Geometry.Net - the online learning center
Home  - Computer - Hacking
e99.com Bookstore
  
Images 
Newsgroups
Page 1     1-20 of 140    1  | 2  | 3  | 4  | 5  | 6  | 7  | Next 20

         Hacking:     more books (100)
  1. Hacking Work: Breaking Stupid Rules for Smart Results by Bill Jensen, Josh Klein, 2010-09-23
  2. Hacking: The Art of Exploitation, 2nd Edition by Jon Erickson, 2008-02-04
  3. Hacking: The Next Generation (Animal Guide) by Nitesh Dhanjani, Billy Rios, et all 2009-09-10
  4. Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition by Stuart McClure, Joel Scambray, et all 2009-01-05
  5. Hacking For Dummies by Kevin Beaver, 2010-01-12
  6. Hacking the Xbox: An Introduction to Reverse Engineering by Andrew Huang, 2003-07
  7. Hacking Exposed Wireless, Second Edition by Johnny Cache, Joshua Wright, et all 2010-07-09
  8. HACKING EXPOSED WEB APPLICATIONS 3/E by Joel Scambray, 2010-10-15
  9. Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques by Thomas Wilhelm, Jason Andress, 2010-09-24
  10. Gray Hat Hacking, Second Edition: The Ethical Hacker's Handbook by Shon Harris, Allen Harper, et all 2007-12-20
  11. No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing by Johnny Long, Jack Wiles, 2008-02-21
  12. Google Hacking for Penetration Testers by Johnny Long, 2007-11-02
  13. Hacking Exposed Computer Forensics, Second Edition: Computer Forensics Secrets & Solutions by Aaron Philipp, David Cowen, et all 2009-09-10
  14. An Introduction to Probability and Inductive Logic by Ian Hacking, 2001-07-02

1. Hack This Site!
HackThisSite! is a legal and safe network security resource where users test their hacking skills on various challenges and learn about hacking and network
http://www.hackthissite.org/

2. Hack (technology) - Wikipedia, The Free Encyclopedia
hacking (English verb to hack, singular noun a hack) refers to the re configuring or re-programming of a system to function in ways not facilitated by the
http://en.wikipedia.org/wiki/Hack_(technology)
Hack (technology)
From Wikipedia, the free encyclopedia Jump to: navigation search For Hacking which refers to breaching computer security, see Hacker (computer security) This article may require cleanup to meet Wikipedia's quality standards Please improve this article if you can. The talk page may contain suggestions. (December 2009) This article does not cite any references or sources
Please help improve this article by adding citations to reliable sources . Unsourced material may be challenged and removed (August 2010) Hacking English verb to hack , singular noun a hack ) refers to the re-configuring or re-programming of a system to function in ways not facilitated by the owner administrator , or designer . The term(s) have several related meanings in the technology and computer science fields, wherein a "hack" may refer to a clever or quick fix to a computer program problem, or to what may be perceived to be a clumsy or inelegant (but usually relatively quick) solution to a problem, such as a " kludge The terms "hack" and "hacking" are also used to refer to a modification of a program or device to give the user access to features that were otherwise unavailable, such as by circuit bending . It is from this usage that the term "hacking" is often used to refer to more nefarious criminal uses such as identity theft credit card fraud or other actions categorized as computer crime
Contents
edit History
The term "hack" was first used by US university computing centre staff in the mid-1960s. The context determined whether the complimentary or derogatory meanings were implied. Phrases such as "ugly hack" or "quick hack" generally referred to the latter meaning; phrases such as "cool hack" or "neat hack", to the former. In modern computer programming, a "hack" can refer to a solution or method which functions correctly but which is "ugly" in its concept, which works outside the accepted structures and norms of the environment, or which is not easily extendable or maintainable (see

3. Hacking | Technology | Guardian.co.uk
30 Sep 2010 Suggestions that the dangers of computer warfare have been overdone don't stand up to the emerging realities
http://www.guardian.co.uk/technology/hacking
document.domain = "guardian.co.uk"; Turn autoplay off Turn autoplay on Please activate cookies in order to turn autoplay off

4. ScienceDaily: Hacking News
Oct 29, 2010 hacking and computer security. Read today s research news on hacking and protecting against codebreakers. New software, secure data sharing,
http://www.sciencedaily.com/news/computers_math/hacking/
Hacking News
Sunday, October 31, 2010 Print Email Bookmark
Latest News
Computer Science Mathematics
Single Electron Reader Opens Path for Quantum Computing
full story
How Safe Is Your Swipe? Thinking Like Hackers, Programmers Find Security Loopholes in 'Secure' Microchips
full story ... Vulnerability in Commercial Quantum Cryptography
Browse News Stories
1 to 10 of 335 stories (76 over past year) view headlines only

5. Hacking - Security - Software - Technology - News
With Wikio you can create personal pages by selecting the info that interests you.
http://www.wikio.com/technology/software/security/hacking
@import url(http://st0.wk.io/v201010291724/shared/css/all.css); @import url(http://st1.wk.io/v201010291724/shared/css/screen/reset.css); @import url(http://st2.wk.io/v201010291724/shared/css/screen/commonBase.css); @import url(http://st3.wk.io/v201010291724/shared/css/screen/browsers.css); @import url(http://st0.wk.io/v201010291724/shared/css/screen/commonRepeatedImages.css); @import url(http://st1.wk.io/v201010291724/shared/css/screen/commonBlocks.css); @import url(http://st2.wk.io/v201010291724/shared/css/screen/commonLayout.css); @import url(http://st3.wk.io/v201010291724/shared/css/screen/commonContent.css); @import url(http://st0.wk.io/v201010291724/shared/css/screen/commonGizmos.css); @import url(http://st1.wk.io/v201010291724/shared/css/screen/commonCategories.css); @import url(http://st2.wk.io/v201010291724/shared/css/screen/commonMockups.css); @import url(http://st3.wk.io/v201010291724/shared/css/screen/contentPageSource.css); @import url(http://st0.wk.io/v201010291724/shared/css/screen/contentPageBuzz.css); @import url(http://st1.wk.io/v201010291724/shared/functions/plugins/autocomplete/jquery.autocomplete.css);

6. Hacking Roomba
New RoombaComm 0.96! The Java library to control Roomba, RoombaComm has been updated, check it out! It’s now being actively maintained by Paul Bouchier, Jonathan Pitts Matt
http://hackingroomba.com/

7. Hacking NetFlix
News and views on Netflix and the broader US DVD rental market.
http://www.hackingnetflix.com/
Hacking NetFlix
How To Contact Netflix
  • Questions? Lost DVD? Call Netflix at 866-716-0414.
Welcome
  • Come in, take a look around, and feel free to contact me if you have a question or story idea. Be sure to read the comments or participate in the discussion. Subscribe
Search
  • Web HackingNetflix
Recent Posts
Netflix Blogs
Software
Movie Links
Movie Podcasts
Archives ... More...
  • This site is an independent Web site (I don't work for Netflix). Netflix is registered trademark of Netflix, Inc. HackingNetflix will not teach you how to lie, cheat or steal from Netflix. Hacking is the desire to fully understand something, and we want to learn as much as we can about this company and share this information.

8. Hack Canada - It Don't Mean Jack If It Ain't Got That Hack.
The source for Canadian hacking and phreaking. Text files, links.
http://www.hackcanada.com/
Hack Canada
Crew

History

Photograffiti
...
Whacked Mac
Hack
and phreaking T h i s i s t h e N e w S h i t Phreak and hacking How to Open a Permutation Lock - By unlock. "think" - Some things worth thinking about. By Wizbone. K-1ine Issue #51 - 'K-1ine Forever' is now available from Nettwerked.net . This one's for you, phlux. Neo-Comintern #293 is now available from neo-comintern.com ANSI's HOW I CLOBBERED EVERY BUREAUCRATIC CASH-CONFISCATORY AGENCY KNOWN TO MAN ... a Spiritual Economic Book on $$$ and Remembering Who You Are . By Mary Elizabeth: Croft. [PDF] entertainment purposes only. It is not intended to encourage or teach you to break the law, that's what TV is for, albeit in a very flawed manner. The owner(s) of this website will not be held liable for anything you choose to do with the information contained on this site. If you want to learn how to rape, murder, loot, and commit acts of terror on a monumental scale, well, you won't find it here. Instead, tune-in to your nightly news and take a lesson from your "elected" "leaders". Hack Canada, the Hack Canada logos, their likeness, and these pages

9. How To Become A Hacker
No. hacking uses very little formal mathematics or arithmetic. In particular, you won't usually need trigonometry, calculus or analysis (there are exceptions to this in a handful
http://catb.org/~esr/faqs/hacker-howto.html
How To Become A Hacker
Eric Steven Raymond
Thyrsus Enterprises
esr@thyrsus.com

Revision History Revision 1.42 22 Oct 2010 esr Added "Historical note". Revision 1.40 3 Nov 2008 esr Link fixes. Revision 1.39 14 Aug Jan 2008 esr Link fixes. Revision 1.38 8 Jan 2008 esr Deprecate Java as a language to learn early. Revision 1.37 4 Oct 2007 esr Recommend Ubuntu as a Unix distro for newbies. Table of Contents
Why This Document? What Is a Hacker? The Hacker Attitude
1. The world is full of fascinating problems waiting to be solved. ... Frequently Asked Questions
Why This Document?
As editor of the Jargon File and author of a few other well-known documents of similar nature, I often get email requests from enthusiastic network newbies asking (in effect) "how can I learn to be a wizardly hacker?". Back in 1996 I noticed that there didn't seem to be any other FAQs or web documents that addressed this vital question, so I started this one. A lot of hackers now consider it definitive, and I suppose that means it is. Still, I don't claim to be the exclusive authority on this topic; if you don't like what you read here, write your own. If you are reading a snapshot of this document offline, the current version lives at

10. Hacking - Free Download Hacking Software
1 Forgotten Mailbox Password; Recover forgotten POP3 mailbox passwords easily Recover forgotten mailbox passwords that are stored in the email client.
http://www.supershareware.com/hacking-free/

11. Hacking - Computers - Web Directory - Submit Site
Add URL to hacking Web Directory. Browse the hacking resources for related information. Read articles and guides on hacking.
http://www.dirjournal.com/computers/hacking/

12. I-Hacked.com Taking Advantage Of Technology
Information about hacking internet appliances, game consoles, and palm pilots.
http://www.i-hacked.com/
Home 31 October 2010 Main Menu Home News Forums Downloads ... About Login Form Username
Password
Remember me
Lost Password?
Latest Edge Vote for us in Top 100 Security Sites
Newsflash HOW TO GET FREE ENTRY TO DEFCON18 Written by hevnsnt Wednesday, 07 July 2010 I-Hacked just turned 10 and we want YOU to win.. How about a free entry to
I-Hacked will be giving away a free Defcon18 Human Badge which gives the holder entry to the "World's largest hacker conference" to a lucky winner!
All you have to do to enter is: Follow @ihacked on twitter Tweet this phrase: So @ihacked turned ten, and this is my entry to win. Retweet this for a chance at a free defcon ticket (http://bit.ly/bOsqSL 4info)
Here are the rules:
  • Each time you tweet the COMPLETE phrase above, it counts as an entry into the contest

13. Hacking - Wikipedia, The Free Encyclopedia
hacking is when someone has logged into your email account ,Facebook
http://en.wikipedia.org/wiki/Hacking
Hacking
From Wikipedia, the free encyclopedia Jump to: navigation search Look up hacking in Wiktionary , the free dictionary. Hacking may refer to:
edit See also
This disambiguation page lists articles associated with the same title.
If an internal link led you here, you may wish to change the link to point directly to the intended article. Retrieved from " http://en.wikipedia.org/wiki/Hacking Categories Disambiguation pages German toponyms ... Germanic-language surnames Hidden categories: All article disambiguation pages All disambiguation pages Personal tools Namespaces Variants Views Actions Search Navigation Interaction Toolbox Print/export Languages

14. Hacking - The BioShock Wiki - BioShock, BioShock 2, BioShock Infinite, News, Gui
hacking is a method of interacting with various machines in the BioShock game series. This may be done to gain access to a locked area, unlock safes, reduce prices at Vending
http://bioshock.wikia.com/wiki/Hacking
Wikia
Skip to Content Skip to Wiki Navigation Skip to Site Navigation
Wikia Navigation

15. Rootkit.com
A program for hacking root.
http://www.rootkit.com/
REGISTER
main menu home forums
Show me new threads!
bookmarks ... view blogs vault you must be level 2 to upload files to your vault
downloads you must be logged on, and level 1, to access downloads
Rootkit Collection File Contributer Link Hacker Def... hf n/a admin n/a BASIC CLAS... hoglund n/a Vanquish xshadow n/a NT Rootkit hoglund n/a FU n/a WinlogonHi... JeFFOsZ n/a klister joanna n/a Patchfinde... joanna n/a MyNetwork hoglund n/a MTDWin hoglund n/a NTFSHider hoglund n/a VideoCardK... hoglund n/a VICE n/a Klog Clandestin... n/a NtIllusion Kdm n/a AFX Rootki... TheRealAph... n/a SInAR vulndev n/a Shadow Wal... Clandestin... n/a BootRootki... dereksoede... n/a CHAZ - Nim... neocrackr n/a Clandestin... merlvingia... n/a FUTo petersilbe... n/a Windows Me... n/a RAIDE petersilbe... n/a BOOT KIT vipinkumar n/a BluePill Joanna and... n/a DEFRAG n/a Keyboard H... chpie n/a CheatEngin... DarkByte n/a search the site backends A news back-end to implement RootKit news into your website is here or more advanced version here An XML/RSS feed that includes both NEWS and BLOGS for RootKit is here: XML/RSS
Beta feed for replied posts here . feedback to admins not forums, we know about times being off...

16. Ian Hacking - Wikipedia, The Free Encyclopedia
Ian hacking, CC, FRSC, FBA (born February 18, 1936) is a Canadian
http://en.wikipedia.org/wiki/Ian_Hacking
Ian Hacking
From Wikipedia, the free encyclopedia Jump to: navigation search Ian Hacking Full name Ian Hacking Born February 18, 1936
Vancouver
British Columbia Era 20th century philosophy Region Western Philosophy School Analytic philosophy Main interests Philosophy of science
Philosophy of statistics
Influenced by Michel Foucault Paul Feyerabend Thomas Kuhn Charles Sanders Peirce ... Ludwig Wittgenstein Ian Hacking CC FRSC FBA (born February 18, 1936) is a Canadian philosopher , specializing in the philosophy of science
Contents

17. Hacker - Wikipedia, The Free Encyclopedia
Griffen Hacker, the movie star of the hit television show Them Among Us; Other. Hacker Brewery, since 1972 merged into HackerPschorr Brewery, and its beer; See also. hacking
http://en.wikipedia.org/wiki/Hacker
Hacker
From Wikipedia, the free encyclopedia Jump to: navigation search Look up hacker in Wiktionary , the free dictionary.
Contents

18. Ian Hacking: Definition From Answers.com
hacking, Ian (1936 ) Canadian philosopher, educated at British Columbia and Trinity College, Cambridge, and now centred in Toronto and Paris where he holds a Chair at the
http://www.answers.com/topic/ian-hacking
var isReferenceAnswers = true; BodyLoad('s'); On this page Library
Ian Hacking
Philosophy Dictionary:
Ian Hacking
Home Library Philosophy Dictionary Hacking, Ian (1936- ) Canadian philosopher, educated at British Columbia and Trinity College, Cambridge, and now centred in Toronto and Paris where he holds a Chair at the Collège de France. Hacking has written widely on the philosophy of probability and the philosophy of science in general. He has been especially interested in the social background and historical conditions underlying the emergence of particular scientific concepts. Early books included The Logic of Statistical Inference (1965) and Why Does Language Matter to Philosophy? The Emergence of Probability (1975) and The Taming of Chance (1990) are contributions to the philosophy and history of prob-ability. His Representing and Intervening (1983) emphasized the role of experiment in the natural sciences, while Le Plus pur nominalisme (1993), concerned Goodman's paradox . The social aspect of medical concepts are discussed in Rewriting the Soul: Multiple Personality and the Politics of Memory Mad Travelers (1998) and The Social Construction of What Deutsch Italiano Tagalog Search unanswered questions...

19. Karosium
DIY Projects, hardware hacking
http://www.karosium.com
skip to main skip to sidebar
Friday, October 22, 2010
RF Remote Control Emulation
A few weeks ago I got one of these:
It's a remote controllable light switch that comes with an RF remote. The only light switch is across the room from my PC and it's a pretty large room. (The building's basically a 1-room apartment) so this works out great with the remote. Of course since I'm using the remote to cut the lights when I go to bed I'm basically using the remote from two places which brings with it the unavoidable annoyance of the remote being in the wrong place all the time. Which means I have to get up and look for it which is effectively as much of an annoyance as it was meant to solve. So I wanted a second controller that would basically be a stationary switch by my bed so I could leave the portable remote around the desk.
Call me lazy I won't even deny it.
I popped the original remote open to see what I was dealing with.
After some research I concluded that LP801B is a PT2262 clone which is a remote control encoder chip. Has a few address and data pins and generates a signal on the output pin based on the configuration of those at the time the enable pin is connected to ground.
At first I didn't think much of it and ordered some PT2262s and made a PCB which is basically a clone of the original remote adapted for components I had lying around (or just stupidly large pads where I had no idea what I was going to use when I made the board)
Not being patient enough however I started looking around to see if anyone's emulated this chip on a microcontroller before. Turns out, several people did.

20. How To Become A Hacker
Otherwise you ll find your hacking energy is sapped by distractions like sex, It s fine to use your hacking skills to support a family or even get rich
http://www.catb.org/esr/faqs/hacker-howto.html
How To Become A Hacker
Eric Steven Raymond
Thyrsus Enterprises
esr@thyrsus.com

Revision History Revision 1.42 22 Oct 2010 esr Added "Historical note". Revision 1.40 3 Nov 2008 esr Link fixes. Revision 1.39 14 Aug Jan 2008 esr Link fixes. Revision 1.38 8 Jan 2008 esr Deprecate Java as a language to learn early. Revision 1.37 4 Oct 2007 esr Recommend Ubuntu as a Unix distro for newbies. Table of Contents
Why This Document? What Is a Hacker? The Hacker Attitude
1. The world is full of fascinating problems waiting to be solved. ... Frequently Asked Questions
Why This Document?
As editor of the Jargon File and author of a few other well-known documents of similar nature, I often get email requests from enthusiastic network newbies asking (in effect) "how can I learn to be a wizardly hacker?". Back in 1996 I noticed that there didn't seem to be any other FAQs or web documents that addressed this vital question, so I started this one. A lot of hackers now consider it definitive, and I suppose that means it is. Still, I don't claim to be the exclusive authority on this topic; if you don't like what you read here, write your own. If you are reading a snapshot of this document offline, the current version lives at

Page 1     1-20 of 140    1  | 2  | 3  | 4  | 5  | 6  | 7  | Next 20

free hit counter