Geometry.Net - the online learning center
Home  - Book_Author - Hackers The
e99.com Bookstore
  
Images 
Newsgroups
Page 2     21-40 of 195    Back | 1  | 2  | 3  | 4  | 5  | 6  | 7  | 8  | 9  | 10  | Next 20
A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

         Hackers The:     more books (99)
  1. The Database Hacker's Handbook: Defending Database Servers by David Litchfield, Chris Anley, et all 2005-07-14
  2. The Hacker Diaries : Confessions of Teenage Hackers by Dan Verton, 2002-03-26
  3. The Downhill Lie: A Hacker's Return to a Ruinous Sport (Vintage) by Carl Hiaasen, 2009-05-05
  4. The Mac Hacker's Handbook by Charles Miller, Dino Dai Zovi, 2009-03-03
  5. Certified Ethical Hacker Exam Prep by Michael Gregg, 2006-04-17
  6. The Best of 2600: A Hacker Odyssey by Emmanuel Goldstein, 2008-07-28
  7. Developmental Exercises to Accompany Rules for Writers by Diana Hacker, 2007-10-15
  8. The Ultimate Pipe Book by Richard Carleton Hacker, 1989-09
  9. Off Center: The Republican Revolution and the Erosion of American Democracy; With a new Afterword by Professor Jacob S. Hacker, Professor Paul Pierson, 2006-09-26
  10. Developmental Exercises to Accompany A Writer's Reference by Diana Hacker, 2006-12-06
  11. A Hacker Manifesto by McKenzie Wark, 2004-10-04
  12. Love, Death, and the Changing of the Seasons by Marilyn Hacker, 1995-03-17
  13. Hackers: Heroes of the Computer Revolution by StevenLevy, Steven Levy, 2000-12-31
  14. The Bedford Handbook by Diana Hacker, 2010-06

21. Hackers
Hackers This PBS Frontline quot;report on the exploits of Hackers and how they have highlighted the Internet apos;s insecurities quot; thoroughly covers the topic in multimedia formats. It
http://rdre1.inktomi.com/click?u=http://www.pbs.org/wgbh/pages/frontline/shows/h

22. BcN-PhR | Barcelona Phreakers
Art­culos, enlaces y manuales sobre hacking, phreaking, cracking, virus y eDonkey. Foro y chat.
http://www.iespana.es/wahc/
W.A.H.C ya no existe, ahora tenemos una nueva web:
Direcciones: www.bcn-phr.tk www.barnaphreak.tk www.bcnphreakers.tk
antigua web aki

23. Book
Honeypots Tracking Hackers The first and only book to explore the fascinatingworld of Honeypots! Honeypots Tracking Hackers. Honeypots Tracking Hackers.
http://www.tracking-hackers.com/book/
Honeypots: Tracking Hackers
"The first and only book to explore the fascinating world of Honeypots!
The first book ever dedicated to honeypot technologies. Subjects include what a honeypot is, the different types of honeypots, how they work, deploying and maintaing them, and legal issues involved. Six chapters are dedicated to focusing on six different honeypot and how they work, in detail. Included is a CDROM that has source code, whitepapers, tools and utilities, logs, and other data discussed in the book. The book is 429 pages and is publised by Addison-Wesley Book Material
  • Table of Contents : Discover all the topics that the book covers. Foreword Hear what security expert Marcus Ranum has to say about Honeypots: Tracking Hackers . Read the foreword now. Preface : I had just been hacked and I was elated! Click here to find out why. Chapter Four Unlike a firewall or intrusion detection system, honeypots do not solve a specific problem. A honeypot is a tool that contributes to your overall security aritecuture. The value of honeypots and the problems they help solve depends on how you build deploy and use them. Click here to learn more about the Value Of Honeypots. Reviews . Find out what others have to say about the first book ever on honeypots!

24. Old And New Hacker Ethics
Is there a Hacker Ethic for 90s Hackers?
http://www.fiu.edu/~mizrachs/hackethic.html
Is there a Hacker Ethic for 90s Hackers?
by Steven Mizrach
Introduction
The goal of this text analysis project was to take the texts of the computer underground and to analyze them for the presence of a) knowledge about the Hacker Ethic and b) evolution of that Ethic. Many writers, such as Steven Levy, bemoan the fact that modern-day hackers (the computer underground) are not worthy of the name because they do not live up to the principles of the original Hacker Ethic, and as unethical individuals, should simply be called "computer terrorists" or "juvenile delinquents." I sought to examine whether 90s new hackers knew of the old Hacker Ethic, if they had added anything to it, and the reasons why they felt they acted differently from their predecessors. I broadened my text analysis to look at what they saw as ethical violations, and reasons why some might repudiate the Hacker Ethic or the idea of having an ethic. As my text project evolved, I found that after discovering the existence of a new hacker ethic for new hackers, I was wondering if people expressing the principles of the new ethic also expressed the old. I expected that the adoption of a new set of ethics would not necessarily mean the complete abandonment of the old. This would establish some continuity between both groups of hackers, and some familiarity by new hackers with the old ideals. If the hypothesis of continuity turns out to be true, then new hackers are not as different from old hackers as authors like Levy (or certain computer security professionals) might claim. They would then not only have their own ethics, but also utilize some ethical principles of their predecessors.

25. Hacker
Hackers consider themselves something of an elite (a meritocracy basedon ability), though one to which new members are gladly welcome.
http://www.jargon.org/html/H/hacker.html
hacker Prev H Next
hacker n.
[originally, someone who makes furniture with an axe] 1. A person who enjoys exploring the details of programmable systems and how to stretch their capabilities, as opposed to most users, who prefer to learn only the minimum necessary. RFC1392, the Internet Users' Glossary , usefully amplifies this as: A person who delights in having an intimate understanding of the internal workings of a system, computers and computer networks in particular. 2. One who programs enthusiastically (even obsessively) or who enjoys programming rather than just theorizing about programming. 3. A person capable of appreciating hack value 4. A person who is good at programming quickly. 6. An expert or enthusiast of any kind. One might be an astronomy hacker, for example. 7. One who enjoys the intellectual challenge of creatively overcoming or circumventing limitations. 8. [deprecated] A malicious meddler who tries to discover sensitive information by poking around. Hence password hacker network hacker . The correct term for this sense is cracker the network . For discussion of some of the basics of this culture, see the

26. CNN - Technology - Clinton Fights Hackers, With A Hacker - February 14, 2000
CNN
http://www.cnn.com/2000/TECH/computing/02/15/hacker.security/index.html
computing Editions myCNN Video ... Feedback
CNN Sites CNN CNN Europe CNNfn CNNSI myCNN CNNfyi AllPolitics Languages
Search
CNN.com CNNSI.com CNNfn.com The Web
TECHNOLOGY

TOP STORIES
Consumer group: Online privacy protections fall short

Guide to a wired Super Bowl

Debate opens on making e-commerce law consistent

MORE

TOP STORIES More than 11,000 killed in India quake Mideast negotiators want to continue talks after Israeli elections MORE BUSINESS ... MORE MARKETS 4:30pm ET, 4/16 DJIA NAS SPORTS Jordan says farewell for the third time ... LOCAL EDITIONS: CNN.com Europe change default edition MULTIMEDIA: video video archive audio multimedia showcase ... more services E-MAIL: Subscribe to one of our news e-mail lists Enter your address: DISCUSSION: chat feedback CNN WEB SITES: CNNfyi.com CNN.com Europe AsiaNow Spanish ... Korean Headlines TIME INC. SITES: Go To ... Time.com People Money Fortune EW CNN NETWORKS: CNN anchors transcripts Turner distribution SITE INFO: help contents search ad info ... jobs WEB SERVICES: Main Page Bracing for Cyberwar Hacking Primer Scenes from the 'Hacker Underground' ... Related Sites
Clinton fights hackers, with a hacker
February 15, 2000

27. HackersCatalog.com - Hacking Homepage!
The Master Hacker '04 PRO( NEW) Hackers Tool Chest '04 PRO(NEW Learn from the best Hackers how to access email accounts, servers, networks and more
http://rdre1.inktomi.com/click?u=http://www.hackerscatalog.com/&y=0279D8FB68

28. CNN - Shopping-cart Glitch Could Give Hackers A Discount - February 4, 2000
CNN
http://www.cnn.com/2000/TECH/computing/02/04/shop.glitch.idg/index.html
[an error occurred while processing this directive]
MAIN PAGE
WORLD U.S. LOCAL ... daily almanac
MULTIMEDIA:
video
video archive audio multimedia showcase ... more services
E-MAIL:
Subscribe to one of our news e-mail lists.
Enter your address: document.write(' '); Or:
Get a free e-mail account

E-MAIL
DISCUSSION: message boards chat feedback
CNN WEB SITES:
AsiaNow
Svenska Norge Danmark ... Italian FASTER ACCESS: europe japan TIME INC. SITES: Go To ... Time.com People Money Fortune EW CNN NETWORKS: more networks transcripts SITE INFO: help contents search ad info ... jobs WEB SERVICES: Main Page Bracing for Cyberwar Hacking Primer Scenes from the 'Hacker Underground' ... From...
Shopping-cart glitch could give hackers a discount
February 4, 2000 Web posted at: 12:19 p.m. EDT (1219 GMT) by Ann Harrison (IDG) An Internet security firm has issued an alert for what it said are tampering vulnerabilities in several Web-based shopping cart applications. Internet Security Systems Inc. (ISS) in Atlanta Tuesday released a statement that said the company had identified 11 shopping-cart applications that used flawed online forms that intruders could exploit to change prices or discounts at e-commerce sites. Many shopping-cart applications use hidden fields in HTML forms to define product parameters such as quantity, name and price. That hidden data gets submitted from the customer back to the site along with information filled in on a form when the form is submitted. However, "hidden" data is only obscured from the customer's view when looking at the form through a browser; anyone can find this data by choosing to view the form's HTML source code.

29. CNN - DOD Overhauls Network To Thwart Hackers - May 4, 1999
CNN
http://www.cnn.com/TECH/computing/9905/04/overhaul.idg/index.html

MAIN PAGE
WORLD ASIANOW U.S. ... news quiz
CNN WEB SITES: TIME INC. SITES: Go To ... Time.com People Money Fortune EW MORE SERVICES: video on demand video archive audio on demand news email services ...
pagenet

DISCUSSION: message boards chat feedback
SITE GUIDES: help contents search
FASTER ACCESS: europe japan
WEB SERVICES:
Main Page
Bracing for Cyberwar Hacking Primer Scenes from the 'Hacker Underground' ... Related Sites
DOD overhauls network to thwart hackers
May 4, 1999

Web posted at: 3:19 p.m. EDT (1919 GMT)
by Bob Brewin From...
(IDG) The Defense Department has started an overhaul of its global unclassified network to fight off the barrage of hacker attacks the department's systems suffer and to increase capacity to handle a huge rise in traffic to and from the Internet. The Defense Information Systems Agency plans to redesign its Non-Classified Internet Protocol Router Network, DOD's primary entry into commercial World Wide Web sites, to take advantage of enhanced security measures and to improve overall performance. The NIPRNET redesign, scheduled for completion in December with main network components slated for installation no later than June, will provide DOD with a network better designed to stave off hacker attacks that hit DOD systems at a rate of 250,000 a year, according to a DOD source briefed on the network plan.

30. CNN.com - Technology - For Hire: Hackers To Help Pentagon Prevent Attacks - Augu
CNN
http://www.cnn.com/2000/TECH/computing/08/01/pentagon.at.defcon.idg/index.html
technology > computing Editions myCNN ... Feedback
CNN Sites CNN CNN Europe CNNfn CNNSI myCNN CNNfyi AllPolitics Languages
Search
CNN.com CNNSI.com CNNfn.com The Web
TECHNOLOGY

TOP STORIES
Consumer group: Online privacy protections fall short

Guide to a wired Super Bowl

Debate opens on making e-commerce law consistent

MORE

TOP STORIES More than 11,000 killed in India quake Mideast negotiators want to continue talks after Israeli elections MORE BUSINESS ... MORE MARKETS 4:30pm ET, 4/16 DJIA NAS SPORTS Jordan says farewell for the third time ... LOCAL EDITIONS: CNN.com Europe change default edition MULTIMEDIA: video video archive audio multimedia showcase ... more services E-MAIL: Subscribe to one of our news e-mail lists Enter your address: DISCUSSION: chat feedback CNN WEB SITES: CNNfyi.com CNN.com Europe AsiaNow Spanish ... Korean Headlines TIME INC. SITES: Go To ... Time.com People Money Fortune EW CNN NETWORKS: CNN anchors transcripts Turner distribution SITE INFO: help contents search ad info ... jobs WEB SERVICES:
For hire: Hackers to help Pentagon prevent attacks
From... by Mathew Schwartz LAS VEGAS (IDG) At the opening of the annual Def Con hackers convention here Friday, the Pentagon's CIO pleaded with attendees to leave government systems alone and outlined proposed new laws aimed at prosecuting computer crimes more expeditiously. But he also said the government's doors are open to hackers who want to help prevent attacks.

31. Hackers
Hackers gets into the mindset of those people who push the computer past the envelopesof expectionssitting at the keyboard these are artists, pioneers
http://mosaic.echonyc.com/~steven/hackers.html
Heroes of the Computer Revolution M y first book and probably the most popular, even sixteen years after publication. Hackers gets into the mindset of those people who push the computer past the envelopes of expectionssitting at the keyboard these are artists, pioneers, explorers. It is here that I introduced the concept of The Hacker Ethic Access to computers should be unlimited and total. Always yield to the Hands-On Imperative All information should be free. Mistrust authoritypromote decentralization. Hackers should be judged by their hacking. You can create art and beauty on a computer. Computers can change your life for the better. The book is in three parts, exploring the canonical AI hackers of MIT, the hardware hackers who invented the personal computer industry in Silicon Valley, and the third-generation game hackers in the early 1980s. Penguin, $14.00. You can order Hackers directly from Amazon.com. Also available in Japan, UK (Penguin), and Italy. Other books: Artificial Life Insanely Great The Unicorn's Secret and Crypto A more recent book about hackers (in the less delightful sense of the word, meaning people who crack into stuff) is Bruce Sterling's fine

32. University Computers A Prime Targets For Hackers
CNN
http://cnn.com/2001/TECH/internet/06/01/hacking.colleges.ap/index.html

33. Shlussssssss
Shlussssssss
http://counter.hackers.lv/

34. CNN.com - Sci-Tech - Hackers Tap Credit Card Info At Bibliofind - March 5, 2001
CNN
http://cnn.com/2001/TECH/internet/03/05/bibliofind/index.html
MAIN PAGE
WORLD

U.S.

WEATHER
...
ABOUT US

CNN TV what's on
show transcripts

CNN Headline News

CNN International
...
askCNN

EDITIONS CNN.com Asia CNN.com Europe set your edition Languages Spanish Portuguese German Italian Danish Japanese Korean Arabic Time, Inc. Time.com People Fortune EW
Hackers tap credit card info at Bibliofind
By Daniel Sieberg CNN.com Technology Editor (CNN) Bibliofind, an online bookseller service, announced Monday that it has learned of a security violation that compromised the credit card information of 98,000 users. However, company spokesperson Jim Courtovich said Monday that no misuse of the data has thus far been reported. The breach was discovered during an internal investigation last week after the Bibliofind Web site was defaced in February, said Courtovich. Upon looking into the defacement, it was discovered that an individual or individuals managed to access the servers on a monthly basis between October 2000 and February 2001. MESSAGE BOARD Security on the Net Bibliofind, founded in 1996, said it has contacted the various credit card companies so they can take the necessary steps to protect cardholders. The company also said it has removed all credit card information, physical addresses and phone numbers from its servers. Courtovich said all 98,000 customers would be notified of the incident via e-mail.

35. HACKERS HOME PAGE-computer Hacking, Phreaking, Gambling Hacking, Hack, Smart Car
Most comprehensive online catalog designed for the serious computer hacker, phreaker, cracker, dss/cable tv user, gambler, spy, and electronics enthusiast.
http://www.hackershomepage.com
hackers, hacking, phreaks, phreaker, phreaking, freaking, red boxing, phrack, phracker, phracking, fracking, red box, lock picking, cracking, spying, warez, viruses, virus, virii, manuals, plans, kits, how to, how-to, DIY, do it yourself, Direct TV, Sega, Genesis, Playstation, games, espionage, bugs, counter measures, cable tv hacking, money, profit, cable tv test chips, red box, computer hacking, cable tv converter boxes, booksellers, dss, technibooks, warez, technical, satellite, videocipher, smartcard, chip, anarchy, computer, communications, cdrom, filez, files, credit cards, cracking, crypto, electronics, phreaking, cellular, telephone, decoder, descrambler, wireless, ecm, pirate, filters, esn, nam, reprogramming, programming, telecode, scanner, security, hacker, cracker, wireless, crypto, digital, communication, scam, scamming.
Welcome to The Hackers Home Page
Please turn frames on in your browser in order to view our site properly. Thank you.

36. Voices From The New Hackers Of Democracy: Beyond Horse Races And Boxing Matches
Conversations Voices from the New Hackers of Democracy Beyond Horse Races LinuxCommunity How Hackers are making democracy work. Let s simplify things a bit.
http://www.linuxjournal.com/article.php?sid=7474

37. Wired News: Congress No Haven For Hackers
Even as the world's geeks march against the Digital Millennium Copyright Act, key legislators and lobbyists are dismissing concerns about the controversial law as hyperbole. By Declan McCullagh.
http://www.wired.com/news/politics/0,1283,45522,00.html
Welcome to Wired News. Skip directly to: Search Box Section Navigation Content Search:
Wired News Animations Wired Magazine HotBot (the Web)
Congress No Haven for Hackers
By Declan McCullagh Also by this reporter Page 1 of 2 next
02:00 AM Jul. 25, 2001 PT The law that led to the arrest of Russian programmer Dmitry Sklyarov last week and an immediate outcry among programmers continues to enjoy remarkably broad support on Capitol Hill. No bill has yet been introduced in Congress to amend the DMCA for one simple reason: Official Washington loves the law precisely as much as hackers and programmers despise it. Wireless Hot Spot Directory Search for Wi-Fi hot spots near you:
Story Tools
See also
Today's Top 5 Stories
Breaking News
Tech Jobs Partner Today's the Day "The law is performing the way we hoped," said

38. SSHG - Il Primo Portale Italiano Sulla Sicurezza
Raccoglie articoli, link, programmi e script utili per aumentare la sicurezza dei propri sistemi e conoscere le tecniche impiegate dagli hacker,
http://www.babulon.bbk.org/index.shtml
Venerdì Giugno 04, 2004 Tutte le sezioni Sicurezza Video Games Tutte le parole Ogni parola Cerca Nelle Directory: Cerca: Computers
Prove
Trucchi
Internet
...
Aggiungi URL
Sviluppato interamente con RedHat Linux.
Scarica i tuoi APPUNTI LINUX Cerca nei siti esterni
WebMaster

39. HackersCatalog.com - Hacking Homepage!
Learn from the best Hackers how to access email accounts, servers, networks andmore. From beginning to end the Password Hacking CookBook 04 Has it all.
http://www.hackerscatalog.com/

40. CNN.com - Ties Tighten Between Hackers And The Law? - July 16, 2001
CNN
http://cnn.com/2001/TECH/internet/07/16/black.hat.conference.idg/index.html
MAIN PAGE
WORLD

U.S.

WEATHER
...
ABOUT US

CNN TV what's on
show transcripts

CNN Headline News

CNN International
...
askCNN

EDITIONS CNN.com Asia CNN.com Europe set your edition Languages Time, Inc. Time.com People Fortune EW
Ties tighten between hackers and the law?
From... By Deborah Radcliff (IDG) Hackers, computer security managers and law enforcement officials teamed up at last week's Black Hat Briefings conference to discuss their respective roles in securing the Internet and to urge attendees who engage in hacking activities to stay on the right side of the law. IDG.net INFOCENTER Related IDG.net Stories Features Visit an IDG site Choose a site: IDG.net CIO Computerworld Darwin Dummies.com GamePro.com The Industry Standard ITWorld.com InfoWorld.com JavaWorld LinuxWorld Macworld Online Network World Fusion PC World Publish.com

A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

Page 2     21-40 of 195    Back | 1  | 2  | 3  | 4  | 5  | 6  | 7  | 8  | 9  | 10  | Next 20

free hit counter