Geometry.Net - the online learning center
Home  - Book_Author - Hackers The
e99.com Bookstore
  
Images 
Newsgroups
Page 8     141-160 of 195    Back | 1  | 2  | 3  | 4  | 5  | 6  | 7  | 8  | 9  | 10  | Next 20
A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

         Hackers The:     more books (99)
  1. Quark #1 (A Quarterly of Speculative Fiction)

141. Linux Security - The Community's Center For Security
News Network Security, 5/14/2004 1152. Voice Over IP Can Be Vulnerable To Hackers,Too. Published By InformationWeek Posted By David Isecke 5/14/2004 1152.
http://www.linuxsecurity.com/articles/network_security_article-9303.html
Features: Linux and National Security
Guardian Digital Security Solutions Win Out At Real World Linux

Newsletter: Linux Advisory Watch
Newsletter: Linux Security Week
Download EnGarde Today!

Documentation
Security Sources ... Hacks/Cracks News: Network Security Voice Over IP Can Be Vulnerable To Hackers, Too Published By: InformationWeek
Posted By: David Isecke
SPONSOR: Guardian Digital
Secure Mail Suite: Real-time virus protection, real-time results.
As voice over IP sweeps across the high-tech landscape, many IT managers are being lulled into a dangerous complacency because they look upon Internet phoning as a relatively secure technologynot as an IP service susceptible to the same worms, viruses, and other pestilence that threatens all networked systems. "With VoIP," security specialist Mark Nagiel said Thursday in an interview, "we're inserting a new technology into an unsecured and unprotected environment. VoIP is essentially availability driven, not security driven, and that's the problem." But Nagiel, manager of security consulting at NEC Unified Solutions, said that there are measures that can be taken to protect voice over IP from the threats that confront Web telephoning. The first stepan obvious one, he saysis to secure existing TCP/IP networks. Nagiel is finding that the new government-required regulationssuch as Sarbanes-Oxley, which stipulates improved accounting record-keeping, and HIPAA in health careare helping IT managers because they impose security discipline across-the-board. "The financial and health-care fields are getting secured very quickly," Nagiel said.

142. 't Klaphek
Deze opvolger van Hacktic is een blad voor Nederlands Hackers en phreakers, hoewel er al een tijd geen nieuwe editie is uitgebracht. Daarnaast is er op de site een aantal programma's te vinden.
http://www.klaphek.nl/
klaphek has moved... we are now at the new server: http://www.klaphek.net/
click here for the old site: http://www.klaphek.nl/index2.html

143. Rootsecure.net | Definition | Hacker
Rootsecure . net. The Security News Site For Systems Administrators Hackers, Monday, 17th May 2004 @ 032923 GMT.
http://www.rootsecure.net/?p=definition_hacker

144. CNN In-Depth Specials - Hackers - Q&A With Emmanuel Goldstein Of 2600
CNN
http://www.cnn.com/TECH/specials/hackers/qandas/goldstein.html
MAIN PAGE WORLD ASIANOW U.S. ... news quiz
CNN WEB SITES: TIME INC. SITES: Go To ... Time.com People Money Fortune EW MORE SERVICES: video on demand video archive audio on demand news email services ...
pagenet

DISCUSSION: message boards chat feedback
SITE GUIDES: help contents search
FASTER ACCESS: europe japan
WEB SERVICES:
Main Page
Bracing for Cyberwar Hacking Primer Scenes from the 'Hacker Underground' ... Related Sites
(CNN) Emmanuel Goldstein is the editor-in-chief of 2600: The Hacker Quarterly and hosts a weekly radio program in New York called "Off the Hook."
1. How do you define hacking?
Hacking is, very simply, asking a lot of questions and refusing to stop asking. This is why computers are perfect for inquisitive people they don't tell you to shut up when you keep asking questions or inputting commands over and over and over. But hacking doesn't have to confine itself to computers. Anyone with an inquisitive mind, a sense of adventure and strong beliefs in free speech and the right to know most definitely has a bit of the hacker spirit in them.
2. Are there legal or appropriate forms of hacking?

145. Clockwork Orange - Hackers Of The World Unite
Hackers of the World Unite Link Central. Return to Hackers of the World Unite.
http://wso.williams.edu/~mhacker/clockwork.html
Alex, (played by Malcolm McDowell) the narrator of A Clockwork Orange, is the dictatorial leader of a quartet of droogs, a vicious group of young hoodlums who spend their nights stealing, fighting, breaking into houses, killing and raping. Alex, however, is not just some uncivilized ruffian. He absolutely cherishes the music of Ludwig von Beethoven and in particular his 9th Symphony. As the film begins, the Alex and his droogs are preparing to go on one of their nightly rampages through the streets of the city.
Alex’s droogs revolt against his dictatorial control and ultimately they plot to betray him. On one nightly rampage, Alex's droogs smash him over the head with a glass bottle leaving him to be caught, in the home of one of their victims, by the police.
Alex is arrested, convicted and thrown in prison.
However, Alex’s incarceration does not last long as he is chosen for a controversial rehabilitation treatment, designed to curb violence and sexual behavior, enabling a prisoner to leave prison after only two weeks. Doctors administer Alex a drug that simulates a death-like nausea while he is strait-jacketed and physically forced (with his eyelids clamped open) to watch films depicting scenes of violence, thereby associating the violence with the feeling of death. An unfortunate consequence of the treatment is that the scenes were set to the music of Beethoven, eliciting a similar association between death and Beethoven's music. Following his treatments, Alex is paraded in front of a room of political leaders where he is forced to endure a variety of humiliations. When Alex attempts to act violently according to his instincts, he is overcome with the death sickness and he is forced to give up.

146. Omaha 2600
Offers local meeting schedule and venue announcements and Hackers guide.
http://omaha2600.org/

147. Hackers Of The World Unite - Download Central - Television And Movie Theme Songs
Explorer However you can download all of the same material by clickinghere to enter Download Central at Hackers of the World Unite.
http://wso.williams.edu/~mhacker/index3.html
However you can download all of the same material by clicking here to enter Download Central at Hackers of the World Unite

148. CNN.com - Sci-Tech - Brazilian Hackers Target Microsoft Sites - May 7, 2001
CNN
http://cnn.com/2001/TECH/internet/05/07/brazilian.hacks.idg/index.html
MAIN PAGE
WORLD

U.S.

WEATHER
...
ABOUT US

CNN TV what's on
show transcripts

CNN Headline News

CNN International
...
askCNN

EDITIONS CNN.com Asia CNN.com Europe set your edition Languages Spanish Portuguese German Italian Danish Japanese Korean Arabic Time, Inc. Time.com People Fortune EW
Brazilian hackers target Microsoft sites
From... By James Evans (IDG) A Brazilian band of hackers known as Prime Suspectz defaced four Microsoft Corp. Web sites last week, according to Attrition.org, a Web site that documents hacks. The hackers defaced the MSNBC Sports Scoreboard site and evidence of the hack was still apparent as of Friday morning, according to a mirror image of the site defacement. Prime Suspectz slapped a picture of a nuclear explosion, tagged the image with the Prime Suspectz logo and offered a caption that partially read in Portuguese: "Prepare yourself for the Prime Suspectz marathon." MESSAGE BOARD Security on the Net IDG.net INFOCENTER Features Visit an IDG site Choose a site: IDG.net

149. HACK HiSPANO - Seguridad Informática Y Nuevas Tecnologías
Textos y utilidades para Hackers.
http://www.hackhispano.com/
Portal de seguridad informatica y nuevas tecnologias con toda la informacion que necesitas sobre hacking, linux, warez, prehack, virus y news. hack, hacking, hackers, hacker, crack, cracks, news, warez, ftp, linux, phreaking

150. HACKERS HOME PAGE-computer Hacking, Phone Phreaking, Red Boxing, Gambling Hackin
EMail your comments, questions, or suggestions to us. Enter The HackersHome Page. ©Copyright Hackers Home Page 1997-2004 all rights reserved.
http://www.hackershomepage.com/index_old.html
We have several NEW UNADVERTISED products that some of our customers refer to as "THE GOOD STUFF".
For details please e-mail us or call (407)650-2830.
And if you still don't see what you want, then call us at (407)650-2830
"THEY MAKE IT, WE BREAK IT".
Now in our 8th Year!
Get notified regarding new product releases and price breaks
HTML Text LAST UPDATE TO SITE: 04/04/2004 WEBMASTER'S NOTE (Please Read):
We WILL NOT answer emails from anyone asking about illegal activities, or how to use our products for illegal activities...they will automatically be deleted. All products are designed for testing and exploring the vulnerabilities of CUSTOMER-OWNED equipment, and no illegal use is encouraged or implied. We WILL NOT knowingly sell to anyone with the intent of using our products for illegal activities or uses. It is your responsibility to check the applicable laws in your city, state, and country.
At this time we DO NOT have any distributor relationships set up with any company or Web site. Consequently, beware of sites that: 1) claim to be distributors of our products, 2) use our name and logo without permission, 3) download and use our HTML files without permission. The bottom line is: Know who you're dealing with before you send payment.
Web site brought to you by: M. Smith

151. CNN.com - Technology - Keeping Hackers At Bay - March 3, 2000
CNN
http://www.cnn.com/2000/TECH/computing/03/03/hot.firewall.idg/index.html
technology > computing Editions myCNN ... Feedback
CNN Sites CNN CNN Europe CNNfn CNNSI myCNN CNNfyi AllPolitics Languages
Search
CNN.com CNNSI.com CNNfn.com The Web
TECHNOLOGY

TOP STORIES
Consumer group: Online privacy protections fall short

Guide to a wired Super Bowl

Debate opens on making e-commerce law consistent

MORE

TOP STORIES More than 11,000 killed in India quake Mideast negotiators want to continue talks after Israeli elections MORE BUSINESS ... MORE MARKETS 4:30pm ET, 4/16 DJIA NAS SPORTS Jordan says farewell for the third time ... LOCAL EDITIONS: CNN.com Europe change default edition MULTIMEDIA: video video archive audio multimedia showcase ... more services E-MAIL: Subscribe to one of our news e-mail lists Enter your address: DISCUSSION: chat feedback CNN WEB SITES: CNNfyi.com CNN.com Europe AsiaNow Spanish ... Korean Headlines TIME INC. SITES: Go To ... Time.com People Money Fortune EW CNN NETWORKS: CNN anchors transcripts Turner distribution SITE INFO: help contents search ad info ... jobs WEB SERVICES:
Keeping hackers at bay
From... March 3, 2000 Web posted at: 12:57 p.m. EST (1757 GMT) by Tim Greene (IDG) NetWolves last week announced a network firewall appliance that has more features than a Swiss Army knife.

152. HACKERS HOME PAGE-computer Hacking, Phone Phreaking, Emp, Red Boxing, Gambling H
Site Menu. Hackers Home Page About This Site. Our Catalog Catalog Main Menu 1.Telephone Devices 3. Lock Picking 4. Gambling Devices 5. Television Devices 6
http://www.hackershomepage.com/options.htm
Site Menu
Hackers Home Page

About This Site

Our Catalog
Catalog Main Menu

Telephone Devices
Lock Picking

Gambling Devices
...
Interesting Products

What's New?
New Products!
Ordering Information Calculate Your Order! Order calculation form for Internet Explorer. _Got any bright ideas? H/P/V/C/A Links ... E-Mail Us.

153. CNN.com - Technology - Denial Of Service Hackers Take On New Targets - February
CNN
http://www.cnn.com/2000/TECH/computing/02/09/denial.of.service/index.html
technology > computing Editions myCNN ... Feedback
CNN Sites CNN CNN Europe CNNfn CNNSI myCNN CNNfyi AllPolitics Languages
Search
CNN.com CNNSI.com CNNfn.com The Web
TECHNOLOGY

TOP STORIES
Consumer group: Online privacy protections fall short

Guide to a wired Super Bowl

Debate opens on making e-commerce law consistent

MORE

TOP STORIES More than 11,000 killed in India quake Mideast negotiators want to continue talks after Israeli elections MORE BUSINESS ... MORE MARKETS 4:30pm ET, 4/16 DJIA NAS SPORTS Jordan says farewell for the third time ... LOCAL EDITIONS: CNN.com Europe change default edition MULTIMEDIA: video video archive audio multimedia showcase ... more services E-MAIL: Subscribe to one of our news e-mail lists Enter your address: DISCUSSION: chat feedback CNN WEB SITES: CNNfyi.com CNN.com Europe AsiaNow Spanish ... Korean Headlines TIME INC. SITES: Go To ... Time.com People Money Fortune EW CNN NETWORKS: CNN anchors transcripts Turner distribution SITE INFO: help contents search ad info ... jobs WEB SERVICES:
Denial of service hackers take on new targets
By D. Ian Hopper CNN Interactive Technology Editor February 9, 2000

154. Globetechnology
Arrests key win for NSA Hackers. By DAVID AKIN Globe and Mail Update,
http://www.globetechnology.com/servlet/story/RTGAM.20040406.gtterror06/BNStory/T
@import url('/cssv3/net5upcss.css'); News Investing Technology Vehicles ... Investor Search Site Search Tips showTextAd("USERNAME"); Subscribe to Globe Breaking News Tech Home
e-insider

Reviews

Resources Encyclopedia
Tech Alert

Tech Books

Tech Events
...
Special Reports

Today's Paper Technology News
Tech Investor

In The News Biotechnology Companies Gaming Hardware ... Wireless CCNMathews Search Newswire Recent Releases Biotechnology Computers Software ... Telecom Advertising Info Advertise with The Globe: Newspaper, Web, and Magazine Services Newspaper Corrections Customer Care Reprints Subscriptions ... Recognition Card Web site Canada 411 E-mail Newsletters Free Headlines Register Now! ... Yellow Pages BREAKING NEWS POSTED AT 8:03 AM EDT Tuesday, Apr 6, 2004 Investor Arrests key win for NSA hackers By DAVID AKIN Globe and Mail Update E-mail this Article Print this Article Advertisement var szone="technology-hub"; var smode="bn"; var sloc="lower"; var sURL_hub="Technology"; var sarena="arena=Technology;arena=Front;"; a3=true;aW=120;aH=600;sBoxAd=true;

155. CNN - Kosovo Cyber-war Intensifies: Chinese Hackers Targeting U.S. Sites, Govern
CNN
http://www.cnn.com/TECH/computing/9905/12/cyberwar.idg/index.html

MAIN PAGE
WORLD ASIANOW U.S. ... news quiz
CNN WEB SITES: TIME INC. SITES: Go To ... Time.com People Money Fortune EW MORE SERVICES: video on demand video archive audio on demand news email services ...
pagenet

DISCUSSION: message boards chat feedback
SITE GUIDES: help contents search
FASTER ACCESS: europe japan
WEB SERVICES:
Main Page
Bracing for Cyberwar Hacking Primer Scenes from the 'Hacker Underground' ... Related Sites
Kosovo cyber-war intensifies: Chinese hackers targeting U.S. sites, government says
May 12, 1999

Web posted at: 2:01 p.m. EDT (1801 GMT)
by Ellen Messmer From...
ALSO: Insurgency on the Internet Sign up for the Computer Connection email service For more computing stories (IDG) The war in Kosovo has intensified as hackers on either side of the conflict try to take over or block Web servers around the world. The federal government said today that Chinese hackers have joined the online war, targeting U.S. government sites over the accidental bombing of the Chinese embassy in Belgrade last Friday. Web sites at the departments of Energy and the Interior and the National Park Service were hijacked on Sunday by intruders claiming to be from mainland China. The Department of Energy (DOE) has sent an alert to other federal agencies and defense contractor warning them of possible mailbombing attacks from China. Meanwhile, the White House shut down www.whitehouse.gov for three days because of security concerns stemming from a non-stop denial-of-service attack. The site only came back up this morning.

156. Hackers, Heroes Of Computer Revolution

http://cooler.irk.ru/hackers/

157. CNN.com - Technology - Insulate Your PC From Hackers - August 10, 2000
CNN
http://www.cnn.com/2000/TECH/computing/08/10/diy.hacker.proofing.idg/index.html
technology > computing Editions myCNN ... Feedback
CNN Sites CNN CNN Europe CNNfn CNNSI myCNN CNNfyi AllPolitics Languages
Search
CNN.com CNNSI.com CNNfn.com The Web
TECHNOLOGY

TOP STORIES
Consumer group: Online privacy protections fall short

Guide to a wired Super Bowl

Debate opens on making e-commerce law consistent

MORE

TOP STORIES More than 11,000 killed in India quake Mideast negotiators want to continue talks after Israeli elections MORE BUSINESS ... MORE MARKETS 4:30pm ET, 4/16 DJIA NAS SPORTS Jordan says farewell for the third time ... LOCAL EDITIONS: CNN.com Europe change default edition MULTIMEDIA: video video archive audio multimedia showcase ... more services E-MAIL: Subscribe to one of our news e-mail lists Enter your address: DISCUSSION: chat feedback CNN WEB SITES: CNNfyi.com CNN.com Europe AsiaNow Spanish ... Korean Headlines TIME INC. SITES: Go To ... Time.com People Money Fortune EW CNN NETWORKS: CNN anchors transcripts Turner distribution SITE INFO: help contents search ad info ... jobs WEB SERVICES:
Insulate your PC from hackers
From... by Jeff Sengstack (IDG) It was getting late, so Jim Jarrard, president of Cinenet, a stock film footage company in Simi Valley, California, decided to leave his computer on overnight to finish downloading a big file. While Jarrard was gone, a hacker accessed his PC over its DSL Internet connection and loaded a program giving the intruder power to commandeer Jarrard's computer, steal valuable film files, and erase the system's hard drives. Allan Soifer, an Ottawa, Ontario, electronic mailing list administrator, didn't realize a distant hacker had been scanning his home PC for hours. The hacker had found a way in and needed only a password to access Soifer's files. So he pelted the machine with computer-generated words, hoping for a lucky match. Fortunately, neither of the hackers got the goods.

158. Cyberpunks And Hackers
Cyberpunks and Hackers. Cyberpunks. Being a cyberpunk is a lifestyle.Cyberpunks culture. Hackers. “Hackers” come in many flavors days.
http://www.accessorl.net/~cyberwar/cybpunk.htm
Cyberpunks and Hackers
Cyberpunks
Being a cyberpunk is a lifestyle. Cyberpunks are hackers, crackers, and phreakers. Just being a webhead or computer geek is not enough. To really qualify you must be able to not only make computers do what you want, but make them do it when they were told to do something else ie: hacking and cracking. The big difference between a Cyberpunk and a computer geek is in attitude! The cyberpunks are at the core of this thing we call the net. Cyberpunks spend way to much time at their computers. Remember the net has around for a long time, the only thing that has changed is that there are now a lot more people using it. The first use of "cyberpunk" to describe a type of literature is credited to Gardner Dozois, who was the editor of Isaac Asimov's Science Fiction Magazine in the the early '80s. He got it from the title of a short story by Bruce Bethke, "Cyberpunk". The author William Gibson problably the most widely known cyberpunk author. He wrote the trilogy Neuromancer, Count Zero, and Mona Lisa Overdrive
His world is set in the near future describing a rather dark world where corporations rule the world, and information is power. This world is populated with cyberjocks, super hackers who run the web of the future to steal information. His latest work is

159. CNN.com - Sci-Tech - Hackers Deface EC Web Site In 2nd Incident - June 14, 2001
CNN
http://cnn.com/2001/TECH/internet/06/14/ec.site.hack.idg/index.html
MAIN PAGE
WORLD

U.S.

WEATHER
...
ABOUT US

CNN TV what's on
show transcripts

CNN Headline News

CNN International
...
askCNN

EDITIONS CNN.com Asia CNN.com Europe set your edition Languages Time, Inc. Time.com People Fortune EW
Hackers deface EC Web site in 2nd incident
From... By Joris Evers AMSTERDAM, The Netherlands (IDG) Dutch hackers on Tuesday defaced the Safer Internet Exchange, a Web site sponsored by the European Commission that promotes a safer Internet. Security at the site had been increased last week after other hackers raised a red flag about possible vulnerabilities. The cybervandals left a message taunting the server administrators and law enforcement and inserted two hyperlinks, one to a Web site for Hackers at Large 2001, an event to be held in the Netherlands in August, and one to a database elsewhere on SaferInternet.org. The database, which can be downloaded by following the link, contains about 475 e-mail addresses of people who subscribe to the SaferInternet.org mailing list, according to a security expert who examined the database and requested anonymity. IDG.net INFOCENTER

160. Report Says Tax Returns Were Vulnerable To Hackers
CNN
http://cnn.com/2001/TECH/internet/03/15/irs.privacy.ap/index.html

A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

Page 8     141-160 of 195    Back | 1  | 2  | 3  | 4  | 5  | 6  | 7  | 8  | 9  | 10  | Next 20

free hit counter