Geometry.Net - the online learning center
Home  - Computer - Hacking
e99.com Bookstore
  
Images 
Newsgroups
Page 3     41-60 of 193    Back | 1  | 2  | 3  | 4  | 5  | 6  | 7  | 8  | 9  | 10  | Next 20

         Hacking:     more books (100)
  1. Hacking World of Warcraft (ExtremeTech) by Daniel Gilbert, James, II Whitehead, 2007-06-05
  2. Hacking Video Game Consoles: Turn your old video game systems into awesome new portables (ExtremeTech) by Benjamin Heckendorn, 2005-02-18
  3. An Introduction to Probability and Inductive Logic by Ian Hacking, 2001-07-02
  4. The Unofficial Guide to Ethical Hacking, Second Edition by Ankit Fadia, 2005-09-13
  5. Hardware Hacking Projects for Geeks by Scott Fullam, 2003-11-01
  6. Hacking Exposed Linux (Hacking Exposed) by ISECOM, 2008-07-29
  7. Hacking Digital Cameras (ExtremeTech) by Chieh Cheng, Auri Rahimzadeh, 2005-09-23
  8. Asterisk Hacking by Ben Jackson, Champ Clark, 2007-06-29
  9. Hacking Firefox: More Than 150 Hacks, Mods, and Customizations (ExtremeTech) by Mel Reyes, 2005-08-05
  10. Rewriting the Soul by Ian Hacking, 1998-08-03
  11. The Emergence of Probability: A Philosophical Study of Early Ideas about Probability, Induction and Statistical Inference (Cambridge Series on Statistical and Probabilistic Mathematics) by Ian Hacking, 2006-07-31
  12. Hacking Linux Exposed, Second Edition by Brian Hatch, James Lee, 2002-12-04
  13. The Complete Hacker's Handbook : Everything You Need to Know About Hacking in the Age of the Web by Dr. X, Dr. X, 2000-10-01
  14. Hacking the Xbox: An Introduction to Reverse Engineering by Andrew Huang, 2003-07

41. Lindows CEO Funds Xbox Hacking Contest | CNET News.com
Michael Robertson, Lindows CEO, reveals himself as formerly anonymous donor of $200,000 prize money in contest to translate Linux OS to Microsoft's Xbox video game console. CNET News.com
http://news.com.com/2100-1040-978957.html
CNET
News.com
E-mail alerts! Sign up now by company topic , or keyword Get News around the Web (beta)
Lindows CEO funds Xbox hacking contest
Last modified: January 2, 2003, 1:47 PM PST By David Becker
Staff Writer, CNET News.com
update Michael Robertson, CEO of software company Lindows, has revealed himself as the formerly anonymous donor of $200,000 in prize money in a contest to translate the Linux operating system to Microsoft's Xbox video game console. The revelation was made in a posting earlier this week on the Xbox Linux Project site at SourceForge, a site for collaborative development of open-source software projects. Robertson disclosed his identity as the person funding the contest and extended the deadline. Robertson confirmed the SourceForge posting in an interview Thursday with CNET News.com, saying he funded the contest not for business goals but to promote open access to technology. "There is no business justification; that's not why I did it," he said. "I did it because I thought people should have the choice to run the software they want on the hardware of their choice...I don't think when you buy a car, they should be able to tell you what brand of gas to put in it." Robertson said Microsoft's efforts to close off the Xbox are particularly alarming because the game machine is based on the same type of Intel processors used in PCs. Restricting access to the processor sets a dangerous precedent, he said, particularly as Microsoft moves forward with its

42. Hacking The TiVo FAQ
You have no frames! So, click here to go to the TiVo Hack FAQ.
http://www.tivofaq.com/hack/faq.html
You have no frames! So, click here to go to the TiVo Hack FAQ.

43. U.S. Arrests Los Alamos Lab Employee For Alleged Hacking
CNN
http://cnn.com/2001/TECH/computing/01/10/losalamos.hacker.reut/index.html

44. BBC News | SCI/TECH | Hacking With A Pringles Tube
Friday, 8 March, 2002, 0923 GMT hacking with a Pringles tube. Acrisp can is an effective tool for curious hackers. By Mark Ward
http://news.bbc.co.uk/hi/english/sci/tech/newsid_1860000/1860241.stm
CATEGORIES TV RADIO COMMUNICATE ... INDEX SEARCH You are in: Sci/Tech Front Page World UK ... AudioVideo
SERVICES Daily E-mail News Ticker Mobiles/PDAs Feedback ... Low Graphics Friday, 8 March, 2002, 09:23 GMT Hacking with a Pringles tube
A crisp can is an effective tool for curious hackers
By Mark Ward
BBC News Online technology correspondent Empty cans of Pringles crisps could be helping malicious hackers spot wireless networks that are open to attack. Security company i-sec has demonstrated that a directional antenna made with a Pringles can significantly improves the chances of finding the wireless computer networks being used in London's financial district. An informal survey carried out by i-sec using the homemade antenna has found that over two-thirds of networks were doing nothing to protect themselves. The security firm said all the companies at risk could easily thwart anyone that wanted to find and penetrate their network by making a few simple changes to the hardware used to build the wireless networks. Hack here In November last year BBC News Online was shown just how easy it is to find and gain information about wireless networks.

45. Security News Portal Latest Security, Hacking And Virus News
Comprehensive hourly updates on the latest security, hacking, virus and trojan news.
http://www.securitynewsportal.com
security news virus news hacking news hacker trojan underground headlines newsticker security news antivirus exploit denial of service DDoS advisories trojan backdoor sniffer smurfwindows securityXP security security products security books security tips security faq authentication computer security crack crackers crash cryptography denial of service DOS email virus alerts encrypting file system encryption exploits firewall firewalls hack hacks hack files hack links hacked webpages hacker hackers hacking hacking files hacking links hot fixes icmp intruder intrusion detection news ip spoof Kerberos key logger logon microsoft security NT nt security nt server ntsecurity ntshop password password crackers patches permissions phreaking boxes port monitors proxy proxy servers secure security security news security firewalls cryptography vulnerabilities vulnerability news encrypting file system hotfixes authentication password permissions proxy servers antivirus virus system policies smart cards smart cards source route spoofing syn flood system policies texts virii virus viruses vulnerabilities vulnerability wardialers win2k sec win2k security win2k sec windows 2000 security windows 2000 windows windows NT windows nt security XP xp News Security News Virus News Hacking News Hacker Trojan Underground Headlines Newsticker Security News Antivirus Exploit Denial Of Service Ddos Advisories Trojan Backdoor Sniffer Smurfwindows Securityxp Security Security Products Security Books Security Tips Security Faq Authentication Computer Security Crack Crackers Crash Cryptography Denial Of Service DOS Email Virus Alerts Encrypting File System Encryption Exploits Firewall Firewalls Hack Hacks Hack Files Hack Links Hacked Webpages Hacker Hackers Hacking Hacking Files Hacking Links Hot Fixes Icmp Intruder Intrusion Detection News Ip Spoof Kerberos Key Logger Logon Microsoft Security NT Nt Security Nt Server Ntsecurity Ntshop Password Password Crackers Patches Permissions Phreaking Boxes Port Monitors Proxy Proxy Servers Secure Security Security News Security Firewalls Cryptography Vulnerabilities Vulnerability News Encrypting File System Hotfixes Authentication Password Permissions Proxy Servers Antivirus Virus System Policies Smart Cards Smart Cards Source Route Spoofing Syn Flood System Policies Texts Virii Virus Viruses Vulnerabilities Vulnerability Wardialers Win2k Sec Win2k Security Win2k Sec Windows 2000 Security Windows 2000 Windows Windows NT Windows Nt Security XP Xp NEWS SECURITY NEWS VIRUS NEWS HACKING NEWS HACKER TROJAN UNDERGROUND HEADLINES NEWSTICKER SECURITY NEWS ANTIVIRUS EXPLOIT DENIAL OF SERVICE DDOS ADVISORIES TROJAN BACKDOOR SNIFFER SMURFWINDOWS SECURITYXP SECURITY SECURITY PRODUCTS SECURITY BOOKS SECURITY TIPS SECURITY FAQ AUTHENTICATION COMPUTER SECURITY CRACK CRACKERS CRASH CRYPTOGRAPHY DENIAL OF SERVICE DOS EMAIL VIRUS ALERTS ENCRYPTING FILE SYSTEM ENCRYPTION EXPLOITS FIREWALL FIREWALLS HACK HACKS HACK FILES HACK LINKS HACKED WEBPAGES HACKER HACKERS HACKING HACKING FILES HACKING LINKS HOT FIXES ICMP INTRUDER INTRUSION DETECTION NEWS IP SPOOF KERBEROS KEY LOGGER LOGON MICROSOFT SECURITY NT NT SECURITY NT SERVER NTSECURITY NTSHOP PASSWORD PASSWORD CRACKERS PATCHES PERMISSIONS PHREAKING BOXES PORT MONITORS PROXY PROXY SERVERS SECURE SECURITY SECURITY NEWS SECURITY FIREWALLS CRYPTOGRAPHY VULNERABILITIES VULNERABILITY NEWS ENCRYPTING FILE SYSTEM HOTFIXES AUTHENTICATION PASSWORD PERMISSIONS PROXY SERVERS ANTIVIRUS VIRUS SYSTEM POLICIES SMART CARDS SMART CARDS SOURCE ROUTE SPOOFING SYN FLOOD SYSTEM POLICIES TEXTS VIRII VIRUS VIRUSES VULNERABILITIES VULNERABILITY WARDIALERS WIN2K SEC WIN2K SECURITY WIN2K SEC WINDOWS 2000 SECURITY WINDOWS 2000 WINDOWS WINDOWS NT WINDOWS NT SECURITY XP XP antivirus exploit denial of service DDoS advisories trojan backdoor sniffer smurf windows security XP security security products security books security tips security faq authentication computer security crack crackers crash cryptography denial of dervice DOS email virus encrypting file system encryption exploits firewall firewalls hack hacks hack files hack links hacked webpages hacker hackers hacking hacking files hacking links hotifixes icmp intruder intrusion detection ip spoof Kerberos key logger logon mark edwards mark joseph edwards microsoft security NT nt security nt server ntsecurity ntshop password password crackers patches permissions phreaking boxes port monitors proxy proxy servers secure security security news security firewalls crytography vulnerabilities vulnerability encrypting file system hotfixes authentication password permissions proxy servers logon antivirus virus system policies smart cards, smart cards source route spoofing syn flood system policies texts toast virii virus virus viruses vulnerabilities vulnerability wardialers win2k sec win2k security win2ksec windows 2000 security windows 2000 windows windows NT windows nt security antivirus exploit denial of service DDoS advisories trojan backdoor sniffer smurf windows security XP security security products security books security tips security faq authentication computer security crack crackers crash cryptography denial of dervice DOS email virus encrypting file system encryption exploits firewall firewalls hack hacks hack files hack links hacked webpages hacker hackers hacking hacking files hacking links hotifixes icmp intruder intrusion detection ip spoof Kerberos key logger logon mark edwards mark joseph edwards microsoft security NT nt security nt server ntsecurity ntshop password password crackers patches permissions phreaking boxes port monitors proxy proxy servers secure security security news security firewalls crytography vulnerabilities vulnerability encrypting file system hotfixes authentication password permissions proxy servers logon antivirus virus system policies smart cards, smart cards source route spoofing syn flood system policies texts toast virii virus virus viruses vulnerabilities vulnerability wardialers win2k sec win2k security win2ksec windows 2000 security windows 2000 windows windows NT windows nt security

46. BBC News | SCI/TECH | Hacking: A History
A brief guide to the history of hacking from BBC News Online s internet reporterMark Ward. Wargames, a film that glamorises hacking, is released.
http://news.bbc.co.uk/hi/english/sci/tech/newsid_994000/994700.stm
low graphics version feedback help You are in: Sci/Tech Front Page World UK ... AudioVideo
Friday, 27 October, 2000, 17:57 GMT 18:57 UK Hacking: A history
The ILOVEYOU virus as victims saw it
By BBC News Online internet reporter Mark Ward Great hacks of our time The original meaning of the word "hack" was born at MIT, and originally meant an elegant, witty or inspired way of doing almost anything. Many early hacks took the form of elaborate practical jokes. In 1994, MIT students put a convincing replica of a campus police car on top of the Institute's Great Dome. Now the meaning has changed to become something of a portmanteau term associated with the breaking into or harming of any kind of computer or telecommunications system. Purists claim that those who break into computer systems should be properly called "crackers" and those targeting phones should be known as "phreaks". Arpanet, the forerunner of the internet, is founded. The first network has only four nodes. First e-mail program written by Ray Tomlinson and used on Arpanet which now has 64 nodes. John Draper, also known as Captain Crunch, finds that a toy whistle given away in the cereal with the same name could be used to mimic the 2600 hertz tones phone lines used to set up long distance calls.

47. Your Spectrum 12 - Hacking Away & QL Affairs
Adds a platform to the First Landing allowing Willy to reach the cross and the hidden object.
http://www.users.globalnet.co.uk/~jg27paw4/yr12/yr12_05.htm
Your Spectrum
Home
Contents KwikPik HACKING
AWAY
All the POKEs and more! Send your hacking hints to Andrew Pennell, Hacking Away, Your Spectrum, 14 Rathbone Place, London W1P 1DE.
Welcome to this month's hacking column - and have we got some strange POKEs for you! I'll start off with Mr Wimpy from Ocean. Peter Ball wrote in with POKE 33501,0 to skip the first screen, or alternatively you can POKE 33501 with a one or a two to make the game a little harder to complete. You can also POKE 33509 with the required number of lives (though beware of high numbers corrupting the screen display), or POKE 33693,0 for more straightforward infinite lives. You can also POKE 33721 with the number of peppers required, or POKE 43105 for unlimited peppers (this has to be one of the strangest POKEs ever!).
A couple of months ago I described the annoying aspect of Ultimate's loading programs, in that they include all the important bits in line number zero; this meant you had to duplicate the line to make them work. Well, I had loads of letters telling me that POKE 23756,1 changes it into line 1 (which I must admit I did know). Trouble is, it doesn't work if you've invested in an Interface 1 unit. Lucky (?) Interface 1 owners should resort to:
POKE (1+PEEK 23635+256'PEEK 23636),1

48. Hacking Linux Exposed
an attacker. In hacking Linux Exposed, Second Edition we are ableto cover Linux hacking in more detail than ever before. We are
http://www.hackinglinuxexposed.com/
Secure your Linux network by thinking like an attacker. In Hacking Linux Exposed, Second Edition we are able to cover Linux hacking in more detail than ever before. We are able to show you where Linux may differ from other Unix-like systems and give you Linux-specific countermeasures that you can implement immediately. In the hard-hitting style of Hacking Exposed Hacking Linux Exposed, Second Edition once again dives into the actual attacks used by the enemy. Look no further for the actual exploitation techniques used to surreptitiously gain access to Linux systems. Hacking Linux Exposed, Second Edition covers the myriad ways a malicious hacker will attack your Linux system, and the rationale behind such behaviour. While the bad guys are well versed in such techniques, this book serves to educate the home user as well as the overworked and underpaid system administrator who is not only responsible for the operation of mission-critical Linux servers, but who must vigilantly secure them on a daily basis. For more information, see the

49. Hacking Linux Exposed
hacking Linux Exposed Authors write more than they wish to admit.Brian Hatch has coauthored Building Linux VPNs. James has lead
http://www.hackinglinuxexposed.com/articles/
Hacking Linux Exposed Authors write more than they wish to admit. Brian Hatch has co-authored Building Linux VPNs . James has lead-authored Open Source Web Development with LAMP In addition, Brian has written several articles for SecurityFocus
  • Filtering E-Mail with Postfix and Procmail. Discusses the UCE/UBE filters available in the Postfix mail server, integrating spam prevention and filtering strategies in the Procmail local mail delivery agent, and two top-notch filters, Vipul's Razor and SpamAssasssin. part one part two part three part four
  • An Overview of LIDS, the Linux Intrusion Detection System, teaches you in depth about how LIDS can extend the traditional Linux security model to enforce stricter file and capabilities ACLs. part one part two part three part four ...
  • Firewall-related /proc entries on Linux , an expanded version of one of the Linux Security: Tips, Tricks, and Hackery newsletters.
Brian also speaks at conferences. You can find all of his Presentations available on his Home Page Brian Hatch also writes the " Linux Security: Tips, Tricks, and Hackery

50. GameBoy Dev'rs - What's New?
Detailed information concerning the programming, modification, and hacking of Game Boy hardware.
http://www.devrs.com/gb/
Do you develop for other things? Devrs.com GameBoy Dev'rs http://www.devrs.com/ gb/ GameBoy Got info to post? Modify FAQs ... Search What's New? What's New? Jobs Jobs Apps Assemblers C Compilers GBCamera Compression ... Sound Asm Code Compression Games Graphics Macros ... Random #'s C Code Games Graphics Misc Sound Data Fonts Misc Docs FAQs Misc Patents Sound ... Tutorials Hardware Cart Writers Game Link GB/Cart Misc Links DemoArchives Discussion Misc
LSDJ-MC2 V1.0.2b - Posted by: firestARTer
A new Midi-Interface for the LittleSoundDJ / LSDJ and Nanoloop. It makes your LSDJ-Cartridge full Midi-Capable including Midi-Sync and playing notes. It's released as a 'Do It Yourself' kit.
PDRoms Coding Competition 2 (8th Jan - 8th Feb) - Posted by: Kojote
PDRC #2 has started. Goal is to write a LLamatron style game. Click on the headline for the rules page. Allowed systems are GB,GBC,GBA,GP32,NGP,NGPC and Dreamcast. 1st prize is a NGPC including 7 games.
Lord_Nightmare's GB Sound Doc Updated - Posted by: DuoDreamer
Lord_Nightmare has updated his comprehensive and very detailed document of the GameBoy sound hardware, with a local copy here on Devrs.com because his ISP went Chapter 11. Oops.
MBC Tester V1.0

51. Salon.com Technology | Hacking Democracy
Salon’s Technology Business content is brought to you by Infiniti FX45. hackingdemocracy? Computerized votecounting machines are sweeping the country.
http://www.salon.com/tech/feature/2003/02/20/voting_machines/

Search

All of Salon.com
Only Technology
Directory
Hot Topics
Ask the Pilot

The Matrix

Computer Games

Globalization
...
Joyce McGreevy

Articles by date
  • All of Salon.com By department
  • Find a job Search our Personals ... Newsletter Salon Communities The Well Table Talk Salon Blogs Salon Credit Card ... Table Talk [Spirited Salon forums] Getting the most from your Mac. The coolest new computer games.
  • Posts of the week
  • The Well [Pioneering members-only discussions] Selling to suckers Sound Off
  • E-mail Salon Send us a Letter to the Editor Recent Letters
  • Downloads
  • Get Salon.com on your PDA
  • Hacking democracy? Computerized vote-counting machines are sweeping the country. But they can be hacked and right now there's no way to be sure they haven't been. By Farhad Manjoo During the past five months, Bev Harris has e-mailed to news organizations a series of reports that detail alarming problems in the high-tech voting machinery currently sweeping its way through American democracy. But almost no one is paying attention. Harris is a literary publicist and writer whose investigations into the secret world of voting equipment firms have led some to call her the Erin Brockovich of elections. Harris has discovered, for example, that Diebold, the company that supplied touch-screen voting machines to Georgia during the 2002 election, made its system's sensitive software files available on a public Internet site. She has reported on the certification process for machines coming onto the market revealing that the software code running the equipment is seldom thoroughly reviewed and can often be changed with mysteriously installed "patches" just prior to an election. And in perhaps her most eyebrow-raising coup, she found that Sen. Chuck Hagel, a Nebraska Republican, used to run the company that built most of the machines that count votes in his state and that he still owns a stake in the firm.

    52. CNN.com - Technology - Mitnick Schools Feds On Hacking 101 - March 3, 2000
    CNN
    http://www.cnn.com/2000/TECH/computing/03/03/mitnick.the.prof/mitnick.the.prof.h
    technology > computing Editions myCNN ... Feedback
    CNN Sites CNN CNN Europe CNNfn CNNSI myCNN CNNfyi AllPolitics Languages
    Search
    CNN.com CNNSI.com CNNfn.com The Web
    TECHNOLOGY

    TOP STORIES
    Consumer group: Online privacy protections fall short

    Guide to a wired Super Bowl

    Debate opens on making e-commerce law consistent

    MORE

    TOP STORIES More than 11,000 killed in India quake Mideast negotiators want to continue talks after Israeli elections MORE BUSINESS ... MORE MARKETS 4:30pm ET, 4/16 DJIA NAS SPORTS Jordan says farewell for the third time ... LOCAL EDITIONS: CNN.com Europe change default edition MULTIMEDIA: video video archive audio multimedia showcase ... more services E-MAIL: Subscribe to one of our news e-mail lists Enter your address: DISCUSSION: chat feedback CNN WEB SITES: CNNfyi.com CNN.com Europe AsiaNow Spanish ... Korean Headlines TIME INC. SITES: Go To ... Time.com People Money Fortune EW CNN NETWORKS: CNN anchors transcripts Turner distribution SITE INFO: help contents search ad info ... jobs WEB SERVICES: Main Page Bracing for Cyberwar Hacking Primer Scenes from the 'Hacker Underground' ... Related Sites
    Mitnick schools feds on hacking 101
    From...

    53. Hacking Billy Mouth Bass In Linux
    For the no frames version, please start with the introduction.
    http://bigmouth.here-n-there.com/
    For the no frames version, please start with the introduction

    54. Minnesota Man Arrested For Hacking Into Lab Computers
    CNN
    http://www.cnn.com/2000/LAW/09/12/nuclearlab.hacker.ap/index.html

    55. CNN - Hacking Your Way To An IT Career - August 13, 1999
    CNN
    http://www.cnn.com/TECH/computing/9908/13/4hackcareers.idg/index.html
    [an error occurred while processing this directive]
    MAIN PAGE
    WORLD ASIANOW U.S. ... news quiz
    CNN WEB SITES: TIME INC. SITES: Go To ... Time.com People Money Fortune EW MORE SERVICES: video on demand video archive audio on demand news email services ...
    pagenet

    DISCUSSION: message boards chat feedback
    SITE GUIDES: help contents search
    FASTER ACCESS: europe japan
    WEB SERVICES:
    Main Page
    Bracing for Cyberwar Hacking Primer Scenes from the 'Hacker Underground' ...
    From...
    Hacking your way to an IT career
    August 13, 1999

    Web posted at: 1:36 p.m. EDT (1736 GMT)
    by Ann Harrison ALSO: Hackers, IT consultants embrace free security tool Hacking group reveals IP-security glitch ALTLANDSBERG, GERMANY (IDG) At the first annual Chaos Communication Camp, which took place outside of Berlin last weekend (see "Hackers on holiday," link below), hundreds of hackers and their machines filled the main hack tent exchanging information on the latest exploits and security tools. Most were young, skillful and in demand by corporate information technology departments. The camp, which attracted some of the most talented European and American hackers, was one of the largest hacker gatherings in Europe so far this year.

    56. A Very Hacky Site
    Software for website hacking security.
    http://www.geocities.com/capn_crunch7/
    alert("knowledge is power...") This page uses frames.

    57. Audreyhacking.com :: Hacking The Audrey
    hacking the Audrey, Buy Audreyhacking.com Gear. Show your Audrey hacking pridewith some audrey hacking gear. Check out our action shots. Update Server.
    http://www.audreyhacking.com/
    @import url("themes/Korporate/style/style.css"); Hacking the Audrey Main Menu Home
    Your Account

    Submit News

    Live Chat
    ...
    Files

    Support Us:
    Supported Links Buy a Link Now
    Who's online There is currently 1 guest and members online
    You are not logged on
    Recent Forum Activity
  • Audres as a photoframe from memory card?
  • Re: Help with IP addresses
  • Re: looking to hire audrey hacker
  • Re: Remote control PC WAV files ...
  • Re: Help with IP addresses in Audrey vist the forum
    Buy Audreyhacking.com Gear Show your Audrey Hacking pride with some audrey hacking gear. Check out our action shots Update Server Spoof's Linux Marimba server at: http://2-1b.artoo.net Audrey Special Links Viewable only from Audrey
  • Scheduled tasks Primary timeserver System profile Open shell
  • Led Controls Solid Blin k Off Information Produced and hosted by NaTa2.com If you wish to advertise on this site, please email info@nata2.com This is probably the weirdest site on the internet. Hacking the Audrey This site will discuss hacking and exploitation of the Ergo Audrey. The audrey is an internet appliance developed to fill the void between the desktop and the Palm. Running QNX with PalmOS extensions it is ripe to be hacked and used for all sorts of interesting things. For more information check out

    58. Elhacker.net
    Informaci³n, servicios y downloads sobre Inform¡tica e Internet en general. Con secciones variadas y preocupaci³n especial sobre temas relacionados con el hacking.
    http://www.elhacker.net/
    Este Web-Site usa FRAMES pero tu NAVEGADOR no los admite. Actulizate el Navegador de una jodida vez, que ya no estamos en la prehistoria GRACIAS.Were sorry but youve reached a web site that uses frames. You will need a frames-enabled browser in order to view the site. www.elhacker.net

    59. A History Of Hacking
    Home. A history of hacking. hacking has been around for more than a century. 2600The Hacker Quarterly is founded to share tips on phone and computer hacking.
    http://www.sptimes.com/Hackers/history.hacking.html
    Hackers WE ARE HACKERS A history of hacking Florida's hacker connections Altering a Web site STREET SMARTS The bible of phreaking faithful ... Home
    A history of hacking Hacking has been around for more than a century. In the 1870s, several teenagers were flung off the country's brand new phone system by enraged authorities. Here's a peek at how busy hackers have been in the past 35 years. Early 1960s University facilities with huge mainframe computers, like MIT's artificial intelligence lab, become staging grounds for hackers. At first, "hacker" was a positive term for a person with a mastery of computers who could push programs beyond what they were designed to do. Early 1970s John Draper John Draper makes a long-distance call for free by blowing a precise tone into a telephone that tells the phone system to open a line. Draper discovered the whistle as a give-away in a box of children's cereal. Draper, who later earns the handle "Captain Crunch," is arrested repeatedly for phone tampering throughout the 1970s. Yippie social movement starts YIPL/TAP (Youth International Party Line/Technical Assistance Program) magazine to help phone hackers (called "phreaks") make free long-distance calls.

    60. Untitled Document
    Raccolta di una grande quantit  di pubblicazioni mondiali di hacking.
    http://hackerzine.interfree.it/

    Page 3     41-60 of 193    Back | 1  | 2  | 3  | 4  | 5  | 6  | 7  | 8  | 9  | 10  | Next 20

    free hit counter