Geometry.Net - the online learning center
Home  - Computer - Hacking
e99.com Bookstore
  
Images 
Newsgroups
Page 6     101-120 of 193    Back | 1  | 2  | 3  | 4  | 5  | 6  | 7  | 8  | 9  | 10  | Next 20

         Hacking:     more books (100)
  1. Hacking Cyberspace by David J. Gunkel, 2001-02-15
  2. Hacking a Terror Network: The Silent Threat of Covert Channels by Russ Rogers, 2005-01-27
  3. Game Console Hacking: Having Fun While Voiding Your Warranty by Joe Grand, Albert Yarusso, et all 2004-12-31
  4. Hacking Mac OS X Tiger : Serious Hacks, Mods and Customizations by Scott Knaster, 2005-07-14
  5. Wireless Hacking: Projects for Wi-Fi Enthusiasts by Lee Barken, Eric Bermel, et all 2004-10-01
  6. Every Woman's Nightmare: The True Story Of The Fairy-Tale Marriage And Brutal Murder Of Lori Hacking by Steven Long, 2006-04-04
  7. Hacking VoIP by Himanshu Dwivedi, 2008-03-21
  8. Hacking Matter: Levitating Chairs, Quantum Mirages, and the Infinite Weirdness of Programmable Atoms by Wil McCarthy, 2004-04
  9. Hacking GoogleMaps and GoogleEarth (ExtremeTech) by Martin C. Brown, 2006-07-24
  10. Hacking Mobile Phones by Ankit Fadia, 2005-12-07
  11. Code Hacking: A Developer's Guide To Network Security (Networking Series) by Richard Conway, Julian Cordingley, 2004-05
  12. Hacking the TiVo, 2nd Edition by William von Hagen, 2004-07-31
  13. Hacking GMail (ExtremeTech) by Ben Hammersley, 2005-12-19
  14. Linksys WRT54G Ultimate Hacking by Paul Asadoorian, Larry Pesce, 2007-05-15

101. The Complete History Of The Internet And Hacking
updated may 18th 2004. WBG Links home The Complete History of the Internet hacking Maybe not the complete history but a valid attempt.
http://www.wbglinks.net/pages/history/
updated may 24th 2004
Maybe not the complete
never be obtainable since so much of the history is fragmented, unfounded and unreported.
This will not be a complete list but a work in progress. Enjoy.
[1947 Dec 23] The first transistor is placed on display, consisting of a crude looking collection of wires, insulators, and germanium, at Bell Labs by William Shockley and his research team of John Bardeen and Walter Houser Brattain
[1958] The Defense Advanced Research Projects Agency (DARPA) was established as the first U.S. response to the Soviet Union launching of Sputnik
[1960 Nov] Telephone calls are switched for the first time by computer.
Dartmouth College
located in Hanover, New Hampshire incorporates the introduction to the use of computers as a regular part of the Liberal Arts Program.
ASCII
(American Standard Code for Information Interchange) is created, permitting machines from different manufacturers to exchange data. ASCII consists of 128 unique strings of ones and zeros.
[1964] There are approximately 18,200 computer systems in the United States . Over 70% of those computers were manufactured by International Business Machines (IBM).

102. PERSEUS BOOKS GROUP - Search Results - Hacking Matter
Brief description, link to related science books. Basic/Perseus Books
http://www.perseusbooksgroup.com/perseus-cgi-bin/display/0-465-04428-X
Search by author, title, or keyword Browse by Discipline: American Government Agriculture Anthropology Area Studies Arts Asia Studies Business/Economics Communications Cultural Studies Education Environmental Studies Europe and Russia Fiction and Poetry Film/TV/Media Gender Studies General Interest Geography Health/Health Care History International Relations Language/Literature Latin America Law Middle East Studies Music Parenting/Child Care Philosophy Politics Psychology Public Policy Reference Religion Science Sociology
Hacking Matter
Invisble Clothes, Levitating Chairs, And The Ultimate Killer App

by Wil McCarthy Hardcover
Availability Date:

Available
Retail Price:
Basic Books

ISBN: 0-465-04428-X
Reviews
"Whether explaining how Renaissance glassblowers in Italy and Germany accidentally created the first quantum dots, or cheerfully refreshing our understanding of the laws of thermodynamics, [McCarthy] has a knack for expounding hard science in layman's terms. ... interested nonspecialists ought to find this book accessible and informative." San Francisco Chronicle "McCarthy employs a soothing narrative manner that draws reads into the story; even when the science gets tough to digest, there's enough "fiction"freewheeling speculationto keep you going…. Throughout, McCarthy describes the phenomenon of programmable matter as a kind of magic. His knack for describing it is magical in itself."

103. Hacking The TiVo FAQ Wizard 1.0.3
hacking The TiVo FAQ Wizard 1.0.3. Search the hacking The TiVo FAQSimple sensitive. Other forms of hacking The TiVo FAQ access
http://tivo.samba.org/
Hacking The TiVo FAQ Wizard 1.0.3
Search the Hacking The TiVo FAQ:
Simple string / Regular expression /
Keywords (any) / Keywords (all)
Fold case / Case sensitive
Other forms of Hacking The TiVo FAQ access:

104. CableCrypt, Free Pay Tv On Your Pc
Een verzameling van teksten over hacking en phreaking.
http://www.com-crime.net/
Welcome to cablecrypt.org
On this website you will find all the info about the cablecrypt decoder, links, and downloads and you can discuss about the decoder in the forum.
with the cablecrypt decoder you can decrypt the encrypted pay channels like canal+.

105. The Whole Hacking The TiVo FAQ
The Whole hacking The TiVo FAQ. Last changed on Fri May 16 1708542003 GMT 1.2. Where can I get the latest TiVo hacking files?
http://tivo.samba.org/index.cgi?req=all

106. Brillo Magazine, Number 1, "Armed And Dangerous". Extra Abrasive. Brillo's Inter
Interview with the BLO about boy games, media and intervention, oneliners, fear, and some lessons and tactics they've learned that could be of help to other activists.
http://www.brillomag.net/No1/blo.htm
Hacking Barbie with
The Barbie Liberation Organization is an amorphous group of activists and media intervention superstars, whose most famous action involved switching the voice boxes in 300 Talking Barbie dolls and Talking G.I. Joe dolls during the Christmas season of 1989. The goal of the action was to reveal and correct the problem of gender-based stereotyping in children's toys. The "corrected" G.I. Joe doll said things like "I love school. Don't you?" and "Let's sing with the band tonight." The "liberated" Barbie said, and I particularly like this one, "Dead men tell no lies." The mainstream media, after some prodding, latched on and a legend was born which continues to be retold, recreated and augmented to this day. (You've all heard of Hacker Barbie, right?) Melinda, Igor and I talked about boy games media and intervention one-liners fear , and some lessons and tactics they've learned that can be of help to other activists. VE: With this first issue of Brillo , what we're tackling is the cultural paradigms that exclude white women and people of color from the tools of cultural production: especially the media and especially new technology.

107. Garmin Hacking Project
Garmin hacking Project. If you don t want to pay Garmin for their expensiveconnector for the GPS38/40/45/90 then check out the first
http://www.abnormal.com/~thogard/gps/grmnhack.html
Garmin Hacking Project
If you don't want to pay Garmin for their expensive connector for the GPS38/40/45/90 then check out the first sharehardware project for a low cost connector from the Open Project. The GPS45 has a 90.0022kt (104mph) speed limit. It was our intent to find a way arround this. It is also our intent to publish full details on the Garmin Protocol Garmin Protocol (John F. Waers' version) Garmin Protocol (Bill Soley's version) Tom's photo GPS40 GIF format Bob's GPS45 Internal photos PCBoard (65K) Backside of the display (28K) The ROM is the chip on the bottom right side. Its left side is next to the three verticel bands. The area to the left is where the keypad makes contact. The LCD is the blue rectangle on the top and the backlight is white and on the right.

108. LAN Security Audit - Network Penetration Testing And Vulnerability Assessments
Offering ethical hacking, penetration testing, and internal policy reviews.
http://lansecurityaudit.com
Professional Penetration Testing and Vulnerability Assessments.
LAN Security Audit provides companies protecting proprietary information a cost effective way to determine security vulnerabilities on their network.
There are numerous available utilities, loopholes and methods that are increasingly utilized by any companies own employees. LAN Security Audit can sufficiently reduce this risk by performing a Penetration test of the Logical Network, (Including both wired and Wireless networks) any physical location/s and the staff practices and IT policies and procedures. The results can then be taken by both Executive management and Technical staff for review and remediation of the identified vulnerabilities to the infrastructure. The average security audit of a medium size network, (80-300 nodes) takes ten working days, the amount of networked devices dictate the granularity of the final results.
Normally we would spend around eight hours of each day on-site setting up many different scans, pings, enumeration attempts, scripts and searches. LAN Security Audit Assesses your risk from "hackers" (more correctly labeled, "Crackers", and more commonly, "script kiddies") although we tend to find that most dubious computer activity is usually practiced by an organization's own internal users or employees, including violations of your internal computer usage policies, for example, cached pornography, online chatting, attempting access leverage to restricted information, etc.  Even if there are no policies in place where you require our services, the information in our final report and closing presentations can still be very informative.

109. =-= Hacking Library =-=
The NTLDR hacking Guide by Jason C. LockeThe NTLDR hacking Guide by Jason C. Locke. The NTLDR hacking Guide byJason C. Locke Version 1.4 Last Modified September 15, 1996.
http://www.library.2ya.com/
Hacking news,tools Downloads,trojans,nukers,flooders,viruses,builders,firewalls,antiviruses,ip scanners for all your hacker needs!
Your browser does not support frames.
Please click here: =-= Hacking Library =-= Get free sub domain URL forwarding for your site, with no ads at: ShortURL.com
Or visit 2Ya.com for free domain forwarding and email forwarding services.

110. USATODAY.com - Maker Of Lindows Laughs At Face Of Danger (and Microsoft)
Robertson started a firm competing against Microsoft Windows in the PC OS market, named his cheap OS and firm Lindows (one letter different), and to ensure Microsoft hates him, has a $200,000 reward for anyone hacking Xbox. USA Today
http://www.usatoday.com/money/industries/technology/maney/2003-02-25-maney_x.htm
Click Here Cars Jobs Franchises Business Opportunities ... Weather Markets Markets home World stocks Commodities Currencies ... Key interest rates Investor Tools Investor home Markets Report Your Portfolio Stock screener ... Company calendar Managing Money News/columns/tips Calculators CD and loan rates Special Sections Small Business More Money Money briefs Most active stocks Talk Today
Click here to get the Daily Briefing in your inbox
Posted 2/25/2003 11:34 PM Updated 2/26/2003 12:44 AM Click Here Maker of Lindows laughs at face of danger (and Microsoft) You don't tug on Superman's cape./ You don't spit into the wind./ You don't pull the mask off the old Lone Ranger./ And you don't mess around with ... Microsoft. Robertson's firm makes a cheap operating system that's a mix of Linux and Windows. Michael Robertson has a software glitch in his belfry. He's a crazy man. Certifiable. And God bless him for it. Maybe he'll finally give the technology industry some spine when it comes to going up against Microsoft. That, or he is tech's Chuck "The Bayonne Bleeder" Wepner, about to get turned into goulash by the Muhammad Ali of software.

111. On Hacking - Richard Stallman
On hacking. In June 2000, while immediately recognized. Playfully doingsomething difficult, whether useful or not, that is hacking. I later
http://www.stallman.org/articles/on-hacking.html
On Hacking
In June 2000, while visiting Korea, I did a fun hack that clearly illustrates the original and true meaning of the word "hacker". I went to lunch with some GNU fans, and was sitting down to eat some tteokpaekki , when a waitress set down six chopsticks right in front of me. It occurred to me that perhaps these were meant for three people, but it was more amusing to imagine that I was supposed to use all six. I did not know any way to do that, so I realized that if I could come up with a way, it would be a hack. I started thinking. After a few seconds I had an idea. First I used my left hand to put three chopsticks into my right hand. That was not so hard, though I had to figure out where to put them so that I could control them individually. Then I used my right hand to put the other three chopsticks into my left hand. That was hard, since I had to keep the three chopsticks already in my right hand from falling out. After a couple of tries I got it done. Then I had to figure out how to use the six chopsticks. That was harder. I did not manage well with the left hand, but I succeeded in manipulating all three in the right hand. After a couple of minutes of practice and adjustment, I managed to pick up a piece of food using three sticks converging on it from three different directions, and put it in my mouth. It didn't become easyfor practical purposes, using two chopsticks is completely superior. But precisely because using three in one hand is hard and ordinarily never thought of, it has "hack value", as my lunch companions immediately recognized. Playfully doing something difficult, whether useful or not, that is hacking.

112. Los Alamos Lab Employee Arrested For Alleged Hacking
CNN
http://cnn.com/2001/TECH/computing/01/11/nuclear.hacker.reut/index.html

113. Linux Security - The Community's Center For Security
News Hacks/Cracks, 5/13/2004 1041. BlueTooth hacking For Fun and Profit. PublishedBy Cryptonomicon.net Posted By Benjamin D. Thomas 5/13/2004 1041.
http://www.linuxsecurity.com/articles/hackscracks_article-9296.html
Features: Linux and National Security
Guardian Digital Security Solutions Win Out At Real World Linux

Newsletter: Linux Advisory Watch
Newsletter: Linux Security Week
Download EnGarde Today!

Documentation
Security Sources ... Hacks/Cracks News: Hacks/Cracks BlueTooth Hacking For Fun and Profit Published By: Cryptonomicon.net
Posted By: Benjamin D. Thomas
SPONSOR: Guardian Digital
Secure Mail Suite: Enhanced security and productivity features provide a complete and reliable enterprise messaging solution.
WiFi wardriving tools have now advanced to the point where it is less a sign of techno-machismo and more a sign of social maladjustment to actually go out and wardrive in your neighborhood. So what's a young wireless data enthusiast to do? Software Defined Radio is a good suggestion, but you're limited to the frequencies you can use without relatively expensive equipment. Another recommendation might be investigating the security characteristics of your BlueTooth enabled device.
SPONSOR: Guardian Digital
Secure Mail Suite: Combines the perfect office productivity tools. WebMail, Groupware, LDAP Integration.

114. Hacking And Hackers - Computer Security Programs Downloading Search Engines Port
Comprehensive directory of security and hacking articles, links, downloads, FAQs, tools, utilities, virus, antivirus, trojans, cellular, phreaking, physical security, tutorials, telecommunications, and daily security news.
http://www.prognosisx.com/infosyssec/
security security news virus news hacking news hacker trojan underground headlines newsticker security news antivirus exploit denial of service DDoS advisories trojan backdoor sniffer smurfwindows securityXP security security products security books security tips security faq authentication computer security crack crackers crash cryptography denial of service DOS email virus alerts encrypting file system encryption exploits firewall firewalls hack hacks hack files hack links hacked webpages hacker hackers hacking hacking files hacking links hot fixes icmp intruder intrusion detection news ip spoof Kerberos key logger logon microsoft security NT nt security nt server ntsecurity ntshop password password crackers patches permssions phreaking boxes port monitors proxy proxy servers secure security security news security firewalls cryptography vulnerabilities vulnerability news encrypting file system hotfixes authentication password permissions proxy servers antivirus virus system policies smart cards smart cards source route spoofing syn flood system policies texts virii virus viruses vulnerabilities vulnerability wardialers win2k sec win2k security win2k sec windows 2000 security windows 2000 windows windows NT windows nt security

115. Linux Security - The Community's Center For Security
News Security Sources, 5/19/2004 1427. Embracing the Art of hacking.Published By wired.com Posted By David Isecke 5/19/2004 1427.
http://www.linuxsecurity.com/articles/security_sources_article-9322.html
Features: Linux and National Security
Guardian Digital Security Solutions Win Out At Real World Linux

Newsletter: Linux Advisory Watch
Newsletter: Linux Security Week
Download EnGarde Today!

Documentation
Security Sources ... Hacks/Cracks News: Security Sources Embracing the Art of Hacking Published By: wired.com
Posted By: David Isecke
SPONSOR: Guardian Digital
Internet Productivity Suite: Comprehensive productivity and security solution for small business networks.
The idea that every hacker is an artist and every artist is a hacker isn't groundbreaking recent gallery and museum shows have focused on the link between art and coding but a new book by programmer Paul Graham gives the concept a fresh twist by advising hackers to improve their skills by borrowing creative techniques from other artists. It doesn't quite live up to the promotional promise that "if you want to understand what hackers are up to, this book will tell you," since it's unlikely that the mildly hacker-curious will wade through four chapters on the pros and cons of programming languages. But, on the whole, the book does provide some fascinating reading for anyone who cares about making great things. Graham certainly knows hacking: Currently working on a new programming language called Arc, he developed the first Web-based application (Viaweb, which was acquired by Yahoo in 1998) and created a simple but effective Bayesian spam filter that inspired most of the current spam busters. He also knows art; Graham studied painting at Rhode Island School of Design and the Accademia di Belle Arti in Florence, Italy.

116. CNN.com - Teenager Charged With Computer Hacking - March 8, 2000
CNN
http://www.cnn.com/2000/TECH/computing/03/08/hacker.arrest.02/index.html
technology computing CNN Sites CNN CNNfn CNNSI myCNN AllPolitics Languages myCNN Video Audio Headline News Brief ... Feedback
CNN Sites CNN CNN Europe CNNfn CNNSI myCNN CNNfyi AllPolitics Languages
Search
CNN.com CNNSI.com CNNfn.com The Web
TECHNOLOGY

TOP STORIES
Consumer group: Online privacy protections fall short

Guide to a wired Super Bowl

Debate opens on making e-commerce law consistent

MORE

TOP STORIES More than 11,000 killed in India quake Mideast negotiators want to continue talks after Israeli elections MORE BUSINESS ... MORE MARKETS 4:30pm ET, 4/16 DJIA NAS SPORTS Jordan says farewell for the third time ... LOCAL EDITIONS: CNN.com Europe change default edition MULTIMEDIA: video video archive audio multimedia showcase ... more services E-MAIL: Subscribe to one of our news e-mail lists Enter your address: DISCUSSION: chat feedback CNN WEB SITES: CNNfyi.com CNN.com Europe AsiaNow Spanish ... Korean Headlines TIME INC. SITES: Go To ... Time.com People Money Fortune EW CNN NETWORKS: CNN anchors transcripts Turner distribution SITE INFO: help contents search ad info ... jobs WEB SERVICES: Main Page Bracing for Cyberwar Hacking Primer Scenes from the 'Hacker Underground' ... Related Sites
Teenager charged with computer hacking
March 8, 2000

117. Arenn's Software Download Page
Software Download Central. For those whose browsers don t support anonymous ftpURL s, you will have to download the files manually from ftp.urbanophile.com.
http://www.urbanophile.com/arenn/hacking/download.html
Software Download Central
For those whose browsers don't support anonymous ftp URL's, you will have to download the files manually from ftp.urbanophile.com. If you download any of this software, please let me know . I also appreciate any and all comments - even negative ones.
Current Projects
The gzip Recovery Toolkit
I had a jaz drive cartridge sector go bad on me, corrupting my most recent backup during an OS upgrade. Thus was born this small project, which automates the recovery of files and data out of corrupted gzip and tar files. This was a lifesaver to say the least.
GNU getopt - Java port
A while back I found myself in need of a Java command line option parser. Unsatisfied with free versions I was able to find on the net, I volunteered to port the GNU getopt family of functions from C to Java. The current release is 1.0.9 (released 2002/01/16). The GNU Java getopt classes support short and long argument parsing in a manner 100% compatible with the version of GNU getopt in glibc 2.0.6 with a mostly compatible programmer's interface as well. Note that this is a port, not a new implementation. I am currently unaware of any bugs in this software, but there certainly could be some lying about. I would appreciate bug reports as well as hearing about positive experiences.

118. California Man Accused Of Hacking Into Government Computers
CNN
http://www.cnn.com/2000/LAW/09/22/crime.hacker.reut/index.html

119. CNN - Army Investigators Lead FBI To Hacking Suspect - August 31, 1999
CNN
http://www.cnn.com/TECH/computing/9908/31/army.hacker/index.html
[an error occurred while processing this directive]
MAIN PAGE
WORLD ASIANOW U.S. ... news quiz
CNN WEB SITES: TIME INC. SITES: Go To ... Time.com People Money Fortune EW MORE SERVICES: video on demand video archive audio on demand news email services ...
pagenet

DISCUSSION: message boards chat feedback
SITE GUIDES: help contents search
FASTER ACCESS: europe japan
WEB SERVICES:
Main Page
Bracing for Cyberwar Hacking Primer Scenes from the 'Hacker Underground' ... Related Sites
Army investigators lead FBI to hacking suspect
ALSO:
How do you define a hacker?
Insurgency on the Internet

Sign up for the Computer Connection email service
For more computing stories August 31, 1999 Web posted at: 5:13 p.m. EDT (2113 GMT) WASHINGTON (CNN) The U.S. Army released a statement Tuesday saying its investigators provided information to the FBI that has resulted in the arrest of a Wisconsin man suspected of hacking into and altering the Army's Internet home page. The suspect is 19-year-old Chad Davis of Green Bay, Wisconsin, the reputed co-founder of a hacker organization known as "Global Hell," according to the statement. The arrest followed a two-month investigation by the Army's Criminal Investigation Command, which routinely cooperates with other law enforcement agencies.

120. Oreilly.com -- Online Catalog: Hardware Hacking Projects For Geeks
From building an Internet toaster to creating a cubicle intrusion detectionsystem, Hardware hacking Projects for Geeks offers an array of inventive
http://www.oreilly.com/catalog/hardwarehks/

O'Reilly Home
Press Room Jobs Resource Centers Perl Java Python C/C++ ... Enterprise Development Book Series Hacks Head First Cookbooks In a Nutshell ... Developer's Notebooks Publishing Partners No Starch Press Paraglyph Press Pragmatic Bookshelf Syngress Publishing Online Publications LinuxDevCenter.com MacDevCenter.com WindowsDevCenter.com ONDotnet.com ... XML.com Special Interest Events Meerkat News Ask Tim tim.oreilly.com ... Open Books Special Sales Academic Corporate Government Inside O'Reilly About O'Reilly International Advertise with Us Contact Us ... Bookstores Traveling to
a tech show? Hotel Search
Hotel Discounts

Discount Hotels

Chicago Hotels
...
Register your book
to get email notification of new editions, special offers, and more.
Hardware Hacking Projects for Geeks
By  Scott Fullam
January 2004
Series: Hacks
ISBN: 0-596-00314-5
Buy from O'Reilly: Buy Online at: select a store O'Reilly Amazon.com Amazon.co.uk Amazon.ca BN.com Bookpool Borders Chapters.indigo.ca Digital Guru Foyles PC Bookshop (UK) Powell's Quantum Readme.doc Reiter's San Diego Technical Books Softpro Stacey's hacks.oreilly.com

Page 6     101-120 of 193    Back | 1  | 2  | 3  | 4  | 5  | 6  | 7  | 8  | 9  | 10  | Next 20

free hit counter