Geometry.Net - the online learning center
Home  - Computer - Hacking
e99.com Bookstore
  
Images 
Newsgroups
Page 3     41-60 of 140    Back | 1  | 2  | 3  | 4  | 5  | 6  | 7  | Next 20

         Hacking:     more books (100)
  1. Hands-On Ethical Hacking and Network Defense by Michael T. Simpson, Kent Backman, et all 2010-03-17
  2. Live Hacking: The Ultimate Guide to Hacking Techniques & Countermeasures for Ethical Hackers & IT Security Experts by Ali Jahangiri, 2009-10-21
  3. Hacking the Code: ASP.NET Web Application Security by Mark Burnett, 2004-05
  4. Hacking iSeries by Shalom Carmel, 2006-02-10
  5. Hacking the Cable Modem: What Cable Companies Don't Want You to Know by DerEngel, 2006-09-10
  6. Every Woman's Nightmare: The True Story Of The Fairy-Tale Marriage And Brutal Murder Of Lori Hacking by Steven Long, 2006-04-04
  7. Hacking World of Warcraft (ExtremeTech) by Daniel Gilbert, James Whitehead II, 2007-06-05
  8. Rewriting the Soul by Ian Hacking, 1998-08-03
  9. Hacking Roomba: ExtremeTech by Tod E. Kurt, 2006-11-20
  10. Hacking College by Dean Kohrs, 2010-06-23
  11. Hacker's Challenge 3: 20 Brand New Forensic Scenarios & Solutions (Hacking Exposed) (v. 3) by David Pollino, Bill Pennington, et all 2006-04-25
  12. Scientific Revolutions (Oxford Readings in Philosophy)
  13. Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions by David Endler, Mark Collier, 2006-11-28
  14. Hacking the PSP: Cool Hacks, Mods, and Customizations for the SonyPlayStationPortable (ExtremeTech) by Auri Rahimzadeh, 2006-10-30

41. Topsight.net - Discussions On Computers And Beyond
Information on hacking news.
http://www.topsight.net/
Discussions on computers and beyond
advanced search
Sections
User Functions
Username:
Password:
Lost your password
Stories No new stories
Comments last 2 days
No new comments
Links last 2 weeks
No recent new links
Welcome to Topsight.net
Sunday, October 31 2010 @ 04:44 AM EDT
Nesit a hacker charity.
Sunday, May 16 2010 @ 08:34 AM EDT Views: 399 I'm working on a new non-profit makerspace called the New England Association of Information Technology.
Check it out at www.nesit.net Post a comment Comments (0)
Removing and analyzing malicious software in a Windows Environment
Friday, March 26 2010 @ 02:43 PM EDT Views: 574 I recently put together a guide for tackling and analyzing malware, click read more below to check it out. read more (939 words) Comments (0)
A simple way to Create a windows 7 image to roll out to multiple computers
Tuesday, January 05 2010 @ 05:34 PM EST Views: 1,350 While studying for the win7 exam (70-680) I stumbled upon rather simple way to implement desktop imaging without investing in external tools such as Ghost or Acronis. Although, due to the numerous errors and omissions from all sources I researched, I found no single reference that contained the information needed to generate and apply a working image without error. Im therefore puting together the following how-to as a complete reference. Click read more to see the how-to. Questions/Comments can be directed to (opticfiber at topsight.net).

42. Hacking Exposed
Join Stuart McClure, coauthor of the bestselling security book hacking Exposed , and his legion of good-guy hackers in this free monthly live webcast.
http://www.mcafee.com/hackingexposed/
Contact Us
Featured Webcast
Featured Topics
Hacking Exposed Live: Webcast Series
Join Stuart McClure, co-author of the bestselling security book "Hacking Exposed," and his legion of good-guy hackers in this free monthly live webcast.
Join the Hacking Exposed Community
Here you can share information and find the resources you need to stay up to date on the latest threats and prevent these threats from impacting your business.
About the Author

43. Hacking - Wiktionary
Short and interrupted, broken, jerky; hacky. A hacking cough. A hacking laugh. A hacking breath. A hacking cry. A more hacking and harrowing cough I have never heard. Anise
http://en.wiktionary.org/wiki/hacking
hacking
Definition from Wiktionary, the free dictionary Jump to: navigation search
Contents
  • English
    • Adjective
      edit English
      Wikipedia has articles on: Hacking Wikipedia
      edit Adjective
      hacking comparative more hacking superlative most hacking
    • Short and interrupted, broken, jerky; hacky
      A hacking cough. A hacking laugh. A hacking breath. A hacking cry. A more hacking and harrowing cough I have never heard. Anise will diminish the most hacking cough to where it is no longer irritating.
      • P. G. Wodehouse Jeeves in the Offing , chapter XX
        “So now everything's fine.” I uttered a hacking laugh. “No,” I said, in answer to a query from Aunt Dahlia. “I have not accidentally swallowed my tonsils, I was merely laughing hackingly. Ironical that the young blister should say that everything is fine, for at this very moment disaster stares us in the eyeball.”
      edit Usage notes
      Most non-creative collocations are the phrases given as examples.
      edit Derived terms
      edit Noun
      hacking uncountable
    • computing Unauthorized attempts to bypass the security mechanisms of an information system or network. pathology A dry coughing ; the emission of a succession of short coughs.

44. Index .:. UGN Security .:. Dare To Take The Road To Knowledge, Information, Powe
Summaries of security and hacking news
http://www.undergroundnews.com

45. On Hacking - Richard Stallman
I did not know any way to do that, so I realized that if I could come up with a way, it would be a hack. I started thinking. After a few seconds I had an
http://stallman.org/articles/on-hacking.html
On Hacking
In June 2000, while visiting Korea, I did a fun hack that clearly illustrates the original and true meaning of the word "hacker". I went to lunch with some GNU fans, and was sitting down to eat some tteokpaekki , when a waitress set down six chopsticks right in front of me. It occurred to me that perhaps these were meant for three people, but it was more amusing to imagine that I was supposed to use all six. I did not know any way to do that, so I realized that if I could come up with a way, it would be a hack. I started thinking. After a few seconds I had an idea. First I used my left hand to put three chopsticks into my right hand. That was not so hard, though I had to figure out where to put them so that I could control them individually. Then I used my right hand to put the other three chopsticks into my left hand. That was hard, since I had to keep the three chopsticks already in my right hand from falling out. After a couple of tries I got it done. Then I had to figure out how to use the six chopsticks. That was harder. I did not manage well with the left hand, but I succeeded in manipulating all three in the right hand. After a couple of minutes of practice and adjustment, I managed to pick up a piece of food using three sticks converging on it from three different directions, and put it in my mouth. The hacking community developed at MIT and some other universities in the 1960s and 1970s. Hacking included a wide range of activities, from writing software, to practical jokes, to exploring the roofs and tunnels of the MIT campus. Other activities, performed far from MIT and far from computers, also fit hackers' idea of what hacking means: for instance, I think the controversial 1950s "musical piece" by John Cage, 4'33", which has no notes, is more of a hack than a musical composition. The palindromic three-part piece written by Guillaume de Machaut in the 1300s, "Ma Fin Est Mon Commencement", was also a good hack, even better because it also sounds good. Puck appreciated hack value.

46. Videos Tagged With Hacking - Metacafe
One of the world's largest video sites, serving the best videos, funniest movies and clips.
http://www.metacafe.com/tags/hacking/

47. RSA: Hacking And Cracking
Discusses security problems and possible attacks against the RSA cryptosystem.
http://members.tripod.com/irish_ronan/rsa/
Build your own FREE website at Tripod.com Share: Facebook Twitter Digg reddit document.write(lycos_ad['leaderboard']); document.write(lycos_ad['leaderboard2']);
RSA: Hacking and Cracking
For the most recent updates please use the Plan page . It contains a record of changes to the site. Also you can view the finished report (4/May/2001) Try out my AES applet My name is Ronan Killeen and I am doing an undergraduate course, Information and Communications at Trinity College, Dublin . My final year project is RSA: Hacking and Cracking. It will investigate the possibility of breaking the encryption, widely accepted as the strongest around today. The inventers of RSA, Ron Rivest, Adi Shamir, and Leonard Adleman predicted that it could not be broken within the lifetime of the universe. But in 1994 a challenge posed by Martin Gardner was solved by a collaboration of over 600 volunteers, proving that the estimates were a shade conservative. What if the system is not as secure as we previously thought? Please use the following links to navigate through the site.

48. Urban Dictionary: Hacking
hacking is the gaining of access(wanted or unwanted) to a computer and viewing, copying, or creating data(leaving a trace) without the intention of
http://www.urbandictionary.com/define.php?term=hacking

49. Hacking - InfoWorld
Latest hacking news and articles. Indian movie studios reportedly pay firms to attack torrent sites, but the underground hacking more
http://www.infoworld.com/t/hacking
Sign in or Register Our Blogs See all Blogs
  • Feature
Bossie Awards 2010: The best open source software of the year
InfoWorld's Test Center picks the top open source platforms, middleware, applications, and application development tools more Test Center Home
  • Feature
Why network time synchornization is critically important
Your network is time stamping files, email, transactions, etc., while your server logs are recording the transactions in case you need that information. Fundamental to all of this is the belief that the time is correct. This paper describes why network time synchronization is critically important. more See all White Papers

50. Index Of /
SoCal s hacking group. Canadian free since 1999.
http://www.23.org/
Index of /
Name Last modified Size Description ... Parent Directory 18-Oct-2004 20:30 - apache_pb.gif 02-Jul-1996 23:18 2k manual/ 11-Oct-2004 23:45 - www.23.org/ 24-Oct-2008 12:08 - www.714.org/ 11-Oct-2004 23:45 - 11-Oct-2004 23:45 - www.dc206.org/ 24-Nov-2007 13:34 - www.fiestadecarne.org/ 07-Jan-2005 15:24 - www.la2600.org/ 02-Feb-2010 04:54 - Apache/1.3.31 Server at methlab.23.org Port 80

51. Hacking - Mass Effect Wiki - Mass Effect, Mass Effect 2, Walkthroughs And More
hacking is an unlockable tech talent available to Engineers and the Quarian Machinist squadmate class. This talent grants the AI hacking ability (see below), which makes
http://masseffect.wikia.com/wiki/Hacking
Wikia
Skip to Content Skip to Wiki Navigation Skip to Site Navigation
Wikia Navigation

52. A History Of Hacking
hacking has been around for more than a century. In the 1870s, several teenagers were flung off the country s brand new phone system by enraged authorities.
http://www.sptimes.com/Hackers/history.hacking.html
Hackers WE ARE HACKERS A history of hacking Florida's hacker connections Altering a Web site STREET SMARTS The bible of phreaking faithful ... Home
A history of hacking Hacking has been around for more than a century. In the 1870s, several teenagers were flung off the country's brand new phone system by enraged authorities. Here's a peek at how busy hackers have been in the past 35 years. Early 1960s University facilities with huge mainframe computers, like MIT's artificial intelligence lab, become staging grounds for hackers. At first, "hacker" was a positive term for a person with a mastery of computers who could push programs beyond what they were designed to do. Early 1970s John Draper John Draper makes a long-distance call for free by blowing a precise tone into a telephone that tells the phone system to open a line. Draper discovered the whistle as a give-away in a box of children's cereal. Draper, who later earns the handle "Captain Crunch," is arrested repeatedly for phone tampering throughout the 1970s. Yippie social movement starts YIPL/TAP (Youth International Party Line/Technical Assistance Program) magazine to help phone hackers (called "phreaks") make free long-distance calls.

53. Hacking
hacking is unauthorized use of computer and network resources. While this term originally referred to a clever or expert programmer, it is now more commonly used to refer to
http://www.mass.gov/?pageID=cagoterminal&L=4&L0=Home&L1=Community Sa

54. Christopher J. Pace
Anarchy, hacking, Phreaking files for newbies.
http://hnsg.net/
Menu:
Contact Me
Christopher J. Pace
My name is Christopher J. Pace, and this website is more or less my vanity domain. If you were expecting another site, please view the Where is Hnsg.net page, which explains more about what Hnsg.net used to be. I am a freelance Linux consultant who has worked with Linux since 2001. I have contributed to many open source projects , and I have also written many Linux tutorials. I also run a blog, Ramlings of a Linux Administrator , which details the trials and tribulations of my life (Linux related, anyways).

55. Top 15 Security/Hacking Tools & Utilities | Darknet - The Darkside
1. Nmap I think everyone has heard of this one, recently evolved into the 4.x series. Nmap (Network Mapper) is a free open source utility for network.
http://www.darknet.org.uk/2006/04/top-15-securityhacking-tools-utilities/

56. Home Of EnZo
Coding group. Offer hacking tools and vulnerability exploits.
http://www.enzotech.net/

57. Hacking Truths
hacking Truths is a resource blog offering tips and tricks to help and enhance computer knowledge and make life easy. We deal with topics which include
http://www.hungry-hackers.com/
var AKPC_IDS = "";
  • Home Forum Archives ... rafay Hello Friends,
    Subscribe to Hacking Truths. Now, members!
    Recent Posts
    XSS Cross Site Scripting Attack 13 Comments rafay Previously I wrote about Remote File Inclusion vulnerability, However Ashik asked me to make another guest post on any topic related to Hacking as he was really busy, so I though to demonstrate another type of website hacking attack called Cross Site Scripting attack, a.k.a. XSS these vulnerabilities occur due to weak coding of the web applications. Once the hacker finds this vulnerability he/she injects malicious codes(Usually in web forms) to steal session cookies and later the hacker uses those cookies to gain access to sensitive page content. How to Spy on a Remote PC 11 Comments Ashik I received a lot of email from the users who wanted to spy on their Girl friends, Boy friends, Spouse, Children or Employee. The software I am going to review today is a solution to all these problems. Using this spy software you will be able to know what your partners are doing. It will allow you to see exactly what your teenager is doing online remotely. It will also allow you to monitor any employee who uses the company computer(s) remotely. Tech Update for this Week #2 No Comment Ashik Hi Friends

58. Hacking
hacking is the process of achieving access to a computer or computer network without legal authorization. It is the most common activity amongst teenagers and young adults.
http://www.hacking.in/
Hacking
Subscribe to Rss Feed:
Hacking
Computer hackers are employed by many companies to get complete access on the computer so that they can delete, edit, copy any file or install as their technical staff. These hackers use their skills to find faults in company’s security system so that it can be repaired quickly. Sometimes hacking also prevents serious identity related crimes. To protect your computer from hacking, you should install firewalls or other antivirus programs on the computer and also check for the updating of the machine at regular intervals.

59. Hacking
Today, the biggest threat faced by computers is crimeware. This malicious software is written by cybercriminals with the purpose of making money illegally.
http://www.kaspersky.com/hacking
Global Website Americas: Western Europe: Eastern Europe: For all other countries: visit our Global Website Close Free Trials Site Map ... Threats Hacking

60. I-Hacked.com Taking Advantage Of Technology - Google Hacking
Sep 26, 2004 IHacked.com is a hardware hacking based website. Taking apart electronics and making them better., Google hacking.
http://www.i-hacked.com/content/view/23/42/

Page 3     41-60 of 140    Back | 1  | 2  | 3  | 4  | 5  | 6  | 7  | Next 20

free hit counter