeled by the authorities as cyberterrorists. Restrictive legislation can more easily be passed with public support that increases under a perceived threat, and thus justifies lending more power to the government. Because of the sensationalist nature of hacking, the media is a willing partner of the government in vilifying hackers and hacktivists, and even blaming the Internet as a terrorist territory. Whether intentionally influenced or not, the mass media's portrayal of hacking conveniently fits the elite's strategy to form a popular consensus in a way that supports the elite's crusade under different pretexts to eradicate hacking, an activity that may potentially threaten the dominant order. While the focus is on hackers, several related issues are touched upon, such as encryption, surveillance, censorship, and privacy, which are also key to digital resistance. As such, we see a great effort on the part of the government to control these technologies and forms of online dissent.

    114. Svn.collab.net/repos/svn/trunk/HACKING
    Ethical hackingIBM Systems Journal issue 403, End-to-End Security - Ethical hacking - Feature paper.
    http://svn.collab.net/repos/svn/trunk/HACKING
    This document has been moved to www/hacking.html (which is online at http://subversion.tigris.org/hacking.html).

    115. Brillo Magazine, Number 1, "Armed And Dangerous". Extra Abrasive. Brillo's Inter
    Interview with the BLO about boy games, media and intervention, oneliners, fear, and some lessons and tactics they've learned that could be of help to other activists.
    http://www.brillomag.net/No1/blo.htm
    Hacking Barbie with
    The Barbie Liberation Organization is an amorphous group of activists and media intervention superstars, whose most famous action involved switching the voice boxes in 300 Talking Barbie dolls and Talking G.I. Joe dolls during the Christmas season of 1989. The goal of the action was to reveal and correct the problem of gender-based stereotyping in children's toys. The "corrected" G.I. Joe doll said things like "I love school. Don't you?" and "Let's sing with the band tonight." The "liberated" Barbie said, and I particularly like this one, "Dead men tell no lies." The mainstream media, after some prodding, latched on and a legend was born which continues to be retold, recreated and augmented to this day. (You've all heard of Hacker Barbie, right?) Melinda, Igor and I talked about boy games media and intervention one-liners fear , and some lessons and tactics they've learned that can be of help to other activists. VE: With this first issue of Brillo , what we're tackling is the cultural paradigms that exclude white women and people of color from the tools of cultural production: especially the media and especially new technology.

    116. Hacking URLs For Fun And Profit
    How to hack messy URLs for fun and profit. Jorn Barger Feb2000. Some sites giveyou long, messy URLs that are hard to send via email, impossible to share
    http://www.robotwisdom.com/weblogs/urlhacking.html
    [Up: Weblogs FAQ] [Robot Wisdom Weblog]
    How to hack messy URLs for fun and profit
    Jorn Barger Feb2000 Some sites give you long, messy URLs that are hard to send via email, impossible to share over the phone or on a post-it, and ugly to post visibly in a weblog. Often this is because they're generated by an HTML FORM, which uses this format: Usually you can trim away most of that and rely on defaults. Sometimes (eg Amazon) the site is using the URL to create a cookie or 'shopping cart' that lets them track where you came from and which of their pages you're looking at.
    Deja.com Deja.com gives you URLs like: Happily, you can trim this to: http://x24.deja.com/viewthread.xp? AN=583874412 That one's linking to a thread, here's a single message: becomes http://www.deja.com/=dnc/getdoc.xp?AN=583874412 (The "=dnc/" segment gives the readable 'Deja News Classic" format. The ".1" at the end of the Article Number (AN) tells Deja to break it into short segments and show the first, which is usually very annoying. Changing x24.deja.com to www.deja.com is probably good practice.)
    Amazon With Amazon you can ruthlessly strip everything back to the first long number. So:

    117. SecuriTeam.com ™ - About SecuriTeam
    Location of various security mailing lists pertaining to exploits, hacking tools, and others.
    http://www.securiteam.com/mailinglist.html
    Security News Security Reviews Exploits Tools ...
    Tell us
    The SecuriTeam mailing lists
    In order to help you cope with the ever-changing world of security, we will send you the latest news, tools and product reviews. You will receive featured articles, advisories about recently discovered security holes, exploit code that will help you test your system against the various vulnerabilities, and reviews about both free tools and commercial products.
    The amount of security information is overwhelming. To face this challenge, we have made it easier for you to be updated. You can choose your favorite e-mail format, use mail filters and rules to read only the information that interests you directly, or try the list digest if you feel you're flooded with information.
    The Mailing list
    The mailing list is available in two formats: plain text and HTML. While the information is the same, we recommend the HTML list if you have an HTML capable e-mail client. The average traffic is about 2-3 advisories a day.
    To receive advisories in HTML format, send e-mail with an empty subject and body to:

    118. Los Alamos Lab Employee Arrested For Alleged Hacking
    CNN
    http://cnn.com/2001/TECH/computing/01/11/nuclear.hacker.reut/index.html

    119. Daring Fireball: Hacking Apple's Weather Widget To Show The Time Of The Last Upd
    hacking Apple’s Weather Widget to Show the Time of the Last Update This classis used for both the divs we’re hacking. Change line 81 from
    http://daringfireball.net/2005/06/weather_widget_hacking
    @import "/css/fireball_screen.css?v1.28"; Donate By John Gruber Jewelboxing. Complete, hi-end DVD/CD packaging systems for Mac users and other creative types
    Monday, 27 June 2005
  • Hit the key to invoke Dashboard Glance at the temperature Hit the key again to go back to whatever I was doing Hit the key to invoke Dashboard Glance at the temperature Wait a few seconds to see if it changes Hit the key again to go back to whatever I was doing
  • My frustration was that I wanted to know at a glance whether I needed to wait for updated data. So I hacked it. The differences:
  • Underneath the city name, I display the time of the last data sync.
  • Update:
    How to Apply the Hack
    Make a copy, then hack the copy. I moved my copy of the Widget.wdgt package to the Widgets folder in my user account: /Users/gruber/Library/Widgets/Weather.wdgt /Library/Widgets/Weather.wdgt
  • Change line 68 from: To (this should all be on one line): Change line 70 from: To: In the original widget, there are two separate tags for the predicted daily high and low temperatures; the high div is above the location div, the low div below. Both tags are empty in the HTML, because the actual temperature values are set dynamically by the JavaScript later on. (This is pretty much how most widgets are architected: the HTML is an empty framework, and the contents are filled in by JavaScript that modifies the HTML document dynamically via DOM scripting high and lo high and lo elements are now spans instead of divs.
  • 120. CNN.com - Teenager Charged With Computer Hacking - March 8, 2000
    CNN
    http://www.cnn.com/2000/TECH/computing/03/08/hacker.arrest.02/index.html
    technology computing CNN Sites CNN CNNfn CNNSI myCNN AllPolitics Languages myCNN Video Audio Headline News Brief ... Feedback
    CNN Sites CNN CNN Europe CNNfn CNNSI myCNN CNNfyi AllPolitics Languages
    Search
    CNN.com CNNSI.com CNNfn.com The Web
    TECHNOLOGY

    TOP STORIES
    Consumer group: Online privacy protections fall short

    Guide to a wired Super Bowl

    Debate opens on making e-commerce law consistent

    MORE

    TOP STORIES More than 11,000 killed in India quake Mideast negotiators want to continue talks after Israeli elections MORE BUSINESS ... MORE MARKETS 4:30pm ET, 4/16 DJIA NAS SPORTS Jordan says farewell for the third time ... LOCAL EDITIONS: CNN.com Europe change default edition MULTIMEDIA: video video archive audio multimedia showcase ... more services E-MAIL: Subscribe to one of our news e-mail lists Enter your address: DISCUSSION: chat feedback CNN WEB SITES: CNNfyi.com CNN.com Europe AsiaNow Spanish ... Korean Headlines TIME INC. SITES: Go To ... Time.com People Money Fortune EW CNN NETWORKS: CNN anchors transcripts Turner distribution SITE INFO: help contents search ad info ... jobs WEB SERVICES: Main Page Bracing for Cyberwar Hacking Primer Scenes from the 'Hacker Underground' ... Related Sites
    Teenager charged with computer hacking
    March 8, 2000

    Page 6     101-120 of 199    Back | 1  | 2  | 3  | 4  | 5  | 6  | 7  | 8  | 9  | 10  | Next 20

    free hit counter