Geometry.Net - the online learning center
Home  - Computer - Hacking
e99.com Bookstore
  
Images 
Newsgroups
Page 4     61-80 of 140    Back | 1  | 2  | 3  | 4  | 5  | 6  | 7  | Next 20

         Hacking:     more books (100)
  1. Handmade Electronic Music: The Art of Hardware Hacking by Nicolas Collins, 2009-04-13
  2. Hardware Hacking Projects for Geeks by Scott Fullam, 2003-11-01
  3. Professional Penetration Testing: Creating and Operating a Formal Hacking Lab by Thomas Wilhelm, 2009-08-28
  4. The Taming of Chance (Ideas in Context) by Ian Hacking, 1990-10-26
  5. Geek House: 10 Hardware Hacking Projects for Around Home (ExtremeTech) by Barry Press, Marcia Press, 2005-05-06
  6. Network Intrusion Alert: An Ethical Hacking Guide to Intrusion Detection by Ankit Fadia, 2007-06-12
  7. Hacking Exposed Web 2.0: Web 2.0 Security Secrets and Solutions by Rich Cannings, Himanshu Dwivedi, et all 2007-12-17
  8. Hacking Mac OS X Tiger : Serious Hacks, Mods and Customizations by Scott Knaster, 2005-07-14
  9. Representing and Intervening: Introductory Topics in the Philosophy of Natural Science by Ian Hacking, 1983-11-25
  10. Hacking Video Game Consoles: Turn your old video game systems into awesome new portables (ExtremeTech) by Benjamin Heckendorn, 2005-02-18
  11. Hacking Matter: Levitating Chairs, Quantum Mirages, and the Infinite Weirdness of Programmable Atoms by Wil Mccarthy, 2004-04-14
  12. Historical Ontology by Ian Hacking, 2004-09-15
  13. Hacking Google Maps and Google Earth (ExtremeTech) by Martin C. Brown, 2006-07-24
  14. The Unofficial Guide to Ethical Hacking by Ankit Fadia, 2005-09-13

61. Hacking - How To Information | EHow.com
Learn about hacking on eHow.com. Find info and videos including About hacking, How to Hack, About hacking and much more.
http://www.ehow.com/hacking/
  • Family Food Health Home Money Style More
Home Internet Hacking
Hacking
RESULTS:
  • What Is a Hack Tool Rootkit? Symantec, the parent company of Norton Antivirus, uses the name "Hacktool.Rootkit" to refer to malicious software known as rootkits that "allows attackers to break into a system and hide the... How to Find out If Somebody Is Hacking Your Internet Internet hacking occurs at alarming rates around the world. Hackers can be terrorists, organized crime syndicates, bored techies or a plethora of other people. When you use your computer, you can... How Do People Hack Your Password? A common form of account security is password protection. Users employ passwords to protect personal data as well as online account information. Accordingly, hackers spend much time and effort... How to Modify The Search Options in Joomla how to override the search components in joomla to show more consistent result, this hack can be very helpfull when you think about usability for a CMS like joomla,this and other modifications can... How to Hack Lockerz.com

62. Hack2sec
Articulos de hacking y Seguridad.
http://hack2sec.wordpress.com
Articulos de Hacking y Seguridad
  • Inicio About
    Categorias
    Subscribir
    • Entradas (RSS) Comentarios (RSS)
      elhacker.net
      • Diez consejos para no ser un pelmazo en las redes sociales ...
        Posted by jarivas en 20 Abril 2009 Los Rootkits son un tipo de malware utilizado por los hackers con el objetivo de ocultar información que podría delatar su presencia en aquellas máquinas a las que ya han conseguido acceso. A pesar de su nombre, no debemos confundirnos y pensar que un root kit es una aplicación diseñada para conseguir acceso como root en un sistema. Los root kits siempre son usados una vez que hemos conseguido el acceso (generalmente inmediatamente despues) con dos objetivos fundamentales:
      • Ocultar las huellas tanto del propio root kit como de cualquier otro malware que hayamos instalado en la máquina victima Dejar preparada una puerta trasera a través de la cual facilitarnos el acceso a la máquina víctima en el futuro.
      • Publicado en Artículos
        Posted by Jathron en 14 Abril 2009 Existen muchos payloads que aprovechan determinados exploits para comprometer sistemas remotos que emplean técnicas de inyección de código.

63. Furby Autopsy: Hacking
hacking? hacking the CPU and ROM at the hardware level are pretty unlikely for the average hacker, given their singlemolded blob and custom mask contruction.
http://www.phobe.com/furby/hacking.html
Hacking? Hacking the CPU and ROM at the hardware level are pretty unlikely for the average hacker, given their single-molded blob and custom mask contruction. Replacing them with a custom PCB might be feasible, if you could reverse engineer the 12 and 25 pinouts of the daughtercards. Of course, you'd have to write your own ROMs from scratch, use a different CPU which probably wouldn't fit under the carapace, etc. If you would bother with all that, why not just start from scratch and make your own animated creature with more capabilities? Hacking the cams and levers might be possible by changing the shapes of the cams and grooves in the wheels of the main gearing system, you can change when Furby's eyes open and close, mouth moves, etc. It may be possible to take the existing cams and gears and simply rotate them 90 degrees relative to their neighbors (the main shaft is square) which may have the same effect. This probably would not be very exciting, since the software will still act exactly the same. He just might start sleeping with his eyes open, leave his mouth hanging open, etc. which might just be disconcerting rather than entertaining. It'd also be pretty likely to cause more jam-ups in the already delicate workings. HackFAQ I've heard the Furby is Macintosh / Apple II / Linux / BeOS based...is this true?

64. Protección De Datos | DelitosInformaticos.com Información Legal De Internet
Noticias de delitos en la red, generalmente relacionadas con el hacking.
http://www.delitosinformaticos.com/

65. Hacking Democracy - Official Website And DVD
Nov 2, 2006 hacking Democracy The HBO documentary. DVD now available here.
http://www.hackingdemocracy.com/
If you can see this your browser doesn't support frames, or this feature is switched off.

66. Hacking Summary | BookRags.com
hacking Table of Contents. hacking summary with 5 pages of encyclopedia entries, research information, and more.
http://www.bookrags.com/research/hacking-csci-03/

67. Yashira.org
Wargame de hacking tico.
http://www.yashira.org/
Portal Webmail Calendario Documentos ... Más Opciones de Búsqueda Bienvenido, invitado Identificarse Registrarse Foro ¿ Sabías que ?... HOTMAIL El fundador Jack Smith tuvo la idea de tener acceso al E-mail vía Web desde una computadora en cualquier parte del mundo. Cuando Sabeer Bhatia hizo el plan de negocios para el servicio de correo, intentó todas las clases de nombres que terminaban en 'mail' (correo) y finalmente seleccionó Hotmail ya que incluía las letras "HTML" - el lenguaje de programación usado para crear páginas Web. Fue referido inicialmente como HoTMaiL con mayúsculas selectivas. Yashira Nueva Sangre v2 Publicado por - 10-27-10 03:14 - comentarios Buenas,
Como algunos de ustedes habrán notado o bien nos han hecho llegar como sugerencias, este sitio a estado bastante inactivo en al menos este ultimo año, inactividad que a mi modo personal de ver las cosas termino cayendo en el conformismo por ambas partes, tanto administradores como usuarios.
Desgraciadamente aunque me gustaría poner el 100% de mi tiempo en Yashira, en realidad es que ya poco tiempo le puedo dar a la comunidad (sin claro descuidar el desarrollo de Yashira v3 así como de estar reparando y poniendo algunas mejoras a Yashira v2 -la actual-), por lo que tengo que admitir que nueva sangre, nueva gente con ideas frescas y jóvenes nunca la vendrá mal a Yashira.
Por lo que de la manera mas atenta estamos solicitando nueva sangre/gente para tanto el Yashira WarGame como para la Comunidad Yashira.

68. Free Online Hacking Game - Slave Hack, Hack Computers, Banks And Servers.
Free online hacking web game. Will stay free forever. You will hack online into npc pc s/websites/banks but you will also hack and be hacked by other
http://www.slavehack.com/

69. Terminal - The Vault, The Fallout Wiki - Fallout: New Vegas And More
hacking a terminal pays a good number of Experience Points, so you may want to hack terminals even if you don't need to, just to get the XPs. For example, hacking an average
http://fallout.wikia.com/wiki/Hacking
Wikia
Skip to Content Skip to Wiki Navigation Skip to Site Navigation
Wikia Navigation

70. La Web Del PutoAmo
Manuales de hacking y troyanos.
http://www.putoamo.host.sk

71. Threads Tagged With Hacking
News Story The truth behind that 20 second iPhone hack. by happygeek in Netbooks, . News Story Cult of the Dead Cow releases Google hacking tool
http://www.daniweb.com/forums/tag-hacking.html
/** * vBulletin 3.8.2 CSS * Style: 'DaniLand'; Style ID: 35 */ @import url("/forums/clientscript/vbulletin_css/style-d46d3627-00035.css"); @import url("/rxrimages/danicss.css"); Top Members by Rank
Tags
hacking Tag Cloud for hacking atm black-hat book code ... trojan Threads Tagged with hacking Last Post Reaction Popularity News Story: PHP backdoor security surprise uncovered by happygeek in PHP (Sep 10th, 2010) code developer hacking news ... trojan Sep 25th, 2010
by prestashopic 1 replies
2 votes Product Review: Hackers: Heroes of the Computer Revolution by happygeek in Computer Science (Sep 4th, 2010) book coding computing hackers ... review Sep 4th, 2010
by happygeek replies
News Story: Facebook Hacked...Well, Sort Of by CatRambo in Social Media and Online Communities (Jul 29th, 2010) facebook hackers hacking privacy ... security Jul 29th, 2010
by CatRambo replies
News Story: Black Hat Conference Demonstration Reveals ATM Security Risk by in Networking (Jul 29th, 2010) atm black-hat coding hacking ... triton Jul 29th, 2010
by Niki_Fears replies
News Story: Brit kids go hack to school by happygeek in Networking (Sep 3rd, 2008)

72. VoIP And Hacking
Un blog che presenta notizie articoli tecnici sulla sicurezza informatica
http://www.voipandhack.it
VoIP and Hacking
Home
Mi chiamo   Domenico Raffaele
Da parecchi anni svolgo attività sistemistica in ambiente Unix/Linux come consulente freelance, occupandomi di amministrazione e programmazione di sistema e di rete.
Mi occupo di progettazione e realizzazione di soluzioni di convergenza basate su software opensource come Asterisk, di networking e sicurezza. Chi volesse contattarmi per motivi professionali può farlo chiamando i numeri: oppure oppure inviando una email a: domenicoraffaeleskype Loading Feed... Loading Feed... Loading Feed... Loading Feed... Loading Feed... Loading Feed... Send post as PDF to

73. Hacking
File Format PDF/Adobe Acrobat Quick View
http://www.cyberangels.org/security/hacking.pdf

74. HACKINGEXPOSED.COM
hacking Exposed Live Webcast Series. Join Stuart McClure, coauthor of the bestselling security book hacking Exposed, and his legion of good-guy hackers in this free monthly live
http://www.hackingexposed.com/

75. Reckless Driving: You Can Get In Real Trouble For Hacking
May 31, 2002 Some kids think they can t get into trouble for hacking computer systems and that hacking big networks like the phone company, the military,
http://www.justice.gov/criminal/cybercrime/rules/reckless.htm
Some kids think they can't get into trouble for hacking computer systems and that hacking big networks like the phone company, the military, or NASA is harmless fun. But that's not true, as one teenager in Boston found out recently.
The hacker and some of his friends found a way to hack into a computer that belongs to the phone company and that directs telephone traffic in the Boston area. After he got into the system, the hacker decided to reboot the computer, which basically made it crash. The first time he did this, the hacker completely shut off phone service for six hours to a regional airport so that the air traffic control tower had an extrememly hard time communicating. The second time he crashed the computer, he cut off phone service to about 600 homes.
The phone company reported this to the United States Secret Service, which investigated the case and indentified all the kids involved. Although the Justice Department does not prosecute juveniles very often, the United States Attorney's Office in Boston charged the ringleader of the group with several serious crimes.
Even though the student won't go to jail, he did receive very serious punishment: he lost his computer, must pay $5000 to the telephone company, and must work in the community for free for 250 hours. He will also be on probation for the next two years, and during that time he is not allowed to use any computer with a modem. That means, of course, that he is off the Internet and all other networks.

76. HackingTUTORIAL HACKING My-hacking.blogspot.com
WELCOME TO BLOG hacking.DO NOT FORGET TO COMMENTS YOU.THANK YOU FOR hacking tutorial hacking very interested,
http://my-hacking.blogspot.com/
WELCOME TO BLOG HACKING.DO NOT FORGET TO COMMENTS YOU.THANK YOU FOR YOUR VISIT... ir a principal Ir a lateral
Hacking
The best scanner SQL injection
di tweetmeme_url = 'http://my-hacking.blogspot.com/2010/08/best-scanner-sql-injection.html'
While the adoption of web application for running an online business has enabled companies to connect seamlessly with their customers, it also exposed a number of security problems arising from incorrect code. Vulnerabilities in Web applications that allow hackers to gain direct and public access to sensitive information (eg personal data, login credentials).
Web applications allow visitors to send and retrieve data to / from the database via the Internet. Databases are the heart of most web applications. They store data required for web applications to deliver specific content to visitors and provide information to customers, suppliers and others
SQL Injection is perhaps the web applications-the most common hacking techniques that try to pass SQL commands through a web application for execution by the back-end database. vulnerability is presented when user input is not properly cleaned and thus executed.
Checking for SQL Injection vulnerabilities involves auditing your web applications and the best way to do this is by using automated SQL Injection Scanners. We've compiled a list of free SQL Injection Scanners we believe will be a value to both web application developers and professional security auditors.

77. Toronto.2600, The Official Website Of The Toronto Chapter Of 2600.
Canada s Largest hacking and Phreaking meetings. Picking up where the great Hack Canada left the Edmonton 2600 meetings in 2002.
http://www.to2600.org

78. Hetland.org : Instant Hacking
By Magnus Lie Hetland. Minimal, concise, general introduction to programming, via Python, moves very quickly. English, Italian, Polish, Japanese, Serbian,
http://hetland.org/writing/instant-hacking.html
Instant Hacking
This is a short introduction to the art of programming, with examples written in the programming language Python . (If you already know how to program, but want a short intro to Python, you may want to check out my article Instant Python .)This article has been translated into Italian Polish Japanese Serbian ... Dutch , and Czech email me about it. Note: To get the examples working properly, write the programs in a text file and then run that with the interpreter; do not documentation or send an email to
The Environment
To program in Python, you must have an interpreter installed. It exists for most platforms (including Macintosh, Unix and Windows). More information about this can be found on the Python web site . You also should have a text editor (like emacs notepad or something similar).
What is Programming?
Programming a computer means giving it a set of instructions telling it what to do. A computer program in many ways resembles recipes, like the ones we use for cooking. For example [1]: did programming language can expect it to add numbers, write things to the screen etc.

79. Hacking@Everything2.com
MIT usage (1) Exploring or visiting outof-the-way places. Usually involves roofs, tunnels, or places behind locked doors around the MIT campus.
http://everything2.com/title/hacking
Near Matches Ignore Exact
Everything
hacking
thing by Tsarren Sat Mar 18 2000 at 9:35:45 A mark of a percussionist hack ing is what percussionist s do when they don't have percussion instruments to play on, so they play on any object or surface available with any thing available, including, but not limit ed to, hand s, feet , and pencil s. If they hack verbally , it's drumspeak I like it! C! idea by asegall Tue Jun 12 2001 at 0:04:42 MIT usage: (1) Exploring or visiting out-of-the-way places. Usually involves roofs, tunnels, or places behind locked doors around the MIT campus. Example usages include "I'm going hacking tonight" or "the hacking community". Related to the noun hack , involving a creative and non-destructive prank, but not the proper verb form of the noun.
(2) Working, usually involving programming . "I was hacking code all night." I like it! idea by apollo's squirrel Wed Jun 05 2002 at 22:39:51
Note: The term " Hacking " has become associated with the process of gaining unauthorised access to computer system s. The original meaning was very different - and there are many who wish that the media had not corrupted it - but I am not going to debate this issue here. "Hacking" will therefore be used in its more

80. Penetration Testing | Ethical Hacking - Pure Hacking
Dedicated penetration testing services focusing on network application and Internet security.
http://www.purehacking.com/
Search
Main Menu
Banner
About Pure Hacking
About Pure Hacking
Pure Hacking is passionate about providing cutting edge specialist security consulting services to keep you safe on the Internet. We invest in our team to guarantee we are the best in the industry, providing exceptional security services as a trusted advisor for our clients and the community globally. Read More
Caring For Kids With JDM
Products Introduction
Web application security
Pure Hacking's SDLC security professionals help you lock down your mobile and software security systems through web application security testing, secure code reviews, reverse engineering, and much more. Read More
Infrastructure Protection
Ethical hacking for professionals, by professionals. We help you implement true network security solutions through external penetration testing, wireless security testing, VoIP security audits, design reviews, server hardening, and SCADA testing. Read More
Web application firewalls
Our Managed Security products such as PureWAF provide robust protection for your web applications, via a virtualised or cloud WAF, and is customised to suit your individual environment.

Page 4     61-80 of 140    Back | 1  | 2  | 3  | 4  | 5  | 6  | 7  | Next 20

free hit counter