Geometry.Net - the online learning center
Home  - Computer - Hacking
e99.com Bookstore
  
Images 
Newsgroups
Page 5     81-100 of 193    Back | 1  | 2  | 3  | 4  | 5  | 6  | 7  | 8  | 9  | 10  | Next 20

         Hacking:     more books (100)
  1. Representing and Intervening: Introductory Topics in the Philosophy of Natural Science by Ian Hacking, 1983-11-25
  2. Hacking TiVo: The Expansion, Enhancement and Development Starter Kit with CD-ROM by Jeff Keegan, 2003-10
  3. Hacking Knoppix (ExtremeTech) by ScottGranneman, 2006-01-04
  4. Hacker's Challenge 3 (Hacking Exposed) by David Pollino, Bill Pennington, et all 2006-04-25
  5. The CEH Prep Guide: The Comprehensive Guide to Certified Ethical Hacking by Ronald L. Krutz, Russell Dean Vines, 2007-10-22
  6. Designing BSD Rootkits: An Introduction to Kernel Hacking by Joseph Kong, 2007-04-10
  7. Hacking MySpace: Mods and Customizations to make MySpace Your Space (ExtremeTech) by John Pospisil, 2006-08-28
  8. Home Hacking Projects for Geeks (Hacks) by Tony Northrup, Eric Faulkner, 2004-12-16
  9. Hacking the Future: Stories for the Flesh-Eating 90s (Culturetexts) by Arthur Kroker, Marilouise Kroker, 1996-01-15
  10. The Oracle Hacker's Handbook: Hacking and Defending Oracle by David Litchfield, 2007-01-30
  11. Web 2.0 Security - Defending AJAX, RIA, AND SOA by Shreeraj Shah, 2007-12-04
  12. Hacking MythTV (ExtremeTech) by Jarod Wilson, Ed Tittel, et all 2006-08-28
  13. The Emergence of Probability: A Philosophical Study of Early Ideas About Probability, Induction and Statistical Inference by Ian Hacking, 1984-08-31
  14. Hacking Exposed Malware & Rootkits: Malware & Rootkits Secrets & Solutions (Hacking Exposed) by Michael A. Davis, 2008-07-29

81. Hacking
What is hacking? What is hacking? The definitive source for the answer to thisquestion is the The Meaning of `Hack section of The New Hackers Dictionary.
http://web.demigod.org/~zak/geek/hack.shtml
Contents
This page contains the following:
Care and Feeding
The following list is an attempt to cover some of the issues that will invariably come up when people without previous experience of the hacker community try to hire a hacker. This FAQ is intended for free distribution, and may be copied as desired. It is in an early revision. If you wish to modify the FAQ, or distribute it for publication, please contact the author. The author is seebs@plethora.net . The official distribution site (as of revision 0.05) is " http://www.plethora.net/~seebs/faqs/hacker.html ". If you find this information useful, please consider sending a token donation to the author; email for details. Revision 0.05 - Last modified September 28, 1999
Questions and Answers:
Section 0: Basic understanding.
0.0: Won't my hacker break into my computer and steal my trade secrets?
No. Hackers aren't, contrary to media reporting, the people who break into computers. Those are crackers. Hackers are people who enjoy playing with computers. Your hacker may occasionally circumvent security measures, but this is not malicious; she just does it when the security is in her way, or because she's curious.

82. Your Spectrum 09 - Frontlines & Hacking Away
POKEs that simplify the Nightmare Room, improve jumping ability, and that automatically collect all the objects in a room on entry.
http://www.users.globalnet.co.uk/~jg27paw4/yr09/yr09_03.htm
Your Spectrum
Home
Contents KwikPik DOUBLE CHIPS FIRST FORTH ON ROM FOR CURRAH ANIROG DELETE SPECTRUM BBC Radio kicks off with a double-helping of computing this Autumn with Barry Norman re-opening The Chip Shop on Radio 4 and Radio 1 listeners getting their own computer show with the launch of Radio l's Chip Shop which makes up part of the Saturday morning Mark Page Show
The Radio 1 Chip Shop will be broadcast at 7:33 am on Saturday morning, starting on September 29th and will be presented by David Freeman. Free Basicode software will be broadcast on Sunday morning at 5:55am and repeated at the same time on Saturdays. You'll need a Basicode Kit 2 Cater Road, Bristol B513 7TW
If you really can't stand the thought of getting up so early on a Saturday morning, you could always tune into The Chip Shop on Radio 4 at the slightly more reasonable time of 4:15pm though you won't get the software.
Barry Norman broadcast his second show of the series 'live' from the PCW Show on September 22nd this year. Currah, manufacturers of the MicroSpeech unit, has announced a new product to be available from them ... 'soon'.

83. Hacking Ball Z : Programas,php,tecnología,anónimo,linux,gratis
Translate this page Domingo, 23 de Mayo de 2004. Atlas IP. Correo Anónimo. Descargas. » Linux.» Palm Os. » Windows. Comandos Linux/Unix. (nuevo) Clipart gratuito (nuevo).
http://www.hackingballz.com/
Domingo, 06 de Junio de 2004 Atlas IP Descargas Comandos Linux/Unix (nuevo) ... Manual de PHP Quices PHP ...que tan gurú? ASP: ¿Eres Bill G. II? ¡JavaScript te reta! Perl, you are ready? ...
¿A dónde? Depende de la versión.
(JavaScript) Desarrollado por Larry Hans Arroyo Vargas , el 03/06/2004 - 28 lecturas
Creando un simple "rollover"
(JavaScript) Una tarea tan común en el desarrollo cotidiano de sitios web, que durante mucho tiempo sea omitido comentar; esto quizás por las opciones que brindan los editores HTML... No obstante; acá les dejamos el código. Desarrollado por Larry Hans Arroyo Vargas , el 02/06/2004 - 58 lecturas
Contador de visitas sin cookies
(PHP) Un útil contador de visitas escrito en PHP y MySQL que corrobora el IP del usuario para no contar la visita más de una vez. Desarrollado por Roberto F. , el 01/06/2004 - 147 lecturas
Desabilitando el clic derecho
(JavaScript) Nuestro estimado miembro Ivan Treguear, nos comenta como en su sitio web consigue desabilitar el click derecho del mouse para ayudar a la protección de sus contenidos.

84. CNN.com - Technology - Brazil, NASA Sites Under Attack In International Hacking
CNN
http://www.cnn.com/2000/TECH/computing/03/17/brazil.nasa.hackers/index.html
technology > computing Editions myCNN ... Feedback
CNN Sites CNN CNN Europe CNNfn CNNSI myCNN CNNfyi AllPolitics Languages
Search
CNN.com CNNSI.com CNNfn.com The Web
TECHNOLOGY

TOP STORIES
Consumer group: Online privacy protections fall short

Guide to a wired Super Bowl

Debate opens on making e-commerce law consistent

MORE

TOP STORIES More than 11,000 killed in India quake Mideast negotiators want to continue talks after Israeli elections MORE BUSINESS ... MORE MARKETS 4:30pm ET, 4/16 DJIA NAS SPORTS Jordan says farewell for the third time ... LOCAL EDITIONS: CNN.com Europe change default edition MULTIMEDIA: video video archive audio multimedia showcase ... more services E-MAIL: Subscribe to one of our news e-mail lists Enter your address: DISCUSSION: chat feedback CNN WEB SITES: CNNfyi.com CNN.com Europe AsiaNow Spanish ... Korean Headlines TIME INC. SITES: Go To ... Time.com People Money Fortune EW CNN NETWORKS: CNN anchors transcripts Turner distribution SITE INFO: help contents search ad info ... jobs WEB SERVICES: Main Page Bracing for Cyberwar Hacking Primer Scenes from the 'Hacker Underground' ... Related Sites
Brazil, NASA sites under attack in international hacking volley
March 17, 2000

85. HACKERS HOME PAGE-computer Hacking, Phreaking, Gambling Hacking, Hack, Smart Car
hackers, hacking, phreaks, phreaker, phreaking, freaking, red boxing, phrack, phracker,phracking, fracking, red box, lock picking, cracking, spying, warez
http://www.hackershomepage.com/
hackers, hacking, phreaks, phreaker, phreaking, freaking, red boxing, phrack, phracker, phracking, fracking, red box, lock picking, cracking, spying, warez, viruses, virus, virii, manuals, plans, kits, how to, how-to, DIY, do it yourself, Direct TV, Sega, Genesis, Playstation, games, espionage, bugs, counter measures, cable tv hacking, money, profit, cable tv test chips, red box, computer hacking, cable tv converter boxes, booksellers, dss, technibooks, warez, technical, satellite, videocipher, smartcard, chip, anarchy, computer, communications, cdrom, filez, files, credit cards, cracking, crypto, electronics, phreaking, cellular, telephone, decoder, descrambler, wireless, ecm, pirate, filters, esn, nam, reprogramming, programming, telecode, scanner, security, hacker, cracker, wireless, crypto, digital, communication, scam, scamming.
Welcome to The Hackers Home Page
Please turn frames on in your browser in order to view our site properly. Thank you.

86. Teen Given Six Months For Hacking NASA, Pentagon Computers
CNN
http://www.cnn.com/2000/LAW/09/22/comradehacker.ap/index.html

87. Hacking And Hackers - Computer Security Programs Downloading Search Engines Port
Computer security,hacking,hacker,crackers,cracks,serials,crack,serial,search engines,searchengine,search,virus,virii,webpages,downloads,programs,files,links
http://www.infosyssec.com/
security security news virus news hacking news hacker trojan underground headlines newsticker security news antivirus exploit denial of service DDoS advisories trojan backdoor sniffer smurfwindows securityXP security security products security books security tips security faq authentication computer security crack crackers crash cryptography denial of service DOS email virus alerts encrypting file system encryption exploits firewall firewalls hack hacks hack files hack links hacked webpages hacker hackers hacking hacking files hacking links hot fixes icmp intruder intrusion detection news ip spoof Kerberos key logger logon microsoft security NT nt security nt server ntsecurity ntshop password password crackers patches permssions phreaking boxes port monitors proxy proxy servers secure security security news security firewalls cryptography vulnerabilities vulnerability news encrypting file system hotfixes authentication password permissions proxy servers antivirus virus system policies smart cards smart cards source route spoofing syn flood system policies texts virii virus viruses vulnerabilities vulnerability wardialers win2k sec win2k security win2k sec windows 2000 security windows 2000 windows windows NT windows nt security

88. CNN - Hacking Group Reveals IP-security Glitch - August 13, 1999
CNN
http://www.cnn.com/TECH/computing/9908/13/ipglitch.idg/index.html
[an error occurred while processing this directive]
MAIN PAGE
WORLD ASIANOW U.S. ... news quiz
CNN WEB SITES: TIME INC. SITES: Go To ... Time.com People Money Fortune EW MORE SERVICES: video on demand video archive audio on demand news email services ...
pagenet

DISCUSSION: message boards chat feedback
SITE GUIDES: help contents search
FASTER ACCESS: europe japan
WEB SERVICES:
Main Page
Bracing for Cyberwar Hacking Primer Scenes from the 'Hacker Underground' ...
From...
Hacking group reveals IP-security glitch
August 13, 1999

Web posted at: 1:50 p.m. EDT (1750 GMT)
by Kathleen Ohlson ALSO: Hackers, IT consultants embrace free security tool Hacking your way to an IT career (IDG) A hacking group says it's discovered a security vulnerability affecting Windows 95, 98 and 2000 as well as the SunOS and Solaris operating systems, allowing unauthorized users to intercept outgoing information. The problem is related to the ICMP (Internet Control Message Protocol) Router Discovery Protocol (IRDF), which determines the way computers connect to the Internet. The glitch lets an attacker spoof a route, according to an advisory issued Wednesday by hacker-security specialists L0pht Heavy Industries (link below). As a result, attackers can reroute outbound traffic on vulnerable systems; modify traffic; act as "man in the middle;" or launch denial of service attacks, L0pht said. All of these attacks, excluding denial of service, require the unauthorized user to be on the same network as the victim, the specialists said. Man-in-the-middle attacks occur when an attacker acts as "a proxy between the victim and end host," L0pht said. The victims think they are directly connected to the end host, but they are actually connected to the attacker, who is connected to the end host feeding information through. For example, an attacker acting as man in the middle may access all banking information online without the victim knowing, L0pht said.

89. How To Become A Hacker
hacker. Otherwise you ll find your hacking energy is sapped by distractionslike sex, money, and social approval. hacker. Basic hacking Skills.
http://www.catb.org/~esr/faqs/hacker-howto.html
How To Become A Hacker
Eric Steven Raymond
Thyrsus Enterprises
esr@thyrsus.com

Revision History Revision 1.25 2 Jun 2004 esr New translations. Revision 1.24 20 Jan 2004 esr Belatedly take notice, in the first paragraph, that this document has become authoritative for a lot of people. Table of Contents
Why This Document? What Is a Hacker? The Hacker Attitude
1. The world is full of fascinating problems waiting to be solved. ... Frequently Asked Questions
Why This Document?
As editor of the Jargon File and author of a few other well-known documents of similar nature, I often get email requests from enthusiastic network newbies asking (in effect) "how can I learn to be a wizardly hacker?". Back in 1996 I noticed that there didn't seem to be any other FAQs or web documents that addressed this vital question, so I started this one. A lot of people now consider it definitive, and I suppose that means it is. Still, I don't claim to be the exclusive authority on this topic; if you don't like what you read here, write your own. If you are reading a snapshot of this document offline, the current version lives at

90. E-Newz.co.uk
News on hacking and cracking and other information on all related things here.
http://www.e-newz.co.uk/
E-Newz.co.uk E-Newz.co.uk

91. XML.com: Hacking The Library [Mar. 15, 2004]
XSLT Recipe of the Day Manage Your Account Forgot Your Password? Search ArticleArchive. Add XML to your Website taglines/ Dive into XML hacking the Library
http://www.xml.com/pub/at/30

Resources
Buyer's Guide Newsletter Safari Bookshelf Download Stylus Studio - The World's Best XML Editor
Business
Databases Graphics ... Scripts
Traveling to a Tech Show?
New York City Hotels

Canada Hotels

Chicago Hotels

Hotel Discounts
...
Hotel Rooms

XML.com
supported by: Debt Consolidation Loans Home Refinance Kendall Clark tries to figure out if he can make the librarians and the geeks happy at the same time. Putting ISBNs to Work By Kendall Grant Clark Continuing his "Hacking the Library" series, Kendall Clark starts the implementation of a web service tool to retrieve Library of Congress identifiers given the ISBN of a book. [Jun. 2, 2004] Six Steps to LCC@Home By Kendall Grant Clark Continuing "Hacking the Library", Kendall Clark shows how to use the Library of Congress Classification on your own book collection. [Apr. 28, 2004] The Library of Congress Comes Home By Kendall Grant Clark Embarking on his journey to organize our media collections, Kendall Clark explains how the Library of Congress classification system can be brought into our homes. [Mar. 17, 2004]

92. La Web Del PutoAmo
Manuales de hacking y troyanos.
http://www.putoamo.host.sk
if(principal==1)document.write(''); else document.write(''); ENTRAR SALIR
Cargando ... Por favor Espere...

93. XML.com: Geeks And The Dijalog Lifestyle [Feb. 18, 2004]
To that end, today Kendall Clark begins a new column, hacking the Library , whichwill focus on problems of personal information, especially those related to
http://www.xml.com/pub/a/2004/02/18/dijalog.html

Resources
Buyer's Guide Newsletter Safari Bookshelf Download Stylus Studio - The World's Best XML Editor
Business
Databases Graphics ... Scripts
Traveling to a Tech Show?
New York City Hotels

Canada Hotels

Chicago Hotels

Hotel Discounts
...
Hotel Rooms

XML.com
supported by: Debt Consolidation Loans Home Refinance Print Email article link ... Discuss
Geeks and the Dijalog Lifestyle
by Kendall Grant Clark February 18, 2004 Editor's Note: XML is well on its way to becoming a mature, ubiquitous technology. The pace of standardization has not slowed, but the time where applications took a back seat to new core technologies is coming to an end. At XML.com we want to focus more on the application space, particularly personal information management, a vibrant area of XML application development. To that end, today Kendall Clark begins a new column, "Hacking the Library" , which will focus on problems of personal information, especially those related to the digital media lifestyle. So you read XML.com, which makes you at least a beta, if not an alpha geek. You've dabbled in information architecture, plumbed the mysteries of HTTP content negotiation algorithms, bobbed-and-weaved through the arcaneries of W3C XML Schema, RELAX NG, and even a bit of RDF. Chances are good then that you are living, to some greater or lesser degree, what the tech punditry likes to call the "digital media lifestyle". Your disks are awash with MP3; the artifacts of your digicam-embellished vacations; hundreds of video clips taken from the Web; GarageBand tracks finished and half-finished; and that 7-minute movie you made with friends in Prague last year... you know the one.

94. Kuht.it :: Stage .08 - Serving The Hacking Community Since 1999
Comunit  underground italiana con tematiche computing, ethical hacking, security, networking, coding.
http://www.kuht.it
Kuht Network www.kuht.it softwarelibero.kuht.it Nickname: Password: Registrati Perso la password? Home Page Forums Topics più recenti Topics più letti Topics più attivi IRC Chat News Archivio Topics MediaWatch Più visitati Più votati Downloads Più scaricati Più votati Links Più visitati Più votati Sondaggi Kuht Quiz MD5 Finder Tutorials ... Mappa Software Visualizza Lista Per Categoria Code Snippets Nuovi Pacchetti Bacheca Annunci Help Nuovi Progetti Simple Terrain Viewer Themice Z80 Disassembler BeBoP EightCentimeters jkDC-GUI Py-Tone doxa
Il Passato
Il Presente FAQ Changelog ... About Contact Policy Network Status
Benvenuto/a in kuht.it stage .08 Il gruppo kuht nasce nell'anno 1999 con l'obiettivo di ridare il giusto valore e significato a termini che spesso, ormai normalmente, sentiamo ogni giorno; termini quali 'hacker', 'hacking', 'crackers', 'white hat', 'black hat' e molti altri.
Oltre a questo kuht è anche un team di ricerca e sviluppo: abbiamo costruito una community per condividere i risultati delle nostre ricerche, per dare consigli, per mettere in piedi un luogo telematico in cui poter discutere di computing senza limiti e soprattutto per imparare gli uni dagli altri.
Per portare avanti tutto questo non abbiamo mai avuto qualcuno che abbia pagato le risorse necessarie per mantenerlo, ma ci siamo autofinanziati a lungo tempo, ad ulteriore dimostrazione di quanto security, networking, coding, ricerca ed etica siano tematiche che ci stanno particolarmente a cuore.

95. Is The RIAA "hacking You Back"? | The Register
Is the RIAA hacking you back ? By Andrew Orlowski in San Francisco.Published Tuesday 14th January 2003 0031 GMT. The RIAA is preparing
http://www.theregister.co.uk/2003/01/14/is_the_riaa_hacking_you/
Skip to content SetUpDropMenu('StoreMenuItem', 'StoreMenu'); Biting the hand that feeds IT
Internet:
Search
SetPromptText('q', 'Search');
Tools/Services
  • The Register Mobile Desktop News Panel Newsletter Reader Studies ... Internet and Law
    Is the RIAA "hacking you back"?
    By Andrew Orlowski in San Francisco Published Tuesday 14th January 2003 00:31 GMT The RIAA is preparing to infect MP3 files in order to audit and eventually disable file swapping, according to a startling claim by hacker group Gobbles. In a posting to the Bugtraq mailing list, Gobbles himself claims to have offered his code to the RIAA, creating a monitoring "hydra". "Several months ago, GOBBLES Security was recruited by the RIAA (riaa.org) to invent, create, and finally deploy the future of antipiracy tools. We focused on creating virii/worm hybrids to infect and spread over p2p nets," writes Gobbles. "Until we became RIAA contracters [sic], the best they could do was to passively monitor traffic. Our contributions to the RIAA have given them the power to actively control the majority of hosts using these networks."

96. Kid2elite.de.vu - Security / Hacking / Cracking - Projekt
Tutorials zu hacking, Cracking und Programmieren sowie Downloads ein Forum und den Newsletter.
http://invincible4ever.oldgods.de/indexgeo.php
Kid2elite - Projekt 2004
News 02.06.2004 von thE_iNviNciblE Hallo,
heute hab ich mal wieder die Datenbank ein bißchen aufgeräumt!
Desweiteren möchte ich mich bei allen Leuten entschuldigen die sich auf den Schlips getretten fühlen, weil ihr Text auf dieser Seite auftaucht.
Meine Seite / ich habe meine Seite als eine Art Informationsbündlung betrachtet und versuche ein möglichst breites Spektrum zu erreichen!
Planung:
- Es wird in naher Zukunft unter Jedem neuen tutorial eine Quellen angabe geben.
Entschuldigung an hohf - Wer eine Diskussion verfolgen möchte kann sich unter diesem Link mitverfolgen!
News Archiv: ältere News
-Ihr akzeptiert den Haftungsausschluss sobald ihr einen Link im Menü anklickt!
Kid2elite Projekt in Zahlen - Auf meiner Webseite befinden sich : 541 Tutorials beiten Spektrum an Themen - All diese Tutorials sind 289639 geklickt gelesen worden. - Desweitern befinden sich : 427/(1) Downloads auf dieser Webseite. - Unglaublich aber : 774.9169 MB Downloads. sind verfügbar - Traffic durch Downloads : 156896.5187 MB.

97. PI - Incontro Su Hacking@scuola
hacking@scuola, cartuccecompatibili e originali. Incontro su hacking@scuola 8 giugno.
http://punto-informatico.it/p.asp?i=48275

98. Bentley House Stables, Horse Livery Yard In Staffordshire
A small full service facility located in the Staffordshire Moorlands offering specialist care and full livery, indoor and outdoor riding arenas, and crosscountry hacking. Includes photos and summary of facilities and services and directions.
http://www.bentleyhouse.co.uk/
Our web site was last significantly updated 07-04-2004 livery for special horses - 01782 517921 Our service Biddulph Park webcam - Customer information - New school - ... Check for vacancies Bentley House Stables is the intelligent choice for the discerning equestrian. We offer a higher standard of livery care on our peaceful stable-yard, conveniently located between Manchester and Stoke-on-Trent. See how we achieve this at our exclusive new purpose built facility through: - Our large traditional stables and new Olympic spec arena - Permanent 24 hour 7 day on-site BHS qualified staff All year turn out on safe, clean and secure paddocks - Grass Jumping paddock now open and available to hire To find out more click on the topics above
As featured on BBC Radio Stoke British Eventing calendar 2004
var test=0; document.write("<");document.write("! "); document.write(" ");document.write(">");

99. Hacking Garmin ETrex GPS Receiver
Date Wed, 1 Aug 2001 180159 +0800 From Mark Joss mjoss@iinet.net.au To mast@nomad.ee G day, I found your hacking Etrex site to be very helpful but
http://www.nomad.ee/micros/etrex.shtml
Garmin eTrex GPS receiver is a cute little thing that does not cost you a fortune. Although it does not have a scrolling map (unless you have one of those newer, more expensive models), and offers somewhat limited functionality compared to more expensive models, but it has a connector for attaching it to serial port of your PC or laptop. So, the connector: Data in and data out are RS232 compatible signals for talking to GPS. eTrex knows several protocols, including generic NMEA and Garmin proprietary protocol that can be used to upload/download waypoints, tracks and routes. eTrex also has a firmware in FLASH, so you can update it over the serial cable, too. Power terminal is for attaching external power supply. eTrex needs 3V DC (specified maximum is 3.15V) and is smart enough to detect that the external power is available. You can leave batteries in the device, these also serve as backup if you accidentally pull the plug or something. My cheap DVM shows that eTrex takes 110..130mA from batteries discharged to 2.5V while scanning, and up to whopping 180 mA while scanning with backlight on.
The cable
eTrex uses a proprietary connector, and Garmin will not sell you just the plain connector. You can only buy ready-made cables from them. There are third-party connectors available, appropriately called

100. Hacktivists Or Cyberterrorists? The Changing Media Discourse On Hacking
This paper scrutinizes the language of government reports and news media sources to shed light on their role in forming a negative image of politically motivated hacking in general, and online political activism, in particular. It is argued that the mass media's portrayal of hacking conveniently fits the elite's strategy to form a popular consensus in a way that supports the elite's crusade under different pretexts to eradicate hacking, an activity that may potentially threaten the dominant order. First Monday
http://www.firstmonday.dk/issues/issue7_10/vegh/index.html
Hacktivists or Cyberterrorists? The Changing Media Discourse on Hacking by Sandor Vegh
This paper scrutinizes the language of government reports and news media sources to shed light on their role in forming a negative image of politically motivated hacking in general, and online political activism, in particular. It is argued that the mass media's portrayal of hacking conveniently fits the elite's strategy to form a popular consensus in a way that supports the elite's crusade under different pretexts to eradicate hacking, an activity that may potentially threaten the dominant order.
Contents
Introduction
Discourse on hacktivism

The media's role

Conclusion
Introduction
Especially after September 11, the national debate on the security of cyberspace has intensified. It has negatively influenced movements that rely on hacking (like hacktivism), or other anti-hegemonic forms of Internet use, such as free access, open source, or privacy protection. Hackers and online political activists are now forced to defend themselves against being labeled by the authorities as cyberterrorists. Restrictive legislation can more easily be passed with public support that increases under a perceived threat, and thus justifies lending more power to the government. Because of the sensationalist nature of hacking, the media is a willing partner of the government in vilifying hackers and hacktivists, and even blaming the Internet as a terrorist territory. Whether intentionally influenced or not, the mass media's portrayal of hacking conveniently fits the elite's strategy to form a popular consensus in a way that supports the elite's crusade under different pretexts to eradicate hacking, an activity that may potentially threaten the dominant order. While the focus is on hackers, several related issues are touched upon, such as encryption, surveillance, censorship, and privacy, which are also key to digital resistance. As such, we see a great effort on the part of the government to control these technologies and forms of online dissent.

Page 5     81-100 of 193    Back | 1  | 2  | 3  | 4  | 5  | 6  | 7  | 8  | 9  | 10  | Next 20

free hit counter