Geometry.Net - the online learning center
Home  - Book_Author - Hackers The
e99.com Bookstore
  
Images 
Newsgroups
Page 9     161-180 of 195    Back | 1  | 2  | 3  | 4  | 5  | 6  | 7  | 8  | 9  | 10  | Next 20
A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

         Hackers The:     more books (99)
  1. Winner-Take-All Politics: How Washington Made the Rich Richer--and Turned Its Back on the Middle Class by Paul Pierson, Jacob S. Hacker, 2010-09-14
  2. A Writer's Reference by Diana Hacker, Nancy Sommers, 2010-10-25
  3. Hackers & Painters: Big Ideas from the Computer Age by Paul Graham, 2010-05-01
  4. Hackers: Heroes of the Computer Revolution - 25th Anniversary Edition by Steven Levy, 2010-05-20
  5. Hacker's Delight by Henry S. Warren, 2002-07-27
  6. The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws by Dafydd Stuttard, Marcus Pinto, 2007-10-22
  7. Rules for Writers by Diana Hacker, 2011-07
  8. CEH Certified Ethical Hacker Study Guide by Kimberly Graves, 2010-04-26
  9. Writer's Reference 6e & MLA Quick Reference Card by Diana Hacker, Barbara Fister, 2006-11-23
  10. Higher Education?: How Colleges Are Wasting Our Money and Failing Our Kids---and What We Can Do About It by Andrew Hacker, Claudia Dreifus, 2010-08-03
  11. Pocket Style Manual: Updated With Mla's 1999 Guidelines by Diana Hacker, 1999-03
  12. Hacker & Moore's Essentials of Obstetrics and Gynecology: With STUDENT CONSULT Online Access (Essentials of Obstetrics & Gynecology (Hacker)) by Neville F. Hacker MD, Joseph C. Gambone DO, et all 2009-02-04
  13. Official Certified Ethical Hacker Review Guide by Steven DeFino, Barry Kaufman, 2009-11-09
  14. The Hacker Crackdown: Law And Disorder On The Electronic Frontier by Bruce Sterling, 1993-11-01

161. Battle For The Heart Of The Internet || Kuro5hin.org
If you're interested in helping to stop this injustice and let the Real World know that Hackers will fight for what's right, there are a number of upcoming events that need your meatspace attendance and support. Editorial and list of August 2001 events.
http://www.kuro5hin.org/?op=displaystory;sid=2001/8/5/144034/3083

162. Los 'hackers' No Superan El Concurso De Seguridad Del IGC Tras 700.000 Ataques
Hackers no superan el concurso de seguridaddel IGC tras 700.000 ataques. ELMUNDO.ES EUROPA PRESS
http://www.el-mundo.es/navegante/2004/05/14/seguridad/1084524777.html
Viernes, 14 de Mayo de 2004 Diario del Navegante Ariadna Buscar en elmundo.es Internet Navegante FTPSearch Portada Empresas E-Sociedad Seguridad ... CD/CD-R/DVD-R
OTROS MUNDOS elmundo.es elmundodinero elmundolibro elmundoviajes ... elmundotienda
PORTADA XIFRA NETWORKS
Los 'hackers' no superan el concurso de seguridad del IGC tras 700.000 ataques
BARCELONA.- Los 'hackers' no consiguieron burlar el concurso de seguridad en Internet convocado en el marco del Internet Global Congress (IGC) que se celebra en Barcelona, tras realizar casi 700.000 ataques desde el pasado martes.
La prueba retaba a los internautas a atacar una página 'web' para ganar el premio de 6.000 euros que la compañía catalana de 'software' Xifra Networks había anunciado que ofrecería si los informáticos conseguían burlar el sitio protegido por su nuevo cortafuegos 'XN-3000'. Xifra Networks, especializada en la protección de sistemas informáticos, desafió a los internautas a leer un fichero protegido por su nuevo cortafuegos, pero ninguno logró acceder al contenido del archivo. Según explicó el director de la compañía catalana

163. CNN.com - Decoy PCs Give Hackers A Security Lesson - July 17, 2001
CNN
http://cnn.com/2001/TECH/internet/07/17/honeynet.project.idg/index.html
MAIN PAGE
WORLD

U.S.

WEATHER
...
ABOUT US

CNN TV what's on
show transcripts

CNN Headline News

CNN International
...
askCNN

EDITIONS CNN.com Asia CNN.com Europe set your edition Languages Time, Inc. Time.com People Fortune EW
Decoy PCs give hackers a security lesson
From... By Andrew Brandt (IDG) For the best security, hack the hackers, suggest security experts who have spent several months watching malicious intruders break into disguised decoy systems on the Internet. The informal study found it was only two to four days before hackers attacked an unprotected Windows 98 system with its file sharing enabled. Hackers attacked one such system four times in a five-day period. The fastest takeover was 15 minutes, when a hacker broke into a PC running Red Hat Linux 6.2. An ongoing organization may form out of this informal research, known as the Honeynet Project. Security researchers created a network of PCs they dubbed honeypots, named for the attractive but troublesome favorite treat of children's book character Winnie the Pooh. In this case, the group placed PCs on the Internet in various states of security and designed to attract hackers, says Lance Spitzner, who described the experiment at the final day of the annual Black Hat Briefings security conference here last week. Some of the computers ran with the default installations of their operating systems, while team members patched others with the latest security fixes. Then they placed the PCs on the Internet in such a way that Honeynet Project members could closely observe the systems without being noticed by hackers. They recorded the exact methods hackers used to break into those and other systems, and even recorded the text conversations of a notorious group of Web page defacement hackers known as GForce Pakistan.

164. Hackers And Painters
? Hackers and Painters-. Paul Graham, May 2003Copyright 2003 by Paul Graham. Paul GrahamHackers
http://www.shiro.dreamhost.com/scheme/trans/hp-j.html
¥Ï¥¥«¡¼¤È²è²È -Hackers and Painters-
Paul Graham, May 2003
¤³¤ì¤Ï¡¢Paul Graham¡§ Hackers and Painters
¸¶Ê¸: http://www.paulgraham.com/hp.html
Shiro Kawai
(shiro ¡÷ acm.org)
»ä¤Ï¡Ö·×»»µ¡²Ê³Ø¡×¤È¤¤¤¦ÍѸ줬¤É¤¦¤Ë¤â¹¥¤­¤Ë¤Ê¤ì¤Ê¤¤¡£ ¤¤¤Á¤Ð¤óÂ礭¤ÊÍýͳ¤Ï¡¢¤½¤â¤½¤â¤½¤ó¤Ê¤â¤Î¤Ï¸ºß¤·¤Ê¤¤¤«¤é¤À¡£ ·×»»µ¡²Ê³Ø¤È¤Ï¡¢¤Û¤È¤ó¤É´ØÏ¢¤Î¤Ê¤¤Ê¬ÌÎò»ËŪ¤Ê¶öÁ³¤«¤é ¤¤¤¤·¤ç¤¯¤¿¤ËÂÞ¤ËÊü¤ê¹þ¤Þ¤ì¤¿¤â¤Î¤Ç¡¢¸À¤¤Æ¤ß¤ì¤Ð¥æ¡¼¥´¥¹¥é¥Ó¥¢¤ß¤¿¤¤¤Ê¤â¤Î¤À¡£ °ìÊý¤Î¼¤Ç¤Ï¡¢¤Û¤ó¤È¤¦¤Ï¿ô³Ø¼Ô¤Ç¤¢¤ë¿Í¡¹¤¬¡¢DARPA¤Î¸¦µæÈñ¤òÆÀ¤ë¤¿¤á¤Ë ·×»»µ¡²Ê³Ø¤ò̾¾è¤¤Æ¤¤¤ë¡£ ¿¿¤ó椢¤¿¤ê¤Ç¤Ï¡¢¥³¥ó¥Ô¥å¡¼¥¿¤ÎÇîʪ³Ø¤ß¤¿¤¤¤Ê¤³¤È¤ò¤ä¤¤Æ¤¤¤ë¿Í¡¹¤¬¤¤¤ë¡£ ¥Í¥¥È¥ï¡¼¥¯¤Î¥ë¡¼¥Æ¥£¥ó¥°¥¢¥ë¥´¥ê¥º¥à¤Î¿¶Éñ¤¤¤òÄ´¤Ù¤¿¤ê¤È¤«¡¢¤½¤¦¤¤¤¦¤³¤È¤À¡£ ¤½¤·¤Æ¡¢È¿ÂЦ¤Î¼¤¤³¤Ë¤Ï¡¢¥Ï¥¥«¡¼£¤¬¤¤¤ë¡£ ÌÌÇò¤¤¥½¥Õ¥È¤ò½ñ¤³¤¦¤È¤·¤Æ¤¤¤ë¼Ô£¤À¡£Èà¤é¤Ë¤È¤¤Æ¤Ï¡¢ ¥³¥ó¥Ô¥å¡¼¥¿¤Ï±¤Ê¤ëɽ¸½¤ÎÇÞÂΤˤ¹¤®¤Ê¤¤¡£ ·ú۲ȤˤȤ¤Æ¤Î¥³¥ó¥¯¥ê¡¼¥È¤¬¡¢¤Þ¤¿²è²È¤Ë¤È¤¤Æ¤Î³¨¤Î¶ñ¤¬¤½¤¦¤Ç¤¢¤ë¤è¤¦¤Ë¡£ ¤³¤ì¤Ï¤Þ¤ë¤Ç¡¢¿ô³Ø¼Ô¤ÈʪÍý³Ø¼Ô¤È·ú۲Ȥò¤Ò¤È¤Ä¤Î³Ø²Ê¤Ë²¡¤·¹þ¤á¤Æ¤¤¤ë¤ß¤¿¤¤¤À¡£ »ÄÇ°¤Ê¤³¤È¤Ë¡¢Èþ¤·¤¤¤â¤Î¤ÏÏÀʸ¤Ë¤Ê¤ê¤ä¤¹¤¤¤È¤Ï¸Â¤é¤Ê¤¤¡£ Âè°ì¤Ë¡¢¸¦µæ¤ÏÆÈÁÏŪ¤Ç¤Ê¤±¤ì¤Ð¤Ê¤é¤Ê¤¤- ¤½¤·¤Æ¡¢Çî»ÎÏÀʸ¤ò½ñ¤¤¤¿·Ð¸³¤Î¤¢¤ë¿Í¤Ê¤é¯¤â¤¬Î¤¤Æ¤¤¤ë¤è¤¦¤Ë¡¢ ¤¢¤Ê¤¿¤¬½è½÷Ϥò³«Â󤷤Ƥ¤¤ë¤³¤È¤òÊݾڤ¹¤ë°ìÈÖÎɤ¤ÊýË¡¤Ï¡¢ ¯¤â¤ä¤ê¤¿¤¬¤é¤Ê¤¤¤è¤¦¤Ê¾ì½ê¤Ø¸þ¤«¤¦¤³¤È¤À¡£ ÂèÆó¤Ë¡¢¸¦µæ¤Ë¤Ï¤¿¤¤×¤ê¤È¤·¤¿Î̤¬¤Ê¤±¤ì¤Ð¤Ê¤é¤Ê¤¤- ¤½¤·¤Æ¡¢Ì¯¤Á¤­¤ê¤ó¤Ê¥·¥¹¥Æ¥à¤Ç¤¢¤ë¤Û¤É¡¢¤¿¤¯¤µ¤ó¤ÎÏÀʸ¤¬½ñ¤±¤ë¡£ ¤½¤¤¤Ä¤òÆ°¤«¤¹¤¿¤á¤Ë¾è¤ê±Û¤¨¤Ê¤±¤ì¤Ð¤Ê¤é¤Ê¤«¤¤¿¤¤¤í¤ó¤Ê¾ã³²¤Ë ¤Ä¤¤¤Æ½ñ¤±¤ë¤«¤é¤Í¡£ ÏÀʸ¤Î¿ô¤òÁý¤ä¤¹ºÇÎɤÎÊýË¡¤Ï¡¢´Ö°ã¤¤¿²¾Ä꤫¤é½Ðȯ¤¹¤ë¤³¤È¤À¡£ AI¸¦µæ¤Î¿¤¯¤Ï¤³¤Îµ¬Â§¤ÎÎɤ¤Îã¤À¡£ 챤¬¡¢ê¾Ý³µÇ°¤ò°ú¿ô¤Ë¼è¤ë½Ò¸ìÏÀÍý¼°¤Î¥ê¥¹¥È¤Çɽ¸½¤Ç¤­¤ë¡¢ ¤È²¾Äꤷ¤Æ»Ï¤á¤ì¤Ð¡¢¤½¤ì¤òÆ°¤«¤¹¤¿¤á¤Ë¤¿¤¯¤µ¤ó¤ÎÏÀʸ¤ò½ñ¤¯¤³¤È¤Ë¤Ê¤ë¤À¤í¤¦¡£ ¥ê¥¥­¡¼¡¦¥ê¥«¥ë¥É¤¬¸À¤¤¿¤è¤¦¤Ë¡¢ ¡Ö¥ë¡¼¥·¡¼¡¢·¯¤Ï¤¿¤¯¤µ¤óÀâÌÀ¤¹¤ë¤³¤È¤¬¤¢¤ë¤Í¡×¤¤Æ¤Ê¤ï¤±¤À¡£

165. CNN.com - Technology - Hackers Hit U.S., U.K., Australian Government Sites - Jan
CNN
http://cnn.com/2001/TECH/computing/01/22/government.hackers.idg/index.html
technology > computing Editions myCNN ... Feedback
CNN Sites CNN CNN Europe CNNfn CNNSI myCNN CNNfyi AllPolitics Languages
Search
CNN.com CNNSI.com CNNfn.com The Web
TECHNOLOGY

TOP STORIES
Consumer group: Online privacy protections fall short

Guide to a wired Super Bowl

Debate opens on making e-commerce law consistent

MORE

TOP STORIES More than 11,000 killed in India quake Mideast negotiators want to continue talks after Israeli elections MORE BUSINESS ... MORE MARKETS 4:30pm ET, 4/16 DJIA NAS SPORTS Jordan says farewell for the third time ... LOCAL EDITIONS: CNN.com Europe change default edition MULTIMEDIA: video video archive audio multimedia showcase ... more services E-MAIL: Subscribe to one of our news e-mail lists Enter your address: DISCUSSION: chat feedback CNN WEB SITES: CNNfyi.com CNN.com Europe AsiaNow Spanish ... Korean Headlines TIME INC. SITES: Go To ... Time.com People Money Fortune EW CNN NETWORKS: CNN anchors transcripts Turner distribution SITE INFO: help contents search ad info ... jobs WEB SERVICES:
Hackers hit U.S., U.K., Australian government sites
From... by David Legard (IDG) A group of hackers has attacked government sites in the United States, United Kingdom, and Australia over the weekend, according to Attrition.org, a Web site that monitors hacking attacks.

166. CNN.com - Instant-messaging Tool For Hackers Poses A Threat - November 26, 2001
CNN
http://cnn.com/2001/TECH/internet/11/26/instant.hacker.tool.idg/index.html
MAIN PAGE
WORLD

U.S.

WEATHER
...
ABOUT US/HELP

CNN TV what's on
show transcripts

CNN Headline News

CNN International
...
askCNN

EDITIONS CNN.com Asia CNN.com Europe CNNenEspanol.com CNNArabic.com ... set your edition Languages Spanish Portuguese German Italian Korean Arabic Japanese Time, Inc. Time.com People Fortune EW InStyle Business 2.0
Instant-messaging tool for hackers poses a threat
From... By Laura Rohde (IDG) A new hacking tool using the instant messaging platform Internet Relay Chat (IRC) is rapidly spreading across the Internet and has the potential to shut down Web servers. Called "Voyager Alpha Force," the tool has already been used to infect about 300 computers, according to various reports, but its biggest threat lies in its ability to be used in distributed denial-of-service attacks, according to security experts. IDG.net INFOCENTER Related IDG.net Stories Features

167. Hacking And Hackers - Computer Security Programs Downloading Search Engines Port
exploits,fixes,bugs,crack,crack search,astalavista crack search,crack search engine,computerhacking,hacking tools,hack program,Hackers,hacking downloads
http://www.infosyssec.org/infosyssec/
security security news virus news hacking news hacker trojan underground headlines newsticker security news antivirus exploit denial of service DDoS advisories trojan backdoor sniffer smurfwindows securityXP security security products security books security tips security faq authentication computer security crack crackers crash cryptography denial of service DOS email virus alerts encrypting file system encryption exploits firewall firewalls hack hacks hack files hack links hacked webpages hacker hackers hacking hacking files hacking links hot fixes icmp intruder intrusion detection news ip spoof Kerberos key logger logon microsoft security NT nt security nt server ntsecurity ntshop password password crackers patches permssions phreaking boxes port monitors proxy proxy servers secure security security news security firewalls cryptography vulnerabilities vulnerability news encrypting file system hotfixes authentication password permissions proxy servers antivirus virus system policies smart cards smart cards source route spoofing syn flood system policies texts virii virus viruses vulnerabilities vulnerability wardialers win2k sec win2k security win2k sec windows 2000 security windows 2000 windows windows NT windows nt security

168. CNN.com - Technology - How Hackers Do It: Penetration Testing - June 28, 2000
CNN
http://www.cnn.com/2000/TECH/computing/06/28/penetration.testing.idg/index.html
technology > computing Editions myCNN ... Feedback
CNN Sites CNN CNN Europe CNNfn CNNSI myCNN CNNfyi AllPolitics Languages
Search
CNN.com CNNSI.com CNNfn.com The Web
TECHNOLOGY

TOP STORIES
Consumer group: Online privacy protections fall short

Guide to a wired Super Bowl

Debate opens on making e-commerce law consistent

MORE

TOP STORIES More than 11,000 killed in India quake Mideast negotiators want to continue talks after Israeli elections MORE BUSINESS ... MORE MARKETS 4:30pm ET, 4/16 DJIA NAS SPORTS Jordan says farewell for the third time ... LOCAL EDITIONS: CNN.com Europe change default edition MULTIMEDIA: video video archive audio multimedia showcase ... more services E-MAIL: Subscribe to one of our news e-mail lists Enter your address: DISCUSSION: chat feedback CNN WEB SITES: CNNfyi.com CNN.com Europe AsiaNow Spanish ... Korean Headlines TIME INC. SITES: Go To ... Time.com People Money Fortune EW CNN NETWORKS: CNN anchors transcripts Turner distribution SITE INFO: help contents search ad info ... jobs WEB SERVICES: Main Page Bracing for Cyberwar Hacking Primer Scenes from the 'Hacker Underground' ... Related Sites
How hackers do it: Penetration testing
From...

169. Techweb > News > VoIP Can Be Vulnerable To Hackers, Too > VoIP Can Be Vulnerable
VoIP Can Be Vulnerable To Hackers, Too May 13, 2004 (1057 am EST) By W. David Gardner,TechWeb News As VoIP sweeps across the hightechnology landscape, many
http://www.techweb.com/wire/story/TWB20040513S0001

Application Integration
IT Training Power Protection Storage Networking Choose One .... TW (All Sites) InformationWeek InternetWeek Network Computing CommWeb Storage Pipeline Security Pipeline Mobile Pipeline Networking Pipeline Server Pipeline Linux Pipeline Optimize Government Enterprise The Open Enterprise Financial Technology advanced VoIP Can Be Vulnerable To Hackers, Too
May 13, 2004 (10:57 a.m. EST)
By W. David Gardner, TechWeb News
As VoIP sweeps across the high-technology landscape, many IT managers are lulled into a dangerous complacency because they look upon Internet phoning as a relatively secure telecommunications technology and not as an IP service susceptible to the same worms, viruses, and other pestilence that threatens all networked systems. “With VoIP,” said security specialist Mark Nagiel in an interview, “we're inserting a new technology into an unsecured and unprotected environment. VoIP is essentially availability driven, not security driven, and that's the problem.” Nagiel, who is manager of security consulting at NEC Unified Solutions, said, however, that various measures can be taken to protect VoIP from the specific threats that confront Web telephoning. The first stepan obvious one, he saysis to secure existing TCP/IP nets. Nagiel is finding that the new government-required regulationssuch as Sarbanes-Oxley, which stipulates improved accounting record-keeping, and HIPAA in health careare helping IT managers because they impose security discipline across-the-board. “The financial and health-care fields are getting secured very quickly,” said Nagiel.

170. CNN - Teens Steal Thousands Of Net Accounts - January 14, 2000
CNN
http://www.cnn.com/2000/TECH/computing/01/14/teen.hackers.idg/index.html
[an error occurred while processing this directive]
MAIN PAGE
WORLD U.S. LOCAL ... daily almanac
MULTIMEDIA:
video
video archive audio multimedia showcase ... more services
E-MAIL:
Subscribe to one of our news e-mail lists.
Enter your address: document.write(' '); Or:
Get a free e-mail account

E-MAIL
DISCUSSION: message boards chat feedback
CNN WEB SITES:
AsiaNow
Svenska Norge Danmark ... Italian FASTER ACCESS: europe japan TIME INC. SITES: Go To ... Time.com People Money Fortune EW CNN NETWORKS: more networks transcripts SITE INFO: help contents search ad info ... jobs WEB SERVICES: Main Page Bracing for Cyberwar Hacking Primer Scenes from the 'Hacker Underground' ... From...
Teens steal thousands of Net accounts
January 14, 2000
Web posted at: 12:38 p.m. EST (1738 GMT) by Ann Harrison (IDG) A group of teen-age computer crackers allegedly used thousands of stolen Internet accounts to probe the networks of two national nuclear weapons laboratories, according to law enforcement authorities in California. At least five crackers, ages 15 to 17, compromised accounts at 17 Internet service providers in the U.S., Romania and Australia and used the accounts to attack nine targets including the Sandia and Oak Ridge National Laboratories and Harvard University, according to Capt. Jan Hoganson of the Sacramento Valley High-Tech Crimes Task Force in California. The crackers managed to gain root access to computers at Harvard, Hoganson said, but just scanned the national lab networks to look for vulnerabilities. The intruders stole 200,000 accounts alone from San Francisco-based Pacific Bell Internet Services for use in the attack.

171. Sacred Chao Software Applications
Hackers. Hackers is a program to manage a set of character databases for NetHack,an excellent RPG that will ruin your grades. 2002.04.21 Hackers 1.0.5.
http://www.sacredchao.net/software/hackers/index.shtml

172. CNN In-Depth Specials - Hackers
CNN
http://www.cnn.com/TECH/specials/hackers/news.archive/index.html

MAIN PAGE
WORLD ASIANOW U.S. ... news quiz
CNN WEB SITES: TIME INC. SITES: Go To ... Time.com People Money Fortune EW MORE SERVICES: video on demand video archive audio on demand news email services ...
pagenet

DISCUSSION: message boards chat feedback
SITE GUIDES: help contents search
FASTER ACCESS: europe japan
WEB SERVICES:
Main Page
Bracing for Cyberwar Hacking Primer Scenes from the 'Hacker Underground' ... Related Sites
News articles on hacking and computer security
Computer Network Security Cyberterrorism and Government Security Privacy and Encyption Hackers on the Web Hackers and the Courts More recent articles
COMPUTER NETWORK SECURITY

173. All-Reviews.com Movie/Video Review: Hackers
Review of the movie.
http://www.all-reviews.com/videos-3/hackers.htm
All reviews all the time! Home Movies Music Video Games ... Buy Movie Posters
Search Amazon Video DVD All Products Video Games Popular Music Classical Music Books Electronics Software Tools Kitchen Wireless Phones Browse Movies in Theaters
by Title

by Year

by Reviewer Rating
...
by Director

Browse by Genre Action
Comedy

Drama

Sci-Fi/Fantasy
...
more genres
Other Reviewer Directory Become a Reviewer Take our survey Contact Us
All-Reviews.com Movie/Video Review Hackers
out of 4 Starring: Jonny Lee Miller Angelina Jolie Director: Iain Softley Rated: PG-13 RunTime: 104 Minutes Release Date: September Genres: Sci-Fi/Fantasy Suspense Buy this DVD Amazon.com ... Half.com *Also starring: Fisher Stevens Jesse Bradford Lorraine Bracco Matthew Lillard , Penn Jillette, Renoly Santiago, Laurence Mason, Alberta Watson Reviewer Roundup Steve Rhodes review follows no stars Dragan Antulov read the review Review by Steve Rhodes 0 stars out of 4 HACKERS is certainly the worst movie I have seen in years and will rank in infamy for me as one of the worst I have ever seen. HACKERS makes you leave the theater angry at everyone associated with the show for stealing your money and your time with a movie that insults the audience's intelligence with complete garbage. HACKERS was directed by Iain Softley and produced by Michael Peyser, Ralph Winter, and Janet Graham. I would suggest writing these names down and avoiding anything they are ever associated with. HACKERS is a an MTV style movie that burst your ear drums with loud rock music and attempts to dazzle your eyes with flashing images and machine gun style cuts by cinematographer Andrzej Sekula.

174. HACKERS.NL
Engelse en Nederlandse tutorials, nieuws en fora.
http://www.hackers.nl/
HACKERS.NL HEADLINES HACKERS.NL HOT NEWS HEADLINES Author: Alex
Start hacking @ Hackers.nl
Author: Alex join @ Hackers.nl on IRC WiFi-netwerken soms slecht beveiligd. Posted by: ""
Date: 03 Juni 2004 Het televisieprogramma Zembla van de VARA en de NPS besteedt vanavond aandacht aan de beveiligingsproblemen rond draadloze netwerken. Te zien zal zijn hoe binnen een paar minuten eenvoudig toegang kan worden verkregen tot WiFi-netten van kantoren van Rijkswaterstaat, Twee Vandaag, Eurocargo en KLM-Schiphol. Tijdens het 'inbreken' konden onder andere e-mail, documenten en surfgedrag worden onderschept. Bij een medewerker van Rijkswaterstaat werd een bezoek aan een pornosite ontdekt en inmiddels zijn door de instelling 'passende' maatregelen tegen hem genomen. Openstaande verbindingen zouden meteen zijn gesloten.
Lees hier verder / Reageer hier!
Trojan invasie via nog onbekend lek in internet explorer. Posted by: "" Date: 30 Mei 2004 Afgelopen week hebben meerdere mensen een valse e-mail ontvangen met de mededeling dat men een IBM laptop besteld zou hebben. In deze mail zat een link naar een webpagina waar men deze order kon ontbinden.
Lees hier verder / Reageer hier!

175. Vnunet.com - Credit Card Hackers Swap Tricks Online
Credit card Hackers swap tricks online. By Dinah Greek 2507-2003. Chatroomsused for sharing hints and tips in growing business of ID theft.
http://www.vnunet.com/News/1142582
View UK websites Computer active Computer Reseller News Computing Infomatics Information World Review IT Week Network IT Week Personal Computer World PC Magazine vnunet.com Web active What PC? Register Update details HOME NEWS ... More... All articles News Reviews Downloads Jobs Forums White Papers Site map vnunet.com News Ebusiness ... send to friend Also read News centre Job of the day More from vnunet.com ADVERTISEMENT
Credit card hackers swap tricks online
Chatrooms used for sharing hints and tips in growing business of ID theft Dinah Greek, vnunet.com 25 Jul 2003 ADVERTISEMENT Thieves are using chat rooms to sell stolen credit card details and advise others how to hack websites containing credit information, security experts have warned. Groups using internet relay chat (IRC) are playing a growing role in online credit card fraud. A report by the Honeynet Project, which monitors criminal activity on the internet, shows that online thieves are becoming increasingly sophisticated.

176. CNN In-Depth Specials - Hackers - Cyberterrorism
CNN
http://www.cnn.com/TECH/specials/hackers/cyberterror/index.html
MAIN PAGE WORLD ASIANOW U.S. ... news quiz
CNN WEB SITES: TIME INC. SITES: Go To ... Time.com People Money Fortune EW MORE SERVICES: video on demand video archive audio on demand news email services ...
pagenet

DISCUSSION: message boards chat feedback
SITE GUIDES: help contents search
FASTER ACCESS: europe japan
WEB SERVICES:
Main Page
Bracing for Cyberwar Hacking Primer Scenes from the 'Hacker Underground' ... Related Sites
Bracing for guerrilla warfare in cyberspace
'There are lots of opportunities; that's very scary'
April 6, 1999

Web posted at: 2:29 p.m. EDT (1829 GMT)
By John Christensen
CNN Interactive (CNN) It is June, the children are out of school, and as highways and airports fill with vacationers, rolling power outages hit sections of Los Angeles, Chicago, Washington and New York. An airliner is mysteriously knocked off the flight control system and crashes in Kansas. Parts of the 911 service in Washington fail, supervisors at the Department of Defense discover that their e-mail and telephone services are disrupted and officers aboard a U.S. Navy cruiser find that their computer systems have been attacked. "If somebody wanted to launch an attack, it would not be at all difficult."

177. Chinese Hackers Call Truce In China-U.S. Cyberwar
CNN
http://cnn.com/2001/TECH/internet/05/09/china.hackers.reut/index.html

178. CNN.com - Singapore, Hong Kong Crack Down On Teen Hackers - March 23, 2000
CNN
http://www.cnn.com/2000/TECH/computing/03/23/asia.hackers/index.html
technology > computing CNN Sites CNN CNNfn CNNSI myCNN AllPolitics Languages myCNN Video Audio Headline News Brief ... Feedback
CNN Sites CNN CNN Europe CNNfn CNNSI myCNN CNNfyi AllPolitics Languages
Search
CNN.com CNNSI.com CNNfn.com The Web
TECHNOLOGY

TOP STORIES
Consumer group: Online privacy protections fall short

Guide to a wired Super Bowl

Debate opens on making e-commerce law consistent

MORE

TOP STORIES More than 11,000 killed in India quake Mideast negotiators want to continue talks after Israeli elections MORE BUSINESS ... MORE MARKETS 4:30pm ET, 4/16 DJIA NAS SPORTS Jordan says farewell for the third time ... LOCAL EDITIONS: CNN.com Europe change default edition MULTIMEDIA: video video archive audio multimedia showcase ... more services E-MAIL: Subscribe to one of our news e-mail lists Enter your address: DISCUSSION: chat feedback CNN WEB SITES: CNNfyi.com CNN.com Europe AsiaNow Spanish ... Korean Headlines TIME INC. SITES: Go To ... Time.com People Money Fortune EW CNN NETWORKS: CNN anchors transcripts Turner distribution SITE INFO: help contents search ad info ... jobs WEB SERVICES: Main Page Bracing for Cyberwar Hacking Primer Scenes from the 'Hacker Underground' ... Related Sites
Singapore, Hong Kong crack down on teen hackers

179. CNN.com - Classic Hackers Decry Heavy-Handed Upstarts - February 9, 2000
CNN
http://www.cnn.com/2000/TECH/computing/02/09/hackers29.a.tm/index.html
technology computing CNN Sites CNN CNNfn CNNSI myCNN AllPolitics Languages myCNN Video Audio Headline News Brief ... Feedback
CNN Sites CNN CNN Europe CNNfn CNNSI myCNN CNNfyi AllPolitics Languages
Search
CNN.com CNNSI.com CNNfn.com The Web
TECHNOLOGY

TOP STORIES
Consumer group: Online privacy protections fall short

Guide to a wired Super Bowl

Debate opens on making e-commerce law consistent

MORE

TOP STORIES More than 11,000 killed in India quake Mideast negotiators want to continue talks after Israeli elections MORE BUSINESS ... MORE MARKETS 4:30pm ET, 4/16 DJIA NAS SPORTS Jordan says farewell for the third time ... LOCAL EDITIONS: CNN.com Europe change default edition MULTIMEDIA: video video archive audio multimedia showcase ... more services E-MAIL: Subscribe to one of our news e-mail lists Enter your address: DISCUSSION: chat feedback CNN WEB SITES: CNNfyi.com CNN.com Europe AsiaNow Spanish ... Korean Headlines TIME INC. SITES: Go To ... Time.com People Money Fortune EW CNN NETWORKS: CNN anchors transcripts Turner distribution SITE INFO: help contents search ad info ... jobs WEB SERVICES: from:
Classic Hackers Decry Heavy-Handed Upstarts
February 9, 2000

180. CNN - White House: Hackers Hit Our Web Site - May 12, 1999
CNN
http://www.cnn.com/TECH/computing/9905/12/white.house.site.01/index.html
[an error occurred while processing this directive]
MAIN PAGE
WORLD ASIANOW U.S. ... news quiz
CNN WEB SITES: TIME INC. SITES: Go To ... Time.com People Money Fortune EW MORE SERVICES: video on demand video archive audio on demand news email services ...
pagenet

DISCUSSION: message boards chat feedback
SITE GUIDES: help contents search
FASTER ACCESS: europe japan
WEB SERVICES:
White House: Hackers hit our Web site
Site remains shut down
May 12, 1999

Web posted at: 7:21 a.m. EDT (1121 GMT)
WASHINGTON (CNN) The official Web site of the White House remained off line Wednesday morning, more than 24 hours after hackers broke into the system. White House spokesman Barry Toiv said the site was shut down Monday night after "an attempt was made ... to break into the system that operates the White House Web page." There was no word early Wednesday on when the site would be available again. Toiv said he had no information on who the hackers were or what their motive was. An unconfirmed report said they were angered by the NATO bombing in Yugoslavia. The site ( http://www.whitehouse.gov

A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

Page 9     161-180 of 195    Back | 1  | 2  | 3  | 4  | 5  | 6  | 7  | 8  | 9  | 10  | Next 20

free hit counter