Geometry.Net - the online learning center
Home  - Computer - Hacking
e99.com Bookstore
  
Images 
Newsgroups
Page 9     161-180 of 199    Back | 1  | 2  | 3  | 4  | 5  | 6  | 7  | 8  | 9  | 10  | Next 20

         Hacking:     more books (100)
  1. Hacking Work: Breaking Stupid Rules for Smart Results by Bill Jensen, Josh Klein, 2010-09-23
  2. Hacking: The Art of Exploitation, 2nd Edition by Jon Erickson, 2008-02-04
  3. Hacking: The Next Generation (Animal Guide) by Nitesh Dhanjani, Billy Rios, et all 2009-09-10
  4. Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition by Stuart McClure, Joel Scambray, et all 2009-01-05
  5. Hacking For Dummies by Kevin Beaver, 2010-01-12
  6. Hacking the Xbox: An Introduction to Reverse Engineering by Andrew Huang, 2003-07
  7. Hacking Exposed Wireless, Second Edition by Johnny Cache, Joshua Wright, et all 2010-07-09
  8. HACKING EXPOSED WEB APPLICATIONS 3/E by Joel Scambray, 2010-10-15
  9. Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques by Thomas Wilhelm, Jason Andress, 2010-09-24
  10. Gray Hat Hacking, Second Edition: The Ethical Hacker's Handbook by Shon Harris, Allen Harper, et all 2007-12-20
  11. No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing by Johnny Long, Jack Wiles, 2008-02-21
  12. Google Hacking for Penetration Testers by Johnny Long, 2007-11-02
  13. Hacking Exposed Computer Forensics, Second Edition: Computer Forensics Secrets & Solutions by Aaron Philipp, David Cowen, et all 2009-09-10
  14. An Introduction to Probability and Inductive Logic by Ian Hacking, 2001-07-02

161. Samba - Opening Windows To A Wider World
hacking The TiVo FAQ Wizard 1.0.3. Search the hacking The TiVo FAQ Other formsof hacking The TiVo FAQ access. FAQ index The whole FAQ
http://tivo.samba.org/
search samba.org: Choose A Mirror Argentina Australia Australia Austria Belgium Bolivia Canada China Costa Rica Finland France Germany Germany Greece Hungary Ireland Italy Korea Lithuania Malaysia Norway Poland Russia Russia Serbia and Montenegro Singapore Sweden Switzerland Taiwan USA (East Coast) USA (Midwestern) USA (Midwestern) USA (West Coast) USA (West Coast) Javascript must be enabled for this menu to work.
Opening Windows to a Wider World
Current Stable Releases
Historical
Maintenance
Beyond samba.org
Related Sites
International Sites
Samba is an Open Source Free Software suite that has, since 1992 , provided file and print services to all manner of SMB/CIFS clients, including the numerous versions of Microsoft Windows operating systems. Samba is freely available under the

162. Computer Security Company To Hackers Bring It On
CNN
http://cnn.com/2001/TECH/computing/01/15/hacking.contest.ap/index.html

163. How To: Hacking The Linksys NSLU2 – Part 1 : TomsNetworking :
Title How To hacking the Linksys NSLU2 – Part 1. Author Jim Buzbee. Date 08/03/04 hacking the Buffalo TeraStation · VoIP Bandwidth Calculation
http://www.tomsnetworking.com/Sections-article85.php
@import url("themes/TN3/style/style.css"); document.write('');
Friday, September 16
Advanced Search
Home News Articles ... Toms Hardware Recent Articles Choose an article 15 Sep 05 - Review: LaCie Ethernet Disk mini 12 Sep 05 - UTStarcom F1000G – First 802.11g VoWLAN phone 8 Sep 05 - QuickView: Vonage Wi-Fi Handset 6 Sep 05 - Review: Sling Media Slingbox 23 Aug 05 - QuickView: Plantronics CS50-USB VoIP Wireless He ... 19 Aug 05 - HeadToHead: Infrant ReadyNAS 600 vs. X6 16 Aug 05 - Review: ZYXEL P-2000W v2 VoIP Wi-Fi phone 12 Aug 05 - How To: Building a BlueSniper Rifle – Part 2 10 Aug 05 - Linksys' Skype Phone 9 Aug 05 - Review: Iomega StorCenter Pro NAS 200d/320GB with ... 5 Aug 05 - QuickView: NETGEAR GS108 ProSafe 8 Port Gigabit ... 3 Aug 05 - A Newbie's Introduction to DEFCON 28 Jul 05 - Owning IOS at Black Hat 2005 28 Jul 05 - Review: Olympia Cordless DUALPhone for Skype 26 Jul 05 - Review: PGP Universal – Part 2 22 Jul 05 - Review: PGP Universal – Part 1 19 Jul 05 - LAN Party How To – Part 2: Building the LAN 14 Jul 05 - QuickView: Hawking HBB1 Broadband Booster Summary Title: How To: Hacking the Linksys NSLU2 – Part 1 Author: Jim Buzbee Date: Page 1 of 4
How To: Hacking the Linksys NSLU2 – Part 1
Figure 1: The Linksys NSLU2 Introduction When I first read the review of the new Linksys Network Storage Unit device (NSLU2) I was definitely interested. It looked to be small, silent, inexpensive and flexible enough to provide backup and file storage to my network.

164. CNN.com - US - FBI Follows Internet Chat Room Leads In Hacker Probe - February 1
CNN
http://www.cnn.com/2000/TECH/computing/02/15/hacking.investigation.02/index.html
U.S. News Editions myCNN Video ... Feedback
CNN Sites CNN CNN Europe CNNfn CNNSI myCNN CNNfyi AllPolitics Languages
Search
CNN.com CNNSI.com CNNfn.com The Web
U.S.

TOP STORIES
California braced for weekend of power scrounging

Court order averts strike against Union Pacific railroad

U.S. warning at Davos forum

Two more Texas fugitives will contest extradition
...
MORE
TOP STORIES Thousands dead in India; quake toll rapidly rising Davos protesters confront police California readies for weekend of power scrounging Capriati upsets Hingis to win Australian Open ... MORE MARKETS 4:30pm ET, 4/16 DJIA NAS SPORTS Jordan says farewell for the third time ... LOCAL EDITIONS: CNN.com Europe change default edition MULTIMEDIA: video video archive audio multimedia showcase ... more services E-MAIL: Subscribe to one of our news e-mail lists Enter your address: DISCUSSION: chat feedback CNN WEB SITES: CNNfyi.com CNN.com Europe AsiaNow Spanish ... Korean Headlines TIME INC. SITES: Go To ... Time.com People Money Fortune EW CNN NETWORKS: CNN anchors transcripts Turner distribution SITE INFO: help contents search ad info ... jobs WEB SERVICES: Main Page Bracing for Cyberwar Hacking Primer Scenes from the 'Hacker Underground' ... Related Sites
FBI follows Internet chat room leads in hacker probe
Investigators seek 2 named suspects; UCLA says it was victimized, too

165. Garmin Hacking Project
Garmin hacking Project. If you don t want to pay Garmin for their expensiveconnector for the GPS38/40/45/90 then check out the first sharehardware project
http://www.abnormal.com/~thogard/gps/grmnhack.html
Garmin Hacking Project
If you don't want to pay Garmin for their expensive connector for the GPS38/40/45/90 then check out the first sharehardware project for a low cost connector from the Open Project. The GPS45 has a 90.0022kt (104mph) speed limit. It was our intent to find a way arround this. It is also our intent to publish full details on the Garmin Protocol Garmin Protocol (John F. Waers' version) Garmin Protocol (Bill Soley's version) Tom's photo GPS40 GIF format Bob's GPS45 Internal photos PCBoard (65K) Backside of the display (28K) The ROM is the chip on the bottom right side. Its left side is next to the three verticel bands. The area to the left is where the keypad makes contact. The LCD is the blue rectangle on the top and the backlight is white and on the right.

166. Chrootstrap's Hacking Articles
Educational programming articles ranging from introductory to very advanced.
http://www.geocities.com/chrootstrap/
Chrootstrap's Hacking Articles Here are some articles I wrote regarding that delightful activity, programming. I hope they are of some use to you. All these articles are covered by the GNU Free Documentation License version 1.2 care of the fantastic Free Software Foundation , which was founded by Richard M. Stallman (rms) . Feel free to contact me at chrootstrap@yahoo.com . That always makes my day. Have fun and happy hacking!
Adding Back Doors to the Standard C Library
I demonstrate a technique for shared library hacking by giving all programs using the open standard library function the ability to use 'http://' addresses as filenames. (December 2003)
Easily Extending Mozilla
Demonstrates how to use XUL and JavaScript to add functionality to Mozilla by adding an 'Export to PDF' menu item. (December 2003)
Adding Python Operators
A description of how to add new, custom operators to the Python grammar including a 'space' operator. (December 2003)
CDROM Bootstrapping Your Kernel
A tutorial on how to do floppy and no emulation booting from CDROM to your own kernel. (November 2003)
Super-Sized OTP
A short article on filling CDROMs with one-time pads for cryptography. (September 2003)

167. LIQUID HACKING LABORATORY
CORNELIA SOLLFRANK EVRIM SEN/ DENIS MOSCHITTO FRANCESCA DA RIMINI FRANKFIETZEK HEATH BUNTING JODI JOSEPHINE STARRS LEON CMIELEWSKI KATE
http://obn.org/LHL/
JOSEPHINE STARRS NATALIE BOOKCHIN RACHEL BAKER RTMARK ... (((((((((%""ns
media ====lab-
info/ presse

images

opening september 21, 2000; 7 pm (19 uhr)
with ALEXEI SHULGIN and 386 dx cyberpunk rockband
and
ASCII live-videocam
webmaster@kunstverein-nbg.de

telefon +49-911-241562
fax +49-911-241563 sponsored by

168. Underground Industries
An underground hacking and security team with forums.
http://jrbach.com

169. Hacking
Care and Feeding of your Hacker, by Peter Seebach; What is hacking?, I mhacking TECO. In a general (timeextended) sense What do you do around here
http://web.demigod.org/~zak/geek/hack.shtml
Contents
This page contains the following:
Care and Feeding
The following list is an attempt to cover some of the issues that will invariably come up when people without previous experience of the hacker community try to hire a hacker. This FAQ is intended for free distribution, and may be copied as desired. It is in an early revision. If you wish to modify the FAQ, or distribute it for publication, please contact the author. The author is seebs@plethora.net . The official distribution site (as of revision 0.05) is " http://www.plethora.net/~seebs/faqs/hacker.html ". If you find this information useful, please consider sending a token donation to the author; email for details. Revision 0.05 - Last modified September 28, 1999
Questions and Answers:
Section 0: Basic understanding.
0.0: Won't my hacker break into my computer and steal my trade secrets?
No. Hackers aren't, contrary to media reporting, the people who break into computers. Those are crackers. Hackers are people who enjoy playing with computers. Your hacker may occasionally circumvent security measures, but this is not malicious; she just does it when the security is in her way, or because she's curious.

170. Dragones Del Amanecer
Extensa biblioteca con ezines de grupos de hackers y textos sobre seguridad, hacking, cracking, cifrado, Phreaking y Linux.
http://www.dragones.org/
Bienvenidos a la Web de Dragones del Amanecer . En esta pagina web encontrareis diferentes secciones en las cuales hemos ido almacenado todo tipo de información relacionada con el tema de la seguridad informática. En la Biblioteca están todo tipo de textos técnicos, programas y e-zines .. En el foro encontrareis los textos o artículos no-técnicos. Finalmente en la sección de contacto están los e-mails del grupo así como las normas de funcionamiento de esta web. Si encontráis algún error mandadme un e-mail Dragones del Amanecer Ultima actualización: Viernes 18 de Febrero del 2005 Otra semana Hola Ha pasado otra semana y sigo actualizando poco a poco el web de Dragones del Amanecer . Espero tenerlo todo al día antes de que finalice el mes. Si encontráis algún problema no dudéis en mandarme un e-mail. Dragones del Amanecer Feliz séptimo cumpleaños Hola a todos de nuevo.

171. CNN In-Depth Specials - Hackers - Two Views Of Hacking
For different perspectives on hacking, CNN Interactive posed a series of questions hacking is a felony in the United States and most other countries.
http://archives.cnn.com/TECH/specials/hackers/qandas/
MAIN PAGE WORLD ASIANOW U.S. ... news quiz
CNN WEB SITES: TIME INC. SITES: Go To ... Time.com People Money Fortune EW MORE SERVICES: video on demand video archive audio on demand news email services ...
pagenet

DISCUSSION: message boards chat feedback
SITE GUIDES: help contents search
FASTER ACCESS: europe japan
WEB SERVICES:
Main Page
Bracing for Cyberwar Hacking Primer Scenes from the 'Hacker Underground' ... Related Sites
Two views of hacking
For different perspectives on hacking, CNN Interactive posed a series of questions via e-mail to two experts in the field, one a computer security expert for IBM, the other, editor of 2600, the Hackers' Quarterly.
'Hackers are necessary'
(CNN) Emmanuel Goldstein is the editor-in-chief of 2600: The Hacker Quarterly and hosts a weekly radio program in New York called "Off the Hook." 1. How do you define hacking?
Hacking is, very simply, asking a lot of questions and refusing to stop asking. This is why computers are perfect for inquisitive people they don't tell you to shut up when you keep asking questions or inputting commands over and over and over. But hacking doesn't have to confine itself to computers. Anyone with an inquisitive mind, a sense of adventure and strong beliefs in free speech and the right to know most definitely has a bit of the hacker spirit in them. 2. Are there legal or appropriate forms of hacking?

172. HACKING - The Last Day In The Web - Jnet@iol.it
Raccolta di manuali di hacking
http://www.jnetworld.com/hacking.htm
Best View 1024 x 768 W W W . J N E T W O R L D . C O M Home Hackers Hacking Tutto il materiale contenuto in questa sezione è a scopo informativo pertanto non mi riterrò responsabile dell'utilizzo che ne verrà fatto da parte degli utenti. Who Do You Want To Nuke Today? Vuoi avvicinarti al mondo dell'hacking ma non sai da dove cominciare? Allora questa è la sezione che fa per te!... In questo settore troverai informazioni sugli argomenti che vedi nel menu alla tua sinistra con la possibilità di scaricare delle guide e molto materiale che potrà tornarti utile nel tuo "corso" di hacking. Inoltre, troverai parecchi links a siti hackers italiani (e non) da dove poter acquisire molto materiale utile. Troverai guide e documenti creati dagli stessi hackers che ti spiegheranno passo per passo da dove iniziare, che genere di tools ti servono, nozioni sui sistemi operativi maggiormente consigliati e gli accorgimenti da adottare mentre operi in rete. Troverai anche diversi links dedicati specificamente al download di files per chiarimenti sui vari argomenti, software, links to hackers meeting, forum e la possibilità d'iscriverti ad alcune mailing list. Qualcosina d'interessante per cominciare: Programma di backdoor Exploit Ottenere indirizzi IP Invisibili nella rete E-mail senza mittente e navigazione con altro IP

173. Security News Portal, Computer Networking Security Hacking And Virus News Alerts
Security News Portal is a daily updated security news portal featuring the latestcomputer and network security, hacking, virus and trojan news.
http://www.securitynewsportal.com/index.shtml
Loading...
Gathering Latest News Security News Hacking Exploit Vulnerability News Virus and Trojan News Hacker Hacking News ... Computer and Network Security Alerts security news,security news portal,computer security news,security industry news,national security news,network security news,homeland security news,information security news,internet security news,security systems news,national security news service,social security news,security system news,police and security news,airport security news,info security news,it security news,security news ticker,global security news,bank security news,security news groups,linux security news,transportation security administration news,latest security news,new security,sentry news.security newsletter,cctv news,security newsletters,securities news,security alerts,homeland security alerts,microsoft security alerts,computer security alerts national security alerts,internet security alerts oracle security alerts,vanderbilt security alerts
Home
Site News SNPStuff Recommend ... Comic
Stats are shown here. Your browser does not handle iframes

Click here for more information

Latest Security News
at SecurityNewsPortal
Don't forget to visit SNP's

HomelandSecurityX

featuring the latest breaking
global security and terrorism news from around the world Click here to keep informed...

174. Norton Heath Equestrian Centre
Offering top class facilities and a wide variety of competitions most days of the week. Lessons, livery, two indoor and outdoor arenas, tack shop, and local hacking in and around Blackmore, Essex.
http://www.nortonheath.com/
Welcome to Norton Heath Equestrian Centre. We can offer you a friendly welcome and top class facilities. Recently re-opened under new management but with most of the same faces, our efficient, experienced team run a huge variety of competitions most days of the week. These links should enable you to reach our main pages without being able to read frames, however: Welcome to Norton Heath Equestrian Centre Schedules : a huge variety of competitions most days of the week Monday evenings
Wednesday evenings

Tuesdays

Sundays
... Calendar : the same information organised by date Facilities : our livery price list and other services Contacts : all our contact details, a map and directions var site="sm2nortonhe"

175. Hacking Windows XP: Hacking Windows Explorer
From the ExtremeTech book, hacking Windows XP, we bring your some tweaks andtips on hacking Windows Explorer.
http://www.extremetech.com/article2/0,1697,1839018,00.asp
Search in All Ziff Davis Sites ExtremeTech HOME MY EXTREMETECH SIGN IN Already a Member? Sign in Not a member? Join Now. Linux Windows Operating Systems ... Security var jBreadcrumbTitle; jBreadcrumbTitle = "Hacking Windows XP: Hacking Windows Explorer"; Home Windows document.write(jBreadcrumbTitle); ADVERTISING
July 19, 2005

176. Ilion Security SA
Ethical hacking and computer security training. Geneva, Switzerland.
http://www.ilionsecurity.ch/
ilion Security SA
Network Audit by Ethical Hacking
English

177. Many-to-Many: Hacking The A-List
hacking the AList. Following Liz s read of BlogHer, one of the more interestingpoints to come out of the conference is the need for constituent algorithms
http://www.corante.com/many/archives/2005/08/02/hacking_the_alist.php
About Us Advertise Contact Us Services ... > Jimbo's Problems: A Free Culture Manifesto
August 02, 2005
Hacking the A-List
Following Liz's read of BlogHer , one of the more interesting points to come out of the conference is the need for constituent algorithms ways of revealing hidden groups. For the BlogHer community, the Technorati 100 was more than a whipping boy, but an index where a group was under-represented. Mary Hodder's approach , spot on, is to develop alternative indexes. No index is all-inclusive and all are biased. This isn't necessarily a bad thing. Each is just a way to view the world and it's information. But the interesting part is the sociology of how coders frame the world with each index and how we accept, reject or game the indexes that frame us. Think about the politics at play with the US Census, Gerrymandering jurisdiction or any list constructed by the mainstream media. Or how we over-react any time someone makes a new blog index when it hints at a hierarchy. Suddenly we are thrown back to gold stars, grades, being picked for the kickball team, caste judgments, nationalism, ageism, other isms, clicks, ins and outs. But an index is just one way to view the world. What happens when creating and distributing an index is as democratized as blogging is today? Each index is an attempt to institutionalize, where merely publishing it with credentialed claims invites circumspect vigilance. Somehow we teat lists as authorities, further incenting people to create lists to claim authority. Lists are just groupings, or

178. CNN - Kashmir-minded Pakistani 'hacktivists' Blitz Web Sites - October 8, 1999
Since October 1, the two students who make up the Pakistan Hackerz Club have defaced over 40 Web sites, according to a hacking mirror site. CNN
http://www.cnn.com/TECH/computing/9910/08/pakistani.hack/

MAIN PAGE
WORLD U.S. LOCAL ... daily almanac
MULTIMEDIA:
video
video archive audio multimedia showcase ... more services
E-MAIL:
Subscribe to one of our news e-mail lists.
Enter your address: document.write(' '); Or:
Get a free e-mail account

E-MAIL
DISCUSSION: message boards chat feedback
CNN WEB SITES:
AsiaNow
Svenska Norge Danmark ... Italian FASTER ACCESS: europe japan TIME INC. SITES: Go To ... Time.com People Money Fortune EW CNN NETWORKS: more networks transcripts SITE INFO: help contents search ad info ... jobs WEB SERVICES: Main Page Bracing for Cyberwar Hacking Primer Scenes from the 'Hacker Underground' ... Related Sites
Kashmir-minded Pakistani 'hacktivists' blitz Web sites
October 8, 1999
Web posted at: 3:57 p.m. EDT (1957 GMT) By D. Ian Hopper CNN Interactive Technology Editor Since October 1, the two students who make up the Pakistan Hackerz Club have defaced over 40 Web sites, according to a hacking mirror site. From the Mildew Removal Specialists site to several government sites within China, the PHC hasn't shown one overarching pattern in their choice of targets. Not so for the results; almost every site's main page has been replaced with the PHC logo and a treatise in defense of the disputed region of Kashmir as well as graphic photographs depicting charred bodies and wounded Kashmiri children. The two members of the club, known only as Doctor Nuker and Mr_Sweet, refuse to identify themselves beyond their profession and nationality. While popular hacking site Attrition.org logs PHC as hacking 61 sites in all since July 4 of this year, their recent proliferation came as Indians went to the polls to elect a new government.

179. The NTLDR Hacking Guide By Jason C. Locke
The NTLDR hacking Guide by Jason C. Locke. This document describes how to useNTLDR to boot Windows NT, Windows 95, Linux and old versions of DOS using
http://www.tburke.net/info/ntldr/ntldr_hacking_guide.htm
The NTLDR Hacking Guide
by Jason C. Locke
Version 1.4
Last Modified: September 15, 1996 This page was originally located at http://www.dorsai.org/~dcl/publications/NTLDR_Hacking/index.html , but has been down for some time. It has enough interesting information that I wanted to post it here (with html modifications). Much of what this page talks about is how when you dual boot, Boot.ini transfers control to Bootsect.dos. BootPart is a utility that will allow you to create your own bootsect file that can be used to dual boot to other operating systems. Note: You can find archives of this and other Web pages at http://www.archive.org . In this case the the pages are at http://web.archive.org/web/*/http://www.dorsai.org/~dcl/publications/NTLDR_Hacking/index.html This document describes how to use NTLDR to boot Windows NT, Windows 95, Linux and old versions of DOS using NTLDR. In addition to this document, additional documents and programs are available from the author free of charge.
  • OS_BOOT.ZIP
      These are the diagrams that visually illustrate the booting procedures for Windows NT, Windows 95 and MS-DOS. The file names and formats are as follows:
      • OS_BOOT.VSD: Visio Drawings compatible with all versions of Visio.

180. MAKE: Blog: Wolfgang Puck Self-heating Can Hacking...
Self Hheating Can hacking from TeamDroid I saw a whole stack of these at thegrocery Wolfgang Puck selfheating can hacking… from A Grevs Dev Blog
http://www.makezine.com/blog/archive/2005/07/wolfgang_puck_s_1.html
My Account Logout Site navigation:
Suggest a Site!

Recent Entries
Topics Archives September 2005 Sun Mon Tue Wed Thu Fri Sat Powered by
Movable Type 3.15

Main
Wolfgang Puck self-heating can hacking...
Awhile back I wrote about the new Wolfgang Puck self-heating coffee containers that took 10 years and $24 mil to develop. Well, I managed to find them in a local store and bought them to take apart to see how they work. Once activated, they reach 145 degrees in about 6 minutes. This isn't a review of the beverage, it's all about the stuff that makes the liquid hot, how it works, pictures and links to patents.... The self-heating cans are made by a company called OnTech . Their technology section talks a it about how their heating works. The OnTech self-heating container is built from two main parts: the container and the actuating "puck." The container is composed of an inner cone that holds the mineral (Calcium Oxide), and the outer container body, which holds the beverage product. The puck holds water and is sealed by a foil membrane. All components are made from FDA-approved materials. On to the dissection...

Page 9     161-180 of 199    Back | 1  | 2  | 3  | 4  | 5  | 6  | 7  | 8  | 9  | 10  | Next 20

free hit counter