Geometry.Net - the online learning center
Home  - Computer - Hacking
e99.com Bookstore
  
Images 
Newsgroups
Page 8     141-160 of 199    Back | 1  | 2  | 3  | 4  | 5  | 6  | 7  | 8  | 9  | 10  | Next 20

         Hacking:     more books (100)
  1. Practical Hacking Techniques and Countermeasures by Mark D. Spivey, 2006-11-02
  2. Hacking a Terror Network: The Silent Threat of Covert Channels by Russ Rogers, Matthew G Devost, 2005-02-10

141. MD Community Page: Hacking
MiniDisc hacking. For those interested in going beyond the normal Slink CAV1interface details A website describes hacking Sony s Slink CAV-1
http://www.minidisc.org/part_hacking.html
MiniDisc Hacking
For those interested in going beyond the normal "user-mode" of their MiniDisc equipment, we have these tidbits:

142. Former Los Alamos Employee Pleads Innocent To Hacking
CNN
http://cnn.com/2001/TECH/computing/01/26/hacking.arrest.ap/index.html

143. Perl.com: Hacking Perl In Nightclubs
By editing Perl programs onthe-fly, in real-time, Alex Mclean is producing somereally interesting computer music. He talks about how it all works.
http://www.perl.com/pub/a/2004/08/31/livecode.html
Sign In/My Account View Cart Articles Weblogs ... Perl programming forum for Perl beginners and experts. Search Sponsored Zones
Novell Learning Channel
Perl.com Downloads Documentation CPAN Mirror FAQs ... Search
Perl Columns P5P Digest P6P Digest Perl Success Stories Sites
codezoo.com

Databases

LinuxDevCenter.com

MacDevCenter.com
...
WebServices.XML.com
Affiliate Sites
LinuxQuestions.org

OSDir.com

Servlets.com
Resource Centers Bioinformatics C/C++ Databases Digital Media ... Email Tags: perl music programming art ... Bookmark with del.icio.us
Hacking Perl in Nightclubs
by Alex Mclean August 31, 2004 I've found the experiences of dancing and programming to have a great deal in common. With both I am immersed in an abstract world of animated structures, building up and breaking down many times before finally reaching a conclusion. Indeed, when the operation of even the dullest data-munging computer program is visualized, for example in a debugger, it does seem to be dancing around its loops and conditions moving in patterns through time. In other words, a musical score is a kind of source code, and a musical performance is a kind of running program. When you play from a musical score or run a program you are bringing instructions to life. So a piece of composed music is like a Perl script, but let's not forget improvised music. The rules behind improvised music for example improvised jazz develop during a performance, perhaps with little or no predefined plan. Where is the comparison with code here? Well, how many times have you sat down to write some Perl without first deciding exactly how you were going to structure it? Perl is great for improvising. The question is, can you write improvised Perl scripts on stage? This article hopes to answer this question.

144. CNN.com - Clinton Administration Develops Internet Security Proposals As Investi
CNN
http://www.cnn.com/2000/TECH/computing/02/16/hacking.investigation.01/index.html
technology computing CNN Sites CNN CNNfn CNNSI myCNN AllPolitics Languages myCNN Video Audio Headline News Brief ... Feedback
CNN Sites CNN CNN Europe CNNfn CNNSI myCNN CNNfyi AllPolitics Languages
Search
CNN.com CNNSI.com CNNfn.com The Web
TECHNOLOGY

TOP STORIES
Consumer group: Online privacy protections fall short

Guide to a wired Super Bowl

Debate opens on making e-commerce law consistent

MORE

TOP STORIES More than 11,000 killed in India quake Mideast negotiators want to continue talks after Israeli elections MORE BUSINESS ... MORE MARKETS 4:30pm ET, 4/16 DJIA NAS SPORTS Jordan says farewell for the third time ... LOCAL EDITIONS: CNN.com Europe change default edition MULTIMEDIA: video video archive audio multimedia showcase ... more services E-MAIL: Subscribe to one of our news e-mail lists Enter your address: DISCUSSION: chat feedback CNN WEB SITES: CNNfyi.com CNN.com Europe AsiaNow Spanish ... Korean Headlines TIME INC. SITES: Go To ... Time.com People Money Fortune EW CNN NETWORKS: CNN anchors transcripts Turner distribution SITE INFO: help contents search ad info ... jobs WEB SERVICES: Main Page Bracing for Cyberwar Hacking Primer Scenes from the 'Hacker Underground' ... Related Sites
Clinton administration develops Internet security proposals as investigators pursue hackers
February 16, 2000

145. Mac OS X Hacking Tools
Amit, Singh, Amit Singh, Art, Computer Art, Drawing, Painting, Sketching, OilPainting, Crayons, Pastels, Pencil Colors, Audi, TT, Roadster, Quattro, Empeg,
http://www.kernelthread.com/mac/osx/tools.html
kernelthread .com
contents
Art Comic Fine Arts Mouse Automotive Audi TT Motorcycling Computing Apple Hanoimania Obfuscation OS ... Publications
meta
About Blog Forums Home
adsense
What is Mac OS X?
Mac OS X Hacking Tools
Hacking? Tool?
The Jargon File is a popular lexicographic resource amongst hackers (and non-hackers too). Although it might have some subjective definitions I may not agree with, I have conveniently quoted verbatim the definitions of the terms "hacker" and "tool" as a preface to the contents of this page. hacker
[originally, someone who makes furniture with an axe] 1. A person who enjoys exploring the details of programmable systems and how to stretch their capabilities, as opposed to most users, who prefer to learn only the minimum necessary. RFC1392, the Internet Users' Glossary , usefully amplifies this as: A person who delights in having an intimate understanding of the internal workings of a system, computers and computer networks in particular.
more tool
n.

146. Balder Skriver Om Svenska Hemdator Hacking / Nytt
Genomg¥ng av n¥gra gamla nummer av den klassiska svenska datortidningen.
http://home.swipnet.se/~w-15077/SHN/
Svenska
Hemdator
T Men det hade vi ingen aning om 1986. Då var det bara företag som hade råd med PC, om de nu inte köpte MAC, vilken helt behärskade marknaden för "seriösa" applikationer. Vi andra köpte oss C64 eller Spectrum. Senare var det Amiga och ST som gällde. Nummer Torsten N var lm=document.lastModified; document.write(""+"Senast ändrad: "+lm+"");

147. CVS Log For Libtool/libtool/HACKING
Score List hacking Lessons Learned by Cheating Your Way to Number Score List hacking Lessons Learned by Cheating Your Way to Number One, Part 1 of 2.By Seth Fogie. Date Jul 29, 2005. Save Discuss Print Email
http://savannah.gnu.org/cgi-bin/viewcvs/libtool/libtool/HACKING
CVS log for libtool/libtool/HACKING
Help
Up to [Sources] libtool libtool Request diff between arbitrary revisions Default branch: MAIN
Bookmark a link to: HEAD download
Revision (view) annotate [select for diffs] Mon Sep 12 11:21:39 2005 UTC (4 days, 14 hours ago) by rwild
Branch: MAIN
CVS Tags: HEAD
Changes since 1.18: +3 -0 lines
Diff to previous 1.18 * libltdl/m4/ltdl.m4 (LT_WITH_LTDL, LTDL_CONVENIENCE) (LTDL_INSTALLABLE): Use less quoting for expanded LIBLTDL, LTDLINCL. Use m4_default instead of m4_if, to work around AU_ALIAS bug with empty macro arguments. (LTDL_INIT): Likewise. * libltdl/m4/ltoptions.m4 (_LT_WITH_PIC): Likewise. * TODO, HACKING: Updated. Revision (view) annotate [select for diffs] Mon Aug 8 06:48:06 2005 UTC (5 weeks, 4 days ago) by rwild
Branch: branch-2-0
Changes since 1.6.2.11: +5 -0 lines
Diff to previous 1.6.2.11 to branch point 1.6 to next main 1.7 * AUTHORS, HACKING: Updated. Revision (view) annotate [select for diffs] Mon Aug 8 06:47:42 2005 UTC (5 weeks, 4 days ago) by rwild
Branch: MAIN Changes since 1.17: +5 -0 lines

148. SecurityRisk :: Index
Many topics and threads about Vulnerabilities, hacking, Phreaking, and programming. Informative and active.
http://securityrisk.org/index.php
Forum FAQ Register Profile ... Log in The time now is Sat Sep 17, 2005 12:54 am
View unanswered posts

Forum Topics Posts Last Post SecurityRisk dot Org Comments / Problems / Suggestions
SecurityRisk Forum problems, suggestions, comments goes in here
Moderator SecurityRisk Moderators Mon Jan 10, 2005 11:58 am
SecurityRisk Rules / Announcements

Announcements, guidelines, news and the rules of SecurityRisk. Read THE RULES before starting to post on SecurityRisk Forums.
Moderator SecurityRisk Moderators Mon Feb 14, 2005 5:06 pm
xicowapo
Lectures
All about Lectures live in #Security @Undernet
Moderator SecurityRisk Moderators Sat Feb 21, 2004 10:22 am SuxxToBe Security News Daily security news in the IT Industry. Moderator SecurityRisk Moderators Wed Aug 17, 2005 6:41 am easternerd Humor irc logs. quotes, jokes, if it is funny goes in here. Moderator SecurityRisk Moderators Thu Jul 29, 2004 11:19 pm Nitro Book Reviews Latest book release reviews. Moderator SecurityRisk Moderators Tue Apr 05, 2005 5:14 pm easternerd Security Security Basics Newbies corner Moderator SecurityRisk Moderators Mon Jul 18, 2005 2:25 pm

149. Google Hacking Mini-Guide
Google hacking MiniGuide. By Johnny Long. Date May 7, 2004. Save Discuss Print E-mail 2. Google hacking Techniques Next Section
http://www.informit.com/articles/article.asp?p=170880

150. Zona Z Prohibida - Versión 2.5
Programas, tuturiales, gu­as sobre hacking y vulnerabilidades.
http://www.iespana.es/zzprohibida
Atención: la página solo se demora en cargar la primera vez!! La página se ve mejor bajo 800*600*32 o mayores... Última Actualización: 31 de Octubre del 2004 - Quito - Ecuador NO ME RESPONSABILIZO POR EL MAL USO Q' LE DES A LA INFORMACIÓN DE ESTA PÁGINA ©Todos los Diestros Reservados

151. XML.com: Hacking Open Office
Peter Sefton shows us how to use XML tools to hack Open Office file formats.
http://www.xml.com/pub/a/2005/01/26/hacking-ooo.html

Resources
Buyer's Guide Newsletter Safari Bookshelf Try Altova's XML Suite 2005 FREE for 30 days - #1 with XML developers worldwide!
Business
Databases Graphics Metadata ... Web Services
Sponsored By XML Development Tools Free Download Stylus Studio – The World's best XML Editor! Learn XML development with Stylus Studio XML IDE Join the XML discussion at the Stylus Studio Developer Network
Sponsored Zones
Novell Learning Channel

Annotated XML

What is XML?

What is XSLT?
... Discuss Tags: xml openoffice xslt ooo ... Bookmark with del.icio.us
Hacking Open Office
by Peter Sefton
January 26, 2005
If you are using any word processor or editor in a group situation, such as a technical writing team, or an office, then it will probably be in your interest to set up templates for authors to use to ensure consistency, reduce effort, and help automate conversation of documents between formats, such as building web pages from office documents. If you are also trying to store and manipulate content in XML but want to use a word processing environment for authoring, then well-crafted templates are even more important. In this article, I'm going to explore some of the ways that

152. HK -=[Hacker Kulture]=-
Propone una biblioteca virtuale dedicata alla storia dell'hacking a partire dal cyberpunk.
http://www.dvara.net/HK/
HK = [ Faqs Archive Updates News ... Link ] = HK Resolution: 1024x768 Last Update: 23.08.2005 NON UNA QUESTIONE PRIVATA, UNA QUESTIONE DI PRIVACY
"Chi accetta realisticamente una trasformazione che è regresso e degradazione, vuol dire che non ama chi subisce tale regresso e degradazione, cioè gli uomini in carne ed ossa che lo circondano. Chi invece protesta con tutta la sua forza, anche sentimentale, contro il regresso e la degradazione, vuol dire che ama quegli uomini in carne ed ossa. Amore che io ho la disgrazia di sentire, e che spero di comunicare anche a te".
Pier Paolo Pasolini, 27 Marzo 1975, "Lettere Luterane" HK-Archive HK-File Lo strano caso di Serpica Naro
Il diritto d'autore in Sintesi
H-istory-K
Punk
... Cyborg Per la maggior parte degli hacker, come per i software cowboys del cyberpunk, la lotta contro il sistema e' una filosofia di vita
[M. Iannacone] Manifest-H Ma avete mai, nella vostra psicologia da tre soldi e nel vostro tecnocervello del 1950, guardato oltre gli occhi dell'hacker?
[Mentor] EthiK-H
Basta col grande fratello! L'accesso ai computer deve essere illimitato e completo; tutta l'informazione deve essere libera

153. Hacking The Library
Kendall Clark tries to figure out if he can make the librarians and the geekshappy at the same time.
http://www.xml.com/pub/at/30

Resources
Buyer's Guide Newsletter Safari Bookshelf Try Altova's XML Suite 2005 FREE for 30 days - #1 with XML developers worldwide!
Business
Databases Graphics Metadata ... Web Services
Sponsored By XML Development Tools Free Download Stylus Studio – The World's best XML Editor! Learn XML development with Stylus Studio XML IDE Join the XML discussion at the Stylus Studio Developer Network
Sponsored Zones
Novell Learning Channel

Annotated XML

What is XML?

What is XSLT?
...
Syntax Checker

Kendall Clark tries to figure out if he can make the librarians and the geeks happy at the same time. Putting ISBNs to Work By Kendall Grant Clark Continuing his "Hacking the Library" series, Kendall Clark starts the implementation of a web service tool to retrieve Library of Congress identifiers given the ISBN of a book. [Jun. 2, 2004] Six Steps to LCC@Home By Kendall Grant Clark Continuing "Hacking the Library", Kendall Clark shows how to use the Library of Congress Classification on your own book collection. [Apr. 28, 2004] The Library of Congress Comes Home By Kendall Grant Clark Embarking on his journey to organize our media collections, Kendall Clark explains how the Library of Congress classification system can be brought into our homes.

154. Longwood Equestrian Centre - Showjumping, Dressage, Showing, Riding School
Established for over 30 years as a competition centre and BHS Approved riding school. Lessons for beginners to advanced riders, weekly shows and events, and crosscountry hacking. Situated in Essex in the south east of England.
http://www.longwoodec.co.uk/
Home Results Trailblazers Livery ... Contact Us Classified Adverts For Sale under 13.2hh For Sale 13.2hh-14.3hh For Sale 15.0hh-16.2hh For Sale over 16.2hh For Loan Ponies For Loan Horses Wanted For Loan Ponies Wanted For Loan Horses Tack For Sale Services Vehicles Miscellaneous Welcome
We hope you find all the information you need on any equestrian activity that the centre will be holding throughout the forthcoming year. If you would like to contact us with any comment or enquire about Arena Hire for your event please Contact Us
Click on Logo
Click Here For Classifieds Adverts

Click here to download Entry Forms

September 2005 Friday 2nd September Evening Trailblazers Dressage Sunday 4th September Trailblazers S/J Friday 9th September Evening Trailblazers S/J Friday 16th September Evening Trailblazers Dressage Sunday 18th September Senior BSJA Saturday 24th September Junior BSJA Sunday 25th September Junior BSJA Friday 30th September Evening Trailblazers S/J
October 2005 Sunday 2nd October Senior BSJA Saturday 8th October Barnsby Dressage Sunday 9th October Barnsby S/J Friday 14th October Evening Trailblazers S/J Saturday 15th October Junior BSJA Sunday 16th October Junior BSJA Friday 21st October Evening Trailblazers Dressage Sunday 23rd October Showing Wednesday 26th October Fun Show S/J Friday 28th October Evening Trailblazers S/J Sunday 30th October Trailblazers S/J
November 2005 Friday 4th November Evening Trailblazers Dressage Sunday 6th November Showing Friday 11th November Evening Trailblazers S/J Sunday 13th November Junior BSJA Friday 18th November

155. Slashdot | Hacking The Fluorescent Light
hacking the Fluorescent Light article related to Technology and Science.
http://science.slashdot.org/article.pl?sid=05/08/06/139200&from=rss

156. Interrorem - Network Security Specialists
Security auditing and consultancy services. Remote audit, hacking and site penetration.
http://interrorem.com/

157. Slashdot | Infosec Career Hacking
Infosec Career hacking article related to Book Reviews, Security, and Businesses.
http://books.slashdot.org/article.pl?sid=05/08/08/192221&from=rss

158. Hacking Sites Belgie: Hacking.START.BE
Links naar sites van hackers, hulpmiddelen en platforms.
http://hacking.start.be/
var keyword="be/li/hacking"; var extra="nl"; metriwebTag ("start", keyword, extra);
Pagina over hacking: cracks, serials, phreaking.
In samenwerking met startwereld: de beste belgische sites over hacking in vlaanderen.
Populaire links over hacking hack cracking crack cracks crackz hacken groups group groep groepen beveiliging beveiligingen anti-hack anti-hacking antihack antihacking beveilig beveiligd beveiliging emulatie emulator emulators emulatorz phreak phreakin phreaking hackers hackers hackerz bluebox blackbox redbox box boxes telephone telefoon tapping into hack of security secured security breach zoekmachine zoekmachines search engine search engines serial serials serials software softwares softwarez wares warez apps applications appz games gamez programma's programmas spelletjes spelletje spel spelen zaterdag: 17 september 2005 hacking.start.be Altavista Ask Jeeves Astalavista Dogpile Excite Google Hotbot Yahoo of ga naar zoek.start.be zoekafrika.start.be zoekazie.start.be zoekeuropa.start.be zoekoceanie.start.be

159. Hacking The Atari Flashback 2 Console - Cartridge Port Mod
Well then, here are the basic details to help assist you in hacking/modding yourconsole into a full fledged Atari 2600 system that can use your original
http://www.atarimuseum.com/fb2hacks/
So, you've decided to take your Atari Flashback 2 console to the next level? Well then, here are the basic details to help assist you in hacking/modding your console into a full fledged Atari 2600 system that can use your original cartridges. Okay, first things first, lets get a few things out of the way: Upon breaking the warranty tamper and/or Product ID label you have voided your warranty and the unit is now in your hands, no returns... Secondly and even more important - you do the hacks/mods at your own risk , I am not responsible for damage to you, your console, or anything else within a 100 mile radius that may be directly or indirectly leveled, incinerated or otherwise obliterated to the ground (or neighboring country) by your degree of skill (or here-in lack of) with electronics, test equipment, soldering irons or chewing gum (not all necessarily used at the same time.) ENTER... If you Dare!

160. Computer Hacking New Tool Of Political Activism
Ruffin is among a growing group of outlaw programmers determined to make hacking more than job interviewing as an extreme sport. They are beginning to experiment with the mindblowing skill locked in the global network of hackers as a powerful political tool for what Ruffin calls 'human rights hacking.' Toronto Star
http://www.gis.net/~cht/torontostar.html
Computer Hacking New Tool of Political Activism
By Naomi Klein
From The Toronto Star, July 23, 1998
Imagine if computer hackers, the daredevils of the networked world, suddenly became principled political activists.
Imagine if they had a mission besides breaking and entering; if they had more to prove than that they are smarter than whoever designed your computer system. Imagine if their targets were selected as part of well organized, thoroughly researched, international human rights campaigns.
In truth, "really good hackers use their skills like a chess game," explains Oxblood Ruffin, the name used by the Foreign Minister of the Cult of the Dead Cow , one of the oldest and most infamous hacker cabals. Most hackers aren't out to destroy, just to gain access and say they did.
When they slide into a supposedly secure network, its checkmate time. The invaded institution then has two choices: call the police or offer the kid a job. "Good hackers", Ruffin says, "are the richest 21-year-olds I know."
But Ruffin is among a growing group of outlaw programmers determined to make hacking more than job interviewing as an extreme sport. They are beginning to experiment with the mind-blowing skill locked in the global network of hackers as a powerful political tool for what Ruffin calls "human rights hacking."

Page 8     141-160 of 199    Back | 1  | 2  | 3  | 4  | 5  | 6  | 7  | 8  | 9  | 10  | Next 20

free hit counter