Geometry.Net - the online learning center
Home  - Computer - Hacking
e99.com Bookstore
  
Images 
Newsgroups
Page 7     121-140 of 199    Back | 1  | 2  | 3  | 4  | 5  | 6  | 7  | 8  | 9  | 10  | Next 20

         Hacking:     more books (100)
  1. Hacking iPod and iTunes (ExtremeTech) by Scott Knaster, 2004-08-13
  2. Hacking VoIP: Protocols, Attacks, and Countermeasures by Himanshu Dwivedi, 2008-03-21
  3. Chained Exploits: Advanced Hacking Attacks from Start to Finish by Andrew Whitaker, Keatron Evans, et all 2009-03-09
  4. Hacking Timbuktu by Stephen Davies, 2010-11-15
  5. Hacking Photoshop CS2 by Shangara Singh, 2005-10-21
  6. Hacking the TiVo, 2nd Edition by William von Hagen, 2004-07-31
  7. Take a Walk: 100 Walks Through Natural Places in the Puget Sound Region by Sue Muller Hacking, 2003-07
  8. Internet Security: Hacking, Counterhacking ,and Security by Kenneth Einar Himma, 2006-10-05
  9. Hacking Exposed Linux, 3rd Edition by ISECOM, 2008-07-15
  10. A concise introduction to logic by Ian Hacking, 1972
  11. Hacking: Digital Media and Technological Determinism (Digital Media and Society) by Tim Jordan, 2008-11-03
  12. Hacking Cyberspace (Polemics Series,) (Volume 0) by David J. Gunkel, 2001-03-16
  13. Underground: Tales of Hacking, Madness, and Obsession on the Electronic Frontier by Suelette Dreyfuss, 1997-06-06
  14. Gray Hat Hacking : The Ethical Hacker's Handbook by Shon Harris, Allen Harper, et all 2004-11-09

121. $@3t<02q
Translate this page The summary for this Japanese page contains characters that cannot be correctly displayed in this language/character set.
http://www.pfu.fujitsu.com/hhkeyboard/
$@%=%j%e! <%7%g%s!u%5! <%S%9(J $@%W%m%@%/%H(J ... $@%5%$%H%^%C%W(J $@!d(J $@%W%m%@%/%H(J $@!d(JHappy Hacking Keyboard
$@%H%T%C%/%9(J
$=IJ$NFCD'(J <(J UNIX$@G[Ns(J ... English
TOPICS $@!V$*5RMM$N@ <%8(J $@$r99?7$7$^$7$?!#(J <%8(J $@$r99?7$7$^$7$?!#!J(JMac People 9$@7n9f$J$I!K(J <%8(J $@$r99?7$7$^$7$?!#!J(JGetNavi SPECIAL 8$@7n9f!K(J <%8(J $@$r99?7$7$^$7$?!#!J(JNHK$@1Q8l$G$7$c$Y$i%J%$%H(J 8$@7n9f$J$I!K(J <%8(J <%8(J $@$r99?7$7$^$7$?!#!J(JC MAGAZINE 7$@7n9f!K(J <%H(JFAQ $@$N%Z! <%8$r99?7$7$^$7$?!#(J <%8(J <%8(J <%8(J $@$r99?7$7$^$7$?!#!J(JDOS/V POWER REPORT 5$@7n9f$J$I!K(J $@!V(JHappy Hacking Keyboard Professional$@!W$K?7?'$rDI2C!#!VKO!W!"!VKO!?L59o0u!W?7H/Gd!*(J <%H(JFAQ $@$N%Z! <%8$r$o$+$j$d$9$/A4LL2~HGCW$7$^$7$?!#(J $@%0%C%I%G%6%$%s>^ ^5-G0(J
<%s%H!*(J
$@!J(J2004/12/15$@!A(J2005/1/10$@!K(J $"@(=*N;$7$^$7$?!#(J 2004$@G/EY(J $@%0%C%I%G%6%$%s>^ ^!*(J
$@!V@)8f%-! GE@$r$"$F!"(JIT$@J86q$H$7$F$N%-! 2A$5$l$^$7$?!#(J <%8(J $@$r99?7$7$^$7$?!#!J(JYOMIURI PC 10$@7n9f(J $@$J$I!K(J PFU$@%@%$%l%/%H(J Happy Hacking Keyboard$@$,!"(J

122. CNN - Army Investigators Lead FBI To Hacking Suspect - August 31, 1999
CNN
http://www.cnn.com/TECH/computing/9908/31/army.hacker/index.html

MAIN PAGE
WORLD ASIANOW U.S. ... news quiz
CNN WEB SITES: TIME INC. SITES: Go To ... Time.com People Money Fortune EW MORE SERVICES: video on demand video archive audio on demand news email services ...
pagenet

DISCUSSION: message boards chat feedback
SITE GUIDES: help contents search
FASTER ACCESS: europe japan
WEB SERVICES:
Main Page
Bracing for Cyberwar Hacking Primer Scenes from the 'Hacker Underground' ... Related Sites
Army investigators lead FBI to hacking suspect
ALSO:
How do you define a hacker?
Insurgency on the Internet

Sign up for the Computer Connection email service
For more computing stories August 31, 1999 Web posted at: 5:13 p.m. EDT (2113 GMT) WASHINGTON (CNN) The U.S. Army released a statement Tuesday saying its investigators provided information to the FBI that has resulted in the arrest of a Wisconsin man suspected of hacking into and altering the Army's Internet home page. The suspect is 19-year-old Chad Davis of Green Bay, Wisconsin, the reputed co-founder of a hacker organization known as "Global Hell," according to the statement. The arrest followed a two-month investigation by the Army's Criminal Investigation Command, which routinely cooperates with other law enforcement agencies.

123. PFU Limited | Happy Hacking Keyboard
Discount Happy hacking Keyboard. Don t miss the Chance!! We are proud toannounce that the Happy hacking Keyboard Professional and Blank Key Top model
http://www.pfu.fujitsu.com/en/hhkeyboard/
Home Products About PFU Sitemap ... Contacts UpDate 04/14/2005
What's New! HHKB Reveiws Update
Wired Magagine
I4U News GIZMODO
HHKB Lite2 White USB high-Lite-d on Mac World HHKB Professional Charcoal Gray are on Sale in U.S
Click here and Watch it!! HHKB Lite2 Black USB models are in Stock. Blank Key Top model Coming Back in U.S!! We'll ship the Blank Key Top to anyone who made a reservation ASAP!! NEW YEAR SALE!! Discount Happy Hacking Keyboard. Don't miss the Chance!! HHKB Blank Key Top models are already SOLD OUT in just 3 days
It will be back in stock again around mid January 2005.
We can accept pre-order for next comming. Please click here!! Now on SALE, HHKB Professional and Blank Key Top models in U.S. HHKB Professional and Blank Key Top models will be on SALE in U.S, Dec 1st. HHKB Professional and Blank Key Top models are comming soon in U.S.
Updates Reviews
Web Site Renewal !! Announcement We are proud to announce that the Happy Hacking Keyboard Professional and Blank Key Top model are now being promoted in the U.S. These two models have become very popular in the Japanese market and we are excited to now introduce these products to you.

124. NeoGeoPocket Dev'rs - What's New?
hacking and reprogramming the NeoGeo pocket game machine.
http://www.devrs.com/ngp/
Do you develop for other things? Devrs.com NeoGeoPocket Dev'rs http://www.devrs.com/ ngp/ Neo Geo Pocket Got info to post? Modify FAQs ... Search What's New? What's New? Apps Assemblers Misc Tile/Map Asm Code Misc Docs Misc Patents Sound Tutorials Hardware FlashCarts Misc
PDRC #3.33 - NGP/C entries accepted - Posted by: Kojote
To celebrate Kojote's first quarter century of life on 20th June 2005, here is another competition. PD Roms Coding Competition #3.33. The compo will start on the 20th June 2005 @ 00:00 GMT +2 and will end 25 days later on the 14th July 2005 @ 23:59 GMT +2.
PDRoms Coding Competition 2.5 - Posted by: Kojote
Another coding compo organized by PDRoms: Your goal is to greate a "Game & Watch" style game, in fact a LCD style game, with leading intro! (An intro contains (scroll)text and a (moving) logo. Deadline is Sunday, 4th July, 2004 at 23:59 GMT +1. 1st prize is a NGPC with 7 games. Allowed systems are: Gameboy Classic, Gameboy Color, Gameboy Advance, GP32, <b>Neo Geo Pocket, Neo Geo Pocket Color</b>, NES & Dreamcast!
Pocketron (w/ Source code) - Posted by: Torlus
Pocketron is a Robotron-like game, created for the PDRoms coding compo #2. You can find it on my site, with full source code. It is written in C, and uses the C Framework.

125. Hacking Google Print || Kuro5hin.org
hacking Google Print 99 comments (66 topical, 33 editorial, 1 hidden) is you do NOT talk about hacking google. soundproofing, noise control, vibration
http://www.kuro5hin.org/story/2005/3/7/95844/59875

create account
help/FAQ contact links ... MLP We need your support: buy an ad premium membership k5 store
Hacking Google Print
... Internet
By isometrick
Tue Mar 8th, 2005 at 05:13:53 AM EST
Many people are curious about the inner workings of Google , but they are mostly interested in keeping it a secret. So, any information we can glean comes from "black box" analysis. Recently, I wrote a short article that explains how I wrote some simple code that can instantly create PDFs of entire books from Google Print . Maybe some k5ers have more ideas on how to expand the concept, but, as you'll soon find out, I probably can't help in the efforts. Read on ... Introduction Many people are interested in how Google works, and Google is mostly interested in keeping it a secret. I'm going to tell you a few things I've learned about Google by playing around with their software . It's not terribly advanced, but I think it's interesting nonetheless. The first thing I will cover is Google's cookie, and then I will explain how I used this information to exploit Google Print. Google's Cookie Most web browsers allow small text files, called cookies, to be stored on behalf of web servers ... this allows a persistent state to be associated with a user. After a cookie is created, it will be sent back to the web server every time you request a page (but only when you request a page from the server that originally requested the cookie). For example, when you set your SafeSearch preferences on the Google web site it stores your choice in the Google cookie. Then, whenever you request a page from Google it can see what you set your preference to earlier and use it without having to ask you again. If you delete your cookie, you'll just get a new cookie the next time you visit ... but you'll have to set your preference again. Pretty useful, huh?

126. || [ Www.Spywire.Net ™] || :: - :: Index
Forum dedicated to bringing knowledge to people starting out in hacking.
http://spywire.net/forum/index.php
fadeClasses = new Array(""); // Determines which classes get which colors startColors = new Array("#000066"); // MouseOut link colors endColors = new Array("#FF0000"); // MouseOver link color stepIn = 20; // delay when fading in stepOut = 20; // delay when fading out autoFade = true; sloppyClass = true; The time now is Sat September 17, 2005, 1:0 am
View unanswered posts
Forum Topics Posts Last Post Welcome and Announcements Forum. Welcome to Spywire.Net
Come in here first and introduce your self.
Spywire.Net is a UK based computer help Coding and scripting forum.
Click the registration link and become a Member to take full advantage of the boards.
We run a ranking system.
the more you post the higher you will be ranked
Moderators pureone Wed September 14, 2005, 6:0 am
ozzy
Computers Coding and the Internet. Coding Programing and Scripting.
Forum to discuss coding programing and scripting. Talk about PHP , C, C++, bash, batch, javascript, Perl, Python, Visual Basic, ASM and others.
Do not ask for source code here Moderators pureone Fri September 16, 2005, 12:0 pm

127. O'Reilly Network: Hacking Maps
In these two excerpts from Mapping Hacks, learn how to geocode a US street address,as well as a whole database of addresses, using the geocoder.us web
http://www.oreillynet.com/pub/a/network/excerpt/MapHacks_chap7/
Sign In/My Account View Cart Articles Weblogs ... eDocuments SAP TechEd '05. Learn to innovate. Search Login
Register

Manage Newsletters

Register Your Books
Sponsored Zones
Novell Learning Channel
Sites
codezoo.com

Databases

LinuxDevCenter.com

MacDevCenter.com
...
WebServices.XML.com
Affiliate Sites
LinuxQuestions.org
OSDir.com Servlets.com Resource Centers Bioinformatics C/C++ Databases Digital Media ... XML oreillynet.com supported by: Computer Community Print Email Discuss Trackbacks Blog this Tags: maps gis google mapping ... O'Reilly Book Excerpts: Mapping Hacks
Hacking Maps
by Schuyler Erle Rich Gibson Jo Walsh Editor's note: Schuyler Erle, one of Mapping Hacks ' coauthors, will be participating in a panel discussion on sustainable businesses for data at O'Reilly's Where 2.0 Conference . If you're a developer of location-based services and apps, don't miss what is sure to be a lively debate among executives of organizations like Navteq, Microsoft, the Census Bureau, and others, as they discuss business models for service and data companies.
Geocode a U.S. Street Address
Related Reading Mapping Hacks By Schuyler Erle Rich Gibson Jo Walsh Table of Contents ... Index You know the address, but where is that in GPS terms?

128. ForoUnderGround: Manuales Sobre Tecnologia, Informatica Y Seguridad.
Tutoriales y manuales sobre hacking, seguridad inform¡tica e informaci³n sobre emule.
http://www.forounderground.com
manuales Videos Porno Liberar Nokia musica mp3 ... Free Sex Manuales sobre... eMule eDonkey Blubster Overnet ...
MANUALES AUDIO VIDEO P2P GRABACION

Login Usuarios Bienvenido Invitado Nick:
Pass: Registrate
Manual/Articulo Fecha Como protegerse de los posibles ataques Como crear un FTP Anonimo Navegacion Anonima utilizando MultiProxy Manual John the Ripper ...
Siguiente ->

Ultimas noticias... Alerta: El gusano Zotob y ot.. Explicación de Cisco al caso.. Cisco en el punto de mira de.. El coste de los problemas de.. ... Ver todas
Buscar Manuales
Ultimos post en los foros... Existe targeta TV con la que pueda...
Último envío por Anónimo el 16 Sep, 2005 a las 00:26:46
Desencriptador de archivos del registro de Windows
Último envío por madelf el 13 Sep, 2005 a las 20:03:20 Como hackear seguro sin q sepan tu contraseña Último envío por gian castillo el 12 Sep, 2005 a las 23:50:36 AYUDA PARA CONVERTIR DE MPG A DVD Último envío por el 12 Sep, 2005 a las 15:37:16 hack y xploits hotmail Último envío por niolpo el 11 Sep, 2005 a las 22:41:01 Xploit Último envío por niolpo el 11 Sep, 2005 a las 22:34:41

129. Hacking For Christ
hacking for Christ. Gervase Markham. August 09, 2005. Mozilla Foundation FormsTaxable Subsidiary. I m back, and rather tiredly working through the large
http://weblogs.mozillazine.org/gerv/
Hacking for Christ
Gervase Markham
September 16, 2005
IE UI Designer Switches to Firefox
This article has everything . An ex-IE team member explains why he no longer uses IE, switches to Firefox - and then gives us some UI advice so we don't get too complacent. :-) Most of his comments are great; one thought: IE intentionally brings the browser history into the new window: the bet being that users who want to continue from where they left off can, and those that want to go their home page can do that with one click. ...but if you have a Java applet in that page which is communicating with a server, it can really stuff things up because you then get two of them. Having worked on such a product, this behaviour is actually one of my pet hates about IE. I love Firefox's New Tab behaviour - Ctrl-T and I have a nice blank canvas, with the location bar focussed, ready to go whereever I please. It's as satisfying as turning to a new, crisp, white page in a notebook. Mmm. :-) The "continue from where you left off in a new window" model for Firefox is "open in background tab"; you don't open new windows with copies of the current page and then navigate in multiple directions, you navigate directly in those directions from the original copy. Much nicer, IMO. Posted by gerv at 02:46 PM Comments (16) TrackBack (0)
September 15, 2005

130. Index
Si propone di approfondire i temi dell'hacking, proponendo manuali e programmi e offrendosi come guida per la ricerca di informazioni.
http://it.geocities.com/falco984/
Cazzi tuoi, il tuo browser non supporta i frames.

131. Schneier On Security: Hacking Hotel Infrared Systems
I think you are focusing too much on hacking free porn. What I m more concernedabout is the fact they can see other guest s names, numbers,
http://www.schneier.com/blog/archives/2005/08/hacking_hotel_i.html
Bruce Schneier Home Weblog Crypto-Gram Newsletter Books ... Contact Information
Schneier on Security
A weblog covering security and security technology. Main
August 01, 2005
Hacking Hotel Infrared Systems
From Wired A vulnerability in many hotel television infrared systems can allow a hacker to obtain guests' names and their room numbers from the billing system. It can also let someone read the e-mail of guests who use web mail through the TV, putting business travelers at risk of corporate espionage. And it can allow an intruder to add or delete charges on a hotel guest's bill or watch pornographic films and other premium content on their hotel TV without paying for it.... "No one thinks about the security risks of infrared because they think it's used for minor things like garage doors and TV remotes," Laurie said. "But infrared uses really simple codes, and they don't put any kind of authentication (in it).... If the system was designed properly, I shouldn't be able to do what I can do." Posted on August 01, 2005 at 01:21 PM
Trackback Pings
TrackBack URL for this entry:
http://www.schneier.com/cgi-bin/mt/mt-tb.cgi/356

132. Team Security
Tutorials zum Thema ITSecurity, hacking, Cracking und Programmieren sowie Downloads und das Forum. Fr¼here Kid2elite Gruppe.
http://www.tsecurity.de/
Download Section
Security Section Tutorials Section eBook Section
TSecurity-Daten
Artikel
: 5 x
Freie Mitarbeiter
: 5 x
Downloads
: 44 x
eBooks
: 26 x
Newsletter
: 9 x
Willkommen bei dem neuen Team-Security Projekt 2005
Das Team-Security Projekt, soll die elementaren und weiterführenden Grundlagen zum Thema IT-Security vermitteln. Es lässt sich leider nicht vermeiden, dass auch Inhalt illegal missbraucht werden könnte. Die Philosophie weiterlesen...
TSecurity Nachrichten
Und es geht weiter... Teil II
eingetragen am 14.09.2005 von thE_iNviNciblE Hallo Liebe Gemeinde,
Das Projekt hat nun nach seiner "Findungsphase" sich ein wenig weiterentwickelt, der Download Bereich ist wieder vollkommen in Ordnung.
Neu:
Upload Source Codes und kleinere Downloads
Newsletter-Funktion
ALTE kid2elite.de.vu - Tutorial Liste
~ 500 Tutorials verfügar ;) Neuster Artikel Shrinkto5 DVD-Filme schrumpfen lassen Neustes eBook Hacking Unix Neuster Download Neuster Upload bei TSecurity.de Strings mit 128bit Verschlüsseln Weitere aktuelle Informationen befinden sich im Statistikbereich Main Menu Das Team document.write("");

133. Schneier On Security: Hacking The Papal Election
Schneier on hacking the Papal Election from Adam Stiles Bruce Schneier analyzeshacking threats to the papal election process. Read More
http://www.schneier.com/blog/archives/2005/04/hacking_the_pap.html
Bruce Schneier Home Weblog Crypto-Gram Newsletter Books ... Contact Information
Schneier on Security
A weblog covering security and security technology. Main
April 14, 2005
Hacking the Papal Election
As the College of Cardinals prepares to elect a new pope, people like me wonder about the election process. How does it work, and just how hard is it to hack the vote? Of course I'm not advocating voter fraud in the papal election. Nor am I insinuating that a cardinal might perpetuate fraud. But people who work in security can't look at a system without trying to figure out how to break it; it's an occupational hazard. The rules for papal elections are steeped in tradition, and were last codified on 22 Feb 1996: "Universi Dominici Gregis on the Vacancy of the Apostolic See and the Election of the Roman Pontiff." The document is well-thought-out, and filled with details. The election takes place in the Sistine Chapel, directed by the Church Chamberlain. The ballot is entirely paper-based, and all ballot counting is done by hand. Votes are secret, but everything else is done in public. First there's the "pre-scrutiny" phase. "At least two or three" paper ballots are given to each cardinal (115 will be voting), presumably so that a cardinal has extras in case he makes a mistake. Then nine election officials are randomly selected: three "Scrutineers" who count the votes, three "Revisers," who verify the results of the Scrutineers, and three "Infirmarii" who collect the votes from those too sick to be in the room. (These officials are chosen randomly for each ballot.)

134. Hyde Park Stables
Offering riding lessons, and hacking in Hyde Park along Rotten Row in central London on quality horses at this BHS Approved yard. Prices, hours, lesson program.
http://www.hydeparkstables.com/
HYDE PARK STABLES
Hyde Park Stables
63 Bathurst Mews, London W2 2SB
Tel: 020 7723 2813
Fax: 020 7823 4512
E-mail: info@hydeparkstables.com Website: www.hydeparkstables.com
RIDE ON ROTTEN ROW
opening
times
prices
how to
find us
contact
details

riding wear
Booking Information

135. Salon.com Technology | Hacking Democracy
hacking democracy? Computerized votecounting machines are sweeping the country.But they can be hacked and right now there s no way to be sure they
http://salon.com/tech/feature/2003/02/20/voting_machines/

Search

All of Salon.com
Only Technology
Directory
Hot Topics
Ask the Pilot

The Matrix

Computer Games

Globalization
...
Joyce McGreevy

Articles by date
  • All of Salon.com By department
  • Find a job Search our Personals ... Newsletter Salon Communities The Well Table Talk Salon Blogs Salon Credit Card ... Table Talk [Spirited Salon forums] What do you need to look for in a laptop? Have you tried VOIP?
  • Posts of the week
  • The Well [Pioneering members-only discussions] Wondering about the golden age of groupies? Sound Off
  • E-mail Salon Send us a Letter to the Editor Recent Letters
  • Downloads
  • Get Salon.com on your PDA
  • Hacking democracy? Computerized vote-counting machines are sweeping the country. But they can be hacked and right now there's no way to be sure they haven't been. By Farhad Manjoo During the past five months, Bev Harris has e-mailed to news organizations a series of reports that detail alarming problems in the high-tech voting machinery currently sweeping its way through American democracy. But almost no one is paying attention. Harris is a literary publicist and writer whose investigations into the secret world of voting equipment firms have led some to call her the Erin Brockovich of elections. Harris has discovered, for example, that Diebold, the company that supplied touch-screen voting machines to Georgia during the 2002 election, made its system's sensitive software files available on a public Internet site. She has reported on the certification process for machines coming onto the market revealing that the software code running the equipment is seldom thoroughly reviewed and can often be changed with mysteriously installed "patches" just prior to an election. And in perhaps her most eyebrow-raising coup, she found that Sen. Chuck Hagel, a Nebraska Republican, used to run the company that built most of the machines that count votes in his state and that he still owns a stake in the firm.

    136. Pure Hacking :: Internet Security Through Penetration Testing
    Dedicated penetration testing services focusing on network application and Internet security.
    http://www.purehacking.com
    An External Penetration Test focuses on:
    • server penetration testing
    • router penetration testing
    • firewall penetration testing
    • operating system installation
    • and maintenance.

    "The value of having independent review on our systems cannot be underestimated, as it ensures we are providing the best levels of security to our clients." C.E.O.
    Internet Security Specialists.

    Internal on-site penetration testing gives the business the assurance it needs to conduct safely on the internet and with business partners. Internal assessments use a similar methodology to an external assessment, however the engagement will occur from within the WAN at each logical management zone, physical segment or simply attached to the DMZ.
    Pure Hacking will analyze the critical components of a Web-based portal, e-commerce application, or Web platform. Using manual techniques and hundreds of appropriate tools the assessment pinpoints specific vulnerabilities and identifies underlying problems An attacker will visit a site on a periodic basis, see if there is a new way to break into your system. If they find a way, they will leave a way to get in at a later date. The end result, you will be attacked and the ferocity is only limited by the skill of the attacker.

    137. Computerworld Hacking News Headlines
    Global Dispatches London man arrested for hacking US agencies (June 13, 2005) London man arrested for 2001 NASA hacking (June 08, 2005)
    http://www.computerworld.com/securitytopics/security/hacking/news/0,11286,KEY583
    IDG Network:
    Computerworld IDG.net Careers CRM Data Mgmt Development E-business ERP/Supply Chain Hardware IT Management Networking Operating Sys ROI Security Storage Web Site Mgmt xSP
    See this year's Horizon Award honorees for cutting-edge technologies
    Free E-Newsletters
    Keep up on technology news and trends with our free e-mail newsletters! Select from daily and weekly updates including alerts and roundups by topic.
    Sign up today!
    Knowledge Centers

    Security

    Storage

    Hardware
    ...
    Software

    More Knowledge Centers: Select one... Business Intelligence CRM Careers Data Management Development E-business ERP Government Hardware IT Management Networking Operating Systems Outsourcing ROI Security Software Storage Web Site Management Partner Zones Blade-Ready Data Center Business Service Mgmt. Data Explosion Zone ... E-mail Newsletters News Feeds Home Browse Topics Security Hacking > News Hacking Knowledge Center News Security vendor warns of Google-spoofing worm (September 16, 2005) Update: Mass. teen pleads guilty in Paris Hilton hacking case (September 14, 2005) Red Cross works to better protect its networks from attacks, scams

    138. Hacking- Computerbeveiliging.nl
    De hacking subcategorie van computerbeveiliging.nl.
    http://www.computerbeveiliging.nl/Hacking
    Webgids met informatie mbt beveiliging van uw computer, website of netwerk Home Toevoegen Nieuw Populair ... Nieuwsbrief
    U bent in rubriek Top : Hacking Rubrieken
    Aanvallen Conferenties Hacked websites Hackers ... Tijdschriften
    Links

    • Back Orifice en Netbus zijn twee van de meestgebruikte 'hackerstools', gereedschap om in te breken op computers. Daarom wordt op deze pagina een uitgebreide beschrijving gegeven van deze Trojan Horses en de bestrijding ervan.
      (Toegevoegd: 22-Apr-2004 Hits: 199 )
    • Blackcode - Your security provider
      BlackCode was born deep in 1998 to provide a useful tool for people interested in computers, security and Internet. During these years, we've been developing tools and helping people learning about security and Internet.
      (Toegevoegd: 18-May-2004 Hits: 86 )
    • Delta-N
      Delta-N is gespecialiseerd in zowel het detacheren van infrastructuur en security specialisten als het uitvoeren consultancy, implementatie en ethical hacking / kwetsbaarheid analyses.
      (Toegevoegd: 4-Mar-2002 Hits: 177 )

    • Uw persoonsgegevens kunnen via internet niet alleen in handen vallen van marketeers of overheid, maar ook van hackers, de populaire benaming voor digitale inbrekers. Terwijl uw computer met internet verbonden is, kunnen inbrekers proberen om toegang tot uw computer te krijgen.
      (Toegevoegd: 22-Apr-2004 Hits: 111 )
    • SecureRoot
      One of the oldest hacking site on the web (Toegevoegd: 12-Mar-2004 Hits: 93 )
    Voeg je website toe !

    139. Hack Canada - The Source For Canadian Hacking And Phreaking
    Hack Canada Canadian hacking, phreaking, and tempestuous technology.
    http://www.hackcanada.com/
    Hack Canada
    Crew

    History

    Media List
    ...
    T-Shirts
    .hack phreaking - - N e w F i l e s - - phreak hacking. Tel3.com Calling Card System ANI Spoofing Vulnerability Learn why using ANI for authentication, instead of a PIN, is universally stupid. By The Clone. Datapac Hacker's Kit Includes the Datascan NUA scanner and the Datacrack username/password dictionary attacker for windows. VB source code included. By Aftermath. Fox on Canada [.wmv] Arrogance, ignorance, and jingoism without bounds! By Fox News and Media Matters. BarLink: Stealing Your Personal Information and Putting You at Risk Contributing to the Study of Climate Change It seems to us and many others that our weather is behaving in noticably different patterns from what we've grown accustomed to. With climateprediction.net you may be able to help find out if this is actually the case and just how big the problem might be. By Wizbone. HID Access Control: Controlled A glance into the technology designed to keep you out! By GLHeX. Scream in your Pants A timeline of violent crimes related to the Scream movie trilogy. Written as a pre-introduction for the 2004 Halloween issue of K-1ine #45 More Phun with the Audiovox 8900 Exploring the filesystem of the Audiovox 8900 as well as a comparison of the Telus 8900 compared to other 8900's. By TeK-g.

    140. They Call It Hacktivism
    A few weeks ago, several members of a hacking group called Legions of the Underground declared an ''electronic war'' against China and Iraq. Boston Globe
    http://www.gis.net/~cht/hacktivism.html
    They call it 'Hacktivism'
    By Patti Hartigan, 01/24/99
    A few weeks ago, several members of a hacking group called Legions of the Underground declared an ''electronic war'' against China and Iraq. Citing violations of human rights, the hackers vowed to punish those countries by destroying their computer systems. This virtual call to arms went largely unnoticed by most of the world, and the threat of destruction never materialized. But it created an uproar in the cyberunderground: A coalition of hacking groups, known for their staunch independence and insular rivalries, issued an unprecedented joint statement condemning the audacious declaration and ''any attempt to use hacking to threaten or destroy the information infrastructure of any country.'' Legions of Underground quickly backed down. The incident intensified an ongoing debate about ''hacktivism'' - the use of computers to advance political causes. The term, coined in recent months, covers everything from animal rights groups defacing the Web pages of fur companies to the use of computers by dissidents to promote democracy in totalitarian regimes. Targeted Web sites have included government pages of Indonesia and India, Mexico and China, as well as sites operated by NASA, the US Army, and the Department of Defense. The tools range from legitimate e-mail campaigns to on-line graffiti to software programs with names like Back Orifice and Floodnet. Political activists, who until recently got their message across through rallies and marches and sit-ins and slogans, are taking their causes on line in record numbers; they are now engaging in what they call ''electronic civil disobedience.'' At the same time, however, young hackers in their teens and early 20s are defacing Web sites and, apparently as an afterthought, attaching a political cause to their efforts. Such actions worry activists and veteran hackers alike, and raise several thorny questions:

    Page 7     121-140 of 199    Back | 1  | 2  | 3  | 4  | 5  | 6  | 7  | 8  | 9  | 10  | Next 20

    free hit counter