Geometry.Net - the online learning center
Home  - Computer - Hacking
e99.com Bookstore
  
Images 
Newsgroups
Page 4     61-80 of 193    Back | 1  | 2  | 3  | 4  | 5  | 6  | 7  | 8  | 9  | 10  | Next 20

         Hacking:     more books (100)
  1. The Social Construction of What? by Ian Hacking, 2000-11-15
  2. Windows Server 2003 (Hacking Exposed) by Joel Scambray, Stuart McClure, 2006-10-27
  3. The Unofficial Guide to Ethical Hacking (Miscellaneous) by Ankit Fadia, 2002-02-02
  4. Hardware Hacking: Have Fun While Voiding Your Warranty by Joe Grand, Ryan Russell, et all 2004-01-01
  5. Handmade Electronic Music: The Art of Hardware Hacking by Nicolas Collins, 2006-04-04
  6. Hacking the IT Cube: The Information Technology Department Survival Guide by douglas Chick, 2006-01-03
  7. Hacking the PSP: Cool Hacks, Mods, and Customizations for the Sony PlayStation Portable (ExtremeTech) by Auri Rahimzadeh, 2006-10-30
  8. Hacking GPS (ExtremeTech) by Kathie Kingsley-Hughes, 2005-03-25
  9. Wi-Foo: The Secrets of Wireless Hacking by Andrew Vladimirov, Konstantin V. Gavrilenko, et all 2004-07-08
  10. Hacking the Code: ASP.NET Web Application Security by Mark Burnett, 2004-05
  11. Internet Security: Hacking, Counterhacking ,and Security
  12. Practical Hacking Techniques and Countermeasures by Mark D. Spivey, 2006-11-02
  13. Wi-Foo II: The Secrets of Wireless Hacking (2nd Edition) by Andrew Vladimirov, Konstantin V. Gavrilenko, et all 2008-07-28
  14. Mad Travelers: Reflections on the Reality of Transient Mental Illnesses by Ian Hacking, 2002-11-30

61. Kernel Hacking: An Introduction To Linux Kernel Programming
resource! The aim of this site is to Bring together into one place,the information required to get started in Linux kernel hacking.
http://www.kernelhacking.org/
Welcome!
Welcome to this Linux kernel programming resource! The aim of this site is to: If you would like to keep up to date with the latest developments (site and HOWTO updates), please subscribe to the announce only mailing list Although most of the information on the site is aimed at Linux users, a fair amount should be transferable to other open source operating systems. Feedback is very welcome; send all comments/suggestions to author (remove numbers from address). Use this public key. Thankyou to UKLINUX for hosting this site.
News
19th April 2002 We now have an announce only mailing list . If you would like to be informed when the HOWTO is updated, please subscribe to this list. 11th April 2002 HOWTO updated; largely typos, gramatical corrections. Currently I am reviewing the structure, content and aims of the document as a whole. If you are particularly interested in the development of the document I would appreciate feedback and suggestions. Older news snipped 24th May 2001 Initial design and publication.

62. Shadows Net
œbersichtliche Site ¼ber hacking mit Tutorials und Downloads.
http://www.shadowsnet.net.tc
Shadows Net
[ smartdots.com ]
P Shadows Net
[ smartdots.com ]
P

63. Kernel Hacking HOWTO
Kernel hacking HOWTO. Next. Kernel hacking HOWTO. Andrew Ebling. kh.howto@andyebling.clara.co.uk .Revision History. Revision 0.17, 20023-27, ajme.
http://www.kernelhacking.org/docs/kernelhacking-HOWTO/
Kernel Hacking HOWTO Next
Kernel Hacking HOWTO
Andrew Ebling
kh.howto@andyebling.clara.co.uk Revision History Revision 0.17 ajme Grammatical and typo corrections, plus readability enhancements. Added a note on BitKeeper. Added suggested starting points for reading kernel code. Review of structure, audience and aim of the document. Revision 0.16 ajme Complete read through following a good break, spell & grammar review, added abstract, revised Introduction and prerequisites, new email address, added some FAQs, added "Your Turn" sections. Revision 0.15 ajme Conversion to DocBook 3.1 SGML to make maintaining the glossary less time consuming, full spell check and a lot of small fixes and improvements. Revision 0.14 ajme Started glossary, lots of small fixes. Revision 0.13 ajme Added "Boot time Parameters" section in "General Hacking", CVS section added in tools chapter, "The Linux Kernel Development Cycle" section started, more URLs added and lots more small fixes. Revision 0.12

64. About Bardwell Manor Equestrian Centre.
A full service facility offering riding lessons for all ages and all levels, boarding, training, crosscountry hacking, plus shows and events year-round. Includes prices and event calendar. Located at Bardwell, near Bury St Edmunds, Suffolk.
http://www.bardwell-equestrian.co.uk
Bardwell Manor Equestrian Centre is situated just off the A143 outside of Ixworth,Suffolk.
We offer lessons for all ages and abilities and our facilities include:
  • Over 35 horses and ponies 3 full time qualified instructors An indoor school, so lessons can continue in all weathers Hacking out for experienced riders

We also hold competitions and pony days throughout the year. All our riders are encouraged to improve by tackling the Association of British Riding Schools tests, which are offered in both riding and horsecare.
Please see our events page for details of scheduled events

65. WindowsDevCenter.com: Hacking Excel, Part 1 [May. 11, 2004]
O Reilly Book Excerpts Excel Hacks hacking Excel, Part 1. RelatedReading. Excel Hacks Excel Hacks 100 IndustrialStrength Tips
http://www.windowsdevcenter.com/pub/a/windows/excerpt/excelhacks_chap05/
Sign In/My Account View Cart Articles Weblogs ... Learning Lab WindowsDevCenter
All of O'Reilly Login
Register

Manage Newsletters

Register Your Books
Windows Topics
All Articles
.NET Power User System Administration ... Wireless
Sites
LinuxDevCenter.com

MacDevCenter.com

WindowsDevCenter.com

Mozilla DevCenter
... Scripts Resource Centers Perl Java Python C/C++ ... More... Traveling to a tech show? Canada Hotels Discount Hotels Hotel Search California Hotels ... Myrtle Beach Hotels WindowsDevCenter.com supported by: Vacation Packages Discount Airfare Print Email article link ... O'Reilly Book Excerpts: Excel Hacks
Hacking Excel, Part 1
by David Hawley and Raina Hawley Editor's note: Excel Hacks offers a collection of "100 Industrial-Strength Tips and Tools" that even the most experienced Excel users may never have thought of doing. Take today's hack, for example. Excel's Chart Wizard doesn't offer a speedometer chart, so that's the end of the road, right? Not to Andy Pope, who contributed this hack to the book. Here's how to create a "speedo" chart and have fun while you're doing it. Who says you can't be creative with Excel?!
Hack #57 Create a Speedometer Chart
You can create a really impressive, workable speedometer (or "speedo") chart, complete with moving needle, by using a combination of doughnuts and pie charts. The added touch is that you can control the speedometer via a scrollbar.

66. Mac Hacker
Macintosh hacking forums from Mac OS X security, development to system modifications.
http://www.machacker.org/
Last active: Never
Not logged in [ Login Register Member List Search ... Mac Hacker
You Are Not Registered Or Not Logged In If you are not registered or logged in, you may still be able to view forums and topics, but you will not have access to your member control panel or settings
Forum: Topics: Posts Last Post: Mac Hackers Mac Security
Mac OS and Mac OS X Computer Security Information, Internet Security, Firewalls, and Programs. 28/5/2004 at 05:47 AM
by CellarDoor Mac OS X Hacks
5/6/2004 at 06:56 PM
by miSka Program Announcements
Mac hackers program announcements forum, developers and groups may announce their newly developed applications. 1/4/2004 at 10:06 PM
by nocturnity Mac Programming for Programmers RealBasic
Never Cocoa Never Carbon 4/6/2004 at 05:07 AM by nick Mac Developers for Hire - Post Project Need to Hire a Macintosh Programmers, post your Mac OS and Mac OS X project and requirements here. Never Web Programming PHP, MySQL, CFM, HTML, CGI, Perl Programming Never Mac Chit Chat Worm Hole Discussion forum for everything there is no other place to post it. 25/5/2004 at 06:26 PM by truth Apple Mac Rumors 18/5/2004 at 12:43 PM by appliancesex OS Wars!

67. Linux Netfilter Hacking HOWTO
Next Previous Contents Linux netfilter hacking HOWTO. Rusty Russelland Harald Welte, mailing list netfilter@lists.samba.org. $Revision
http://www.netfilter.org/documentation/HOWTO/netfilter-hacking-HOWTO.html
Next Previous Contents
Linux netfilter Hacking HOWTO
Rusty Russell and Harald Welte, mailing list netfilter@lists.samba.org
$Revision: 1.14 $ $Date: 2002/07/02 04:07:19 $ This document describes the netfilter architecture for Linux, how to hack it, and some of the major systems which sit on top of it, such as packet filtering, connection tracking and Network Address Translation.
Introduction

68. Shift.com - Feature - HACKING FOR DEMOCRACY
Interview with Oxblood Ruffin, founder of Hacktivismo, about the ethics of political hacking. By Mark Moyes. Shift
http://www.shift.com/print/web/396/1.html
HACKING FOR DEMOCRACY
Shift.com talks to Oxblood Ruffin, founder of Hacktivismo, about the ethics of political hacking. by mark moyes page 1   The term "hacktivism" isn't new. Neither is the concept: For the past two years in a row, hacktivists brought down the World Economic Forum site at their annual meetings; more recently, hackers targeted the Recording Industry Association of America's website after they backed a bill that would allow the RIAA to electronically disrupt peer-to-peer networks like Morpheus or KaZaA. There are literally hundreds of examples and even a website dedicated to the cause. But last month, the international hacker group Hacktivismo announced open-source tools that would take hacktivism to the next level. Their tools are designed specifically to allow residents in countries with firewalls such as China and Iran to access and transmit information. Camera/Shy, a web-based steganographic application, lets users hide digital content within an image such as text, another image, or even an mp3. Six/Four is a "stealthy" peer-to-peer protocol that allows users to fly under the radar of filtering software. Oxblood Ruffin, the founder of Hacktivismo, joked that the group was "turning the web into Drag Queens for Democracy: You know, what you see is not what you get." But it brings up interesting ethical questions: When you're preaching an essentially political message, how much responsibility do you have for people who are imprisoned for using your software? On the one hand, political bodies like the U.S. have been criticized for meddling where they don't belong; on the other hand, in times of mass genocide for example, the U.N. has been criticized for not doing enough.

69. GSM HACKING
Before you enter our site you must agree to our terms of sale by clickingthe ENTER SITE link at the foot of this page. Terms of
http://www.gsmhacking.com/
Before you enter our site you must agree to our terms of sale
by clicking the ENTER SITE link at the foot of this page.
Terms of Sale
1. We cannot take any responsability in relation to the use
of our products that may be considered illegal.
2. All Purchasers should check all relevant laws applicable
to the Area/State/Country relating to the use of the items
contained within these pages.
3. All manufactures trade names are for reference use only
and are in no way connected to our products.
4. We do not promote or endorse the illegal use of our products.

70. FAQ 4 Hackers
Een FAQ (veel gestelde vragen) over alles wat met hacking te maken heeft, opgezet door de nieuwsgroep alt.hack.nl.
http://www.faq4hackers.nl

71. Hacking Memes
hacking Memes. Contents. Humans are present only as audience or operators. .Meme hacking was limited by technology in the early days.
http://www.firstmonday.dk/issues/issue4_10/downes/
Contents
The Essence of the Meme
Advertising

The Corporate Pitch

Hyper Reality
...
The Anti-Meme
The Essence of the Meme
The concept of the meme has been working its way around the Web for a while now, instantiating itself in Wired 's regular feature, Hype List , in articles , and in general currency. As David Bennahum writes at the top of each issue of Meme , a meme is a "contagious idea that replicates like a virus, passed on from mind to mind. Memes function the same way genes and viruses do, propagating through communication networks and face-to-face contact between people." The tune you can't get out of your head, the phrase you keep using in your conversation - these are all memes, ideas which have passed from somewhere out there into your head and into your consciousness. Transference is the essence of the meme. Principia Cybernetica Web defines it as "an information pattern, held in an individual's memory, which is capable of being copied to another individual's memory." The Hacker's Dictionary defines it as "An idea considered as a replicator, esp. with the connotation that memes parasitize people into propagating them much as viruses do." The concept originates in Richard Dawkins's 1976 book The Selfish Gene.

72. Mark Dery's Pyrotechnic Insanitarium
1994.05.00
http://www.levity.com/markdery/barbie.html
Hacking Barbie's Voice Box: 'Vengeance is Mine!' New Media magazine, "Technoculture" column, May '94 issue Barbie is a voodoo doll. Enshrined in the imaginations of millions of American girls as the personification of Breck Girl good looks and prom queen popularity, she has a shoe collection Imelda Marcos would die for, and nothing but perfect hair days. The culture wars of the '90s, however, have turned her into an ideological pincushion. Some of the little girls whose hot-pink-and-turquoise-blue fantasies were filled with Barbie's dream dates and shopping sprees have grown into feminists who revile the bimbette as an embodiment of sexual stereotypes and air-headed consumerism. If this seems like a weighty burden to lay on a piece of polystyrene, bear in mind that the doll casts a long shadow over American girlhood. When Barbie speaks, little girls listen, which is why controversy erupted in 1992 when Teen Talk Barbie exclaimed, "I love shopping," "Meet me at the mall," and "Math class is tough." This last phrase struck an especially sour note, given the under-representation of women in the sciences-a state of affairs Shirley M. Tilghman argues is directly attributable to "the low expectations that our education system sets on the performance of females in physics and math." Thus, it seems inevitable that a group of feminists, anti-war advocates and culture jammers should have hacked Barbie's voice box this past December. The Manhattan-based Barbie Liberation Organization claims to have performed corrective surgery on 300 Teen Talk Barbies and Talking Duke G.I. Joes-switching their sound chips, repackaging the toys, and returning them to store shelves. Consumers reported their amazement at hearing Barbie bellow, "Eat lead, Cobra!" or "Vengeance is mine!," while Joe chirped, "Will we ever have enough clothes?" and "Let's plan our dream wedding!" A spokesman for the BLO told the New York Times, "We are trying to make a statement about the way toys can encourage negative behavior in children, particularly given rising acts of violence and sexism."

73. Technology And Pleasure
hacking is discussed in the context of being a method for system development.An hacking in the Real World. Linux is subversive. Who
http://www.firstmonday.dk/issues/issue4_2/gisle/
"Hackers" are identified as a specific subgroup of computer workers. The history of the hacker community is told. The explicit and implicit ideologies expressed through hacking is analyzed and presented. Computer artifacts of origin both inside and outside the hacker community are compared and the embedded properties of the resulting artifacts are inferred. Hacking is discussed in the context of being a method for system development. Finally, it is argued that this system development method under certain circumstances may yield superior software artifacts.
Contents
Introduction
Tinker, Taylor, Scholar, Hacker

The Hacker Community

The Hacker Ethic
...
Conclusion
Introduction
"The hacker is a person outside the system who is never excluded by its rules" (Turkle, 1984). ""Hackers" are computer aficionados who break in to corporate and government computer systems using their home computer and a telephone modem" (Meyer, 1989). The popular image of the computer hacker seems to be part compulsive programmer preferring the company of computers to people, and part criminal mastermind using his or her technical prowess to perpetrate anti-social acts. But this is at best only half the story. A number of people I know who are proud to be called "hackers" are sensitive, sharing, social and honest. Part of the confusion surrounding the word "hacker" stems from the fact that it as been applied to at least three distinct communities.

74. Http://www.veridyn.com
Network security consultants specializing in IT security assessments, policy development, and ethichal hacking.
http://www.veridyn.com
Your browser does not support javascript
© 2004 Veridyn, Inc.
Home Need for Security Services
Companies have long known that failure to properly address network security vulnerabilities can bring heavy repercussions. The dangers include not only the disclosure of confidential information, but also damage to credibility, loss of access to resources during downtime, even fines and possible jail time for absence of due care or violation of security regulations. The frequency and impact of these threats are on the rise.
  • Newly discovered operating system vulnerabilities have increased to an average of over 80 vulnerabilities per month, Security Alert Consensus report.
  • A 2003 FBI/Computer Security Institute (CSI) investigation found that 75% of surveyed companies reported security breaches for an average financial loss of over $2 million.
  • An ISCA Labs report reveals that virus outbreaks have more than tripled in the past 6 years from 32 to over 100 encounters per 1,000 machines per month. Some data puts the proportion of affected companies at 77%.

Value of Outsourcing
The range of skills required for proper security program implementation is daunting. A business could spend upwards of $750,000 per year to retain a security staff with the requisite knowledge. Trained security professionals have spent years acquiring and applying these skills. Experience with advanced security administration and proficiency in technological and regulatory advances cannot be earned overnight. Through creation of business solutions for modern industries these professionals continusously develop means to streamline security program creation while increasing integrity.

75. Underground: Hacking, Madness And Obsession On The Electronic Frontier
Underground hacking, madness and obsession on the electronic frontier by SueletteDreyfus. Tales of hacking, madness and obsession on the electronic frontier.
http://www.underground-book.com/
Tales of hacking, madness and obsession on the electronic frontier
`Gripping, eminently readable.. Dreyfus has uncovered one of this country's best kept secrets and in doing so has created a highly intense and enjoyable read' Rolling Stone
`Underground' by Suelette Dreyfus
with research by Julian Assange
475 pages with bibliography
ISBN: 1 86330 595 5
RRP $21.90 AUD (approx. $12 USD)
Published June 1997 by Random House Australia
About Underground
What the Critics say
What the Readers Say (1997 edition)
What the Readers Say (2001 edition) ...
Related articles by the Author
`I loved the book - couldnt put it down!' texasdeluxe@hotmail.com

76. News: Lindows CEO Funds Xbox Hacking Contest
Michael Robertson, CEO of Lindows.com, revealed himself as the formerly anonymous donor of $200,000 in prize money in a contest to translate Linux to Microsoft's Xbox video game console. ZDNet
http://zdnet.com.com/2100-1104-978957.html

Linux gets trial 'NX' security support

Free e-mail news alerts

Hardware
Software ... Alerts
News Software
Lindows CEO funds Xbox hacking contest

By David Becker
CNET News.com
January 2, 2003, 1:47 PM PT
Add your opinion

Forward in
Format for Michael Robertson, CEO of software company Lindows, has revealed himself as the formerly anonymous donor of $200,000 in prize money in a contest to translate the Linux operating system to Microsoft's Xbox video game console. The revelation was made in a posting earlier this week on the Xbox Linux Project site at SourceForge, a site for collaborative development of open-source software projects. Robertson disclosed his identity as the person funding the contest and extended the deadline. Robertson confirmed the SourceForge posting in an interview Thursday with CNET News.com, saying he funded the contest not for business goals but to promote open access to technology. "There is no business justification; that's not why I did it," he said. "I did it because I thought people should have the choice to run the software they want on the hardware of their choice...I don't think when you buy a car, they should be able to tell you what brand of gas to put in it." document.write('');

77. Ian Hacking
BA, British Columbia (1956); BA, Cambridge (1958); Ph.D. (1962). OfficeRm 911, 215 Huron St., 9th Fl. Ph 9784951. Field Philosophy
http://www.chass.utoronto.ca/ihpst/html/hacking.html
B.A., British Columbia (1956); B.A., Cambridge (1958); Ph.D. (1962) Office: Rm 911, 215 Huron St., 9th Fl. Ph: Field: Philosophy of science; philosophy of language, philosophy of mathematics; philosophical questions about psycho-pathology. Projects and Major Publications: Most recent books are The Social Construction of What (1999) and Mad Travellers (1998). Previoius books include Multiple Personality and the Politics of Memory Le Plus pur nominalisme (1993), about Nelson Goodman's "new riddle of induction". The Taming of Chance and The Emergence of Probability are contributions to the philosophy and history of probability. His Representing and Intervening emphasizes the role of experiment in the natural sciences. Earlier books include Why Does Language Matter to Philosophy? and Logic of Statistical Inference

78. Los Alamos Lab Employee Arrested For Alleged Hacking
CNN
http://cnn.com/2001/TECH/computing/01/11/nuclear.hacker.01.reut/index.html

79. InternetNews Realtime News For IT Managers
feeling inside my buddy list. hacking internetnews.com takes a closerlook at the world of the hacker. VoteHere Reports Network Break
http://www.internetnews.com/index.php/4381
Learn how to visualize network activity, uncover anomalous traffic and investigate breaches. Register to download this white paper from CA now. '); document.write(' '); document.write(' ');document.write(' '); document.write(' Regional News: Boston D.C. New York Silicon Valley More Tech News: Newslinx
Are your IT and business goals aligned? Find out now!
Search News Search The Web Search all of internet.com
Click Here
Be a Commerce Partner

Cheap Web Hosting

Send Flowers

Web Hosting
...
Low Cost Web Hosting

Internet Daily Boston News DC News NY News SiliconValley News
select a newsletter above, type your email and click the arrow to sign up!
DJ 30 NASDAQ Market data delayed a minimum of 15 minutes Developer Downloads International Internet Lists ... E-mail Offers Click Here Nimish Mehta, Group Vice President, Siebel This executive's challenge is convincing customers that Siebel is an integrator, not just a CRM specialist. Survey Says: Your Data is in Danger By Chris Nerney Are banks doing enough to stop hacks? What's the scope of the government's data mining projects? New survey results are troubling. Hacking internetnews.com takes a closer look at the world of the hacker.

80. Network Security Articles And Hacking Prevention Resources For The Government An
Provides computer and network security news and hacking prevention resources for the government.
http://www.governmentsecurity.org
Hacking and network security articles and hacking prevention resources for the government and general public. Covering all aspects of Computer Hacking, including tutorials and exploit downloads.
  • Network Security Jobs
  • Consultants Directory
  • E-Mail Security
  • Encryption Information ... Security from a different angle Gso Call For Papers Apr 14 2004, 05:37 PM
    GSO would like to start a newsletter/zine (all depends on how much material we get)
    So if you want to submit a paper to be included in issue #1 please send me a plain text file with the subject "Zine" to admin@governmentsecurity.org.
    Topics we would like covered
    • System Hardening Exploit Tutorials Exploit Development Your own tool or code releases Security Tool Review Political Articles on Legislature effecting the security community
    What I also need is some one that can do an ASCII art logo for GSO. PM GSecur if you can do it.
    The deadline is April 30th.
  • Page 4     61-80 of 193    Back | 1  | 2  | 3  | 4  | 5  | 6  | 7  | 8  | 9  | 10  | Next 20

    free hit counter