Geometry.Net - the online learning center
Home  - Computer - Hacking
e99.com Bookstore
  
Images 
Newsgroups
Page 5     81-100 of 140    Back | 1  | 2  | 3  | 4  | 5  | 6  | 7  | Next 20

         Hacking:     more books (100)
  1. Hacking the Human by Ian Mann, 2008-11-01
  2. Hacking GMail (ExtremeTech) by Ben Hammersley, 2005-12-19
  3. Windows Server 2003 (Hacking Exposed) by Joel Scambray, Stuart McClure, 2006-10-27
  4. The CEH Prep Guide: The Comprehensive Guide to Certified Ethical Hacking by Ronald L. Krutz, Russell Dean Vines, 2007-10-22
  5. Hardware Hacking: Have Fun While Voiding Your Warranty by Joe Grand, Ryan Russell, 2004-01-01
  6. Hacking the Earth by Jamais Cascio, 2009-01-01
  7. Hacking Knoppix (ExtremeTech) by ScottGranneman, 2006-01-04
  8. Hacking Exposed Wireless: Wireless Security Secrets & Solutions by Johnny Cache, Vincent Liu, 2007-03-26
  9. uCertify Guide for EC-Council Exam 312-49 Computer Hacking Forensic Investigator: Pass your CHFI Certification in first attempt (Volume 1) by uCertify team, 2010-04-08
  10. Hack Attacks Revealed: A Complete Reference with Custom Security Hacking Toolkit by John Chirillo, 2001-04-05
  11. Hacking Windows Vista: ExtremeTech by Steve Sinchak, 2007-05-29
  12. Hacking BlackBerry: ExtremeTech by Glenn Bachmann, 2006-10-30
  13. Hacking Web Services (Internet Series) by Shreeraj Shah, 2006-08-02
  14. The Oracle Hacker's Handbook: Hacking and Defending Oracle by David Litchfield, 2007-01-30

81. Hacking Tricks Tips Latest Tricks & Update
Computer Tricks and Tips hacking Tricks and Tips Tools hacking Software hacking Tricks Tips How to Hacks Computer pc Computer tips blog email tricks latest hacking tricks
http://www.hackingtrick.com/

82. Hacking | GHacks Technology News
The FBI claims to have cracked a major cybercrime network and made more than 100 arrests in the US according to the BBC. The suspected members worked as mules for fraudsters
http://www.ghacks.net/category/hacking/

83. What Is Computer Hacking?
Brief and Straightforward Guide What is Computer hacking? Computer hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the
http://www.wisegeek.com/what-is-computer-hacking.htm

84. Hacking Work: Managing Guilty Secrets | Fast Company
Bill Jensen and Josh Klein's new book, hacking Work is about righteous rulebreaking. Here, the authors discuss breaking taboos to change the workplace, starting with telling
http://www.fastcompany.com/article/hacking-work-managing-guilty-secrets
document.write(''); Using a mobile device? Go to m.fastcompany.com for our mobile version. RSS Member Login
Username or e-mail address: Sign Up Required Field Registering for Fast Company is easy, just fill in the blanks above and submit a comment. Once your account is approved, update your profile page and start a discussion. Your email will not be shared with the public, or any third-party advertisers. Login or Signup
document.write('');
Hacking Work: Managing Guilty Secrets By: Bill Jensen and Josh Klein October 26, 2010 Bill Jensen and Josh Klein's new book, "Hacking Work" is about righteous rule-breaking. Here, the authors discuss breaking taboos to change the workplace, starting with telling your boss why the company is broken.
We begin this installment on hacking work with a nod to both Fast Company and Ideo. In her post, " How to Turn Social Taboos Into Innovative Products ," Ideo designer Betsy Fields lists four core approaches: 1. Know the taboos: What topics are discussed only behind closed doors.
2. Respect embarrassment: Let people know it's Okay to discuss taboos.

85. Hacking
Everything from the cime of hacking to Howto s of making keyloggers and viruses . Hey /r/hacking, a Friend of Mine Created a Simple Buffer Overflow
http://www.reddit.com/r/hacking/

86. Hacking Democracy - Official Website And DVD
hacking Democracy The HBO documentary. DVD now available here
http://hackingdemocracy.com/
If you can see this your browser doesn't support frames, or this feature is switched off.

87. Hacking Linux Exposed
Companion Website to hacking Linux Exposed, Osborne/McGrawHill. Source code from the book, updates, and other tools to secure your Linux system.
http://www.hackinglinuxexposed.com/
Hacking Linux Exposed, 3rd edition Hacking Linux Exposed, 3rd edition is coming out in August. Preorder it at amazon.com . Written by the folks at ISECOM . We should really have them supply us some text to put here...
Secure your Linux network by thinking like an attacker. In Hacking Linux Exposed, Second Edition we are able to cover Linux hacking in more detail than ever before. We are able to show you where Linux may differ from other Unix-like systems and give you Linux-specific countermeasures that you can implement immediately. In the hard-hitting style of Hacking Exposed Hacking Linux Exposed, Second Edition once again dives into the actual attacks used by the enemy. Look no further for the actual exploitation techniques used to surreptitiously gain access to Linux systems. Hacking Linux Exposed, Second Edition covers the myriad ways a malicious hacker will attack your Linux system, and the rationale behind such behaviour. While the bad guys are well versed in such techniques, this book serves to educate the home user as well as the overworked and underpaid system administrator who is not only responsible for the operation of mission-critical Linux servers, but who must vigilantly secure them on a daily basis. For more information, see the

88. Hack N Mod - Amazingly Cool Hacks, Mods, And DIY Projects
Thousands of hacking projects and tutorials hack your iPod, cell phone, Xbox 360, lasers, case mods, airsoft We hack them all!
http://www.hacknmod.com/
var AKPC_IDS = ""; Featured: Aquarium Coffee Table Search Hacks:
iTunes on the Wii
DIY Awesome Soldering Stations
EyeBorg: False Eye Camera Implant
Flat Screen Hacked into Virtual Pinball Cabinet ...
Iron Man Repulsor: Blue Laser Project
The Iron Man repulsor light laser shoots a beam of crisp, blue laser light directly out from your palm. We've seen some similar Iron Man projects which recreate the rupulsor effect when Iron Man...
DIY FM Spy Microphone for Remote Surveillance
We've featured loads of DIY spy projects before and this FM microphone bug is the perfect miniature build for remote audio spying.  The extremely detailed 16 page tutorial walks you through building the transmitter which is tiny yet capable of...
Motion Controlled Talking Halloween Skeleton
Halloween always provides superb inspiration for the DIY community. You can see some creative designs in our Top 30 Incredible DIY Halloween Props list. Another great addition to our collection is this Halloween Skeleton built around an...
Top 30 Incredible DIY Halloween Props
We've scoured the web to find the most spooky, errie, and detailed Halloween props out there.  Are you ready for Halloween yet?  If not, here's loads of inspiration to get your project started. For the remaining few days leading up to Halloween,...

89. Hacking The Xbox
Xbox Security Secrets Hardware Mod Tutorials - Interviews with Master Hackers - The Chilling Effects of the DMCA (An Introduction to Reverse Engineering
http://hackingthexbox.com/
Xbox Security Secrets - Hardware Mod Tutorials - Interviews with Master Hackers - The Chilling Effects of the DMCA
(An Introduction to Reverse Engineering) Andrew "bunnie" Huang

Sample Pages
Table of Contents

Starter Hacks

Circuit Boards

Hardware
... Has my order shipped yet?
This hands-on guide to hacking was cancelled by the original publisher, Wiley, out of fear of DMCA-related lawsuits. After a period of direct distribution by the author, "Hacking the Xbox" is brought to you by the No Starch Press . The book begins with a few step-by-step tutorials on hardware modifications that teaches basic hacking techniques as well as essential reverse engineering skills. The book progresses into a discussion of the Xbox security mechanisms and other advanced hacking topics, with an emphasis on educating the readers on the important subjects of computer security and reverse engineering. Hacking the Xbox includes numerous practical guides, such as where to get hacking gear, soldering techniques, debugging tips and an Xbox hardware reference guide.
"Hacking the Xbox" confronts the social and political issues
facing today's hacker. The book introduces readers to the humans

90. Hacking News And Other Resources | ZDNet
Collection of news articles, blog posts, white papers, case studies, videos and comments relating to hacking
http://www.zdnet.com/topics/hacking

91. Hacking - Security - Software - High-Tech - News
A man fired as IT director for a Richmond, Virginia, seller of telecom equipment has been sentenced to 27 months in prison for hacking into his former
http://www.wikio.co.uk/high-tech/software/security/hacking
@import url(http://st0.wk.io/v201010291724/shared/css/all.css); @import url(http://st1.wk.io/v201010291724/shared/css/screen/reset.css); @import url(http://st2.wk.io/v201010291724/shared/css/screen/commonBase.css); @import url(http://st3.wk.io/v201010291724/shared/css/screen/browsers.css); @import url(http://st0.wk.io/v201010291724/shared/css/screen/commonRepeatedImages.css); @import url(http://st1.wk.io/v201010291724/shared/css/screen/commonBlocks.css); @import url(http://st2.wk.io/v201010291724/shared/css/screen/commonLayout.css); @import url(http://st3.wk.io/v201010291724/shared/css/screen/commonContent.css); @import url(http://st0.wk.io/v201010291724/shared/css/screen/commonGizmos.css); @import url(http://st1.wk.io/v201010291724/shared/css/screen/commonCategories.css); @import url(http://st2.wk.io/v201010291724/shared/css/screen/commonMockups.css); @import url(http://st3.wk.io/v201010291724/shared/css/screen/contentPageSource.css); @import url(http://st0.wk.io/v201010291724/shared/css/screen/contentPageBuzz.css); @import url(http://st1.wk.io/v201010291724/shared/functions/plugins/autocomplete/jquery.autocomplete.css);

92. Ilmu Hacking
Blog yang membahas tentang hacking dan keamanan komputer.
http://www.ilmuhacking.com

93. Hacking - News, Reviews, Blogs And White Papers For Technology & Enterprise IT 
Latest news about hacking, Attorney, CanSecWest, District Court, Gary, Gary McKinnon, TippingPoint, contest, crack, credit card, cyber, cybercrime, extradition, prison, prize
http://search.techworld.com/tag/hacking
Go to: Browse site Techworld Home News Reviews Features Blogs Downloads Slideshows White Paper Library How-tos Techworld Awards Video Library Storage Applications Virtualisation Personal Tech Green IT Security Operating Systems Networking Data Centre SME
hacking
Latest News

94. Arduino - Hacking
Learning Examples Foundations hacking Links. Extending and Developing Arduino. Software. Writing a Library creating libraries to extend the
http://www.arduino.cc/en/Hacking/HomePage

95. Wired 14.05: The RFID Hacking Underground
They can steal your smartcard, lift your passport, jack your car, even clone the chip in your arm. And you won t feel a thing. 5 tales from the RFIDhacking
http://www.wired.com/wired/archive/14.05/rfid.html

96. PC Hacks | Learn How To Hack
Includes step by step tutorials, hacking tips,computer hacking software and tools and how to guides . Great place to learn how to hack !
http://hackspc.com/
Sunday 31st of October 2010 I wish this book was around when I began my journey to learn how to hack. It was made specifically for the beginners who really want to get into hacking and for those of us who began and got lost. [Read more of this review] How To Hack Passwords Looking easy way to hack passwords? Hacking passwords or monitoring who your partner talks with on the internet has never been easier. This is truely a 1-minute-set-up software, that records litterarely EVERYTHING typed into your PC. [Read more of this review]
Recently at the Blog
DJ Mixer Software Free Download Creating and mixing several music and sounds together to give another new music is one of the creativity of the Disk Jockeys. In the club and disco, you can see DJ’s using lots of electronic equipments to transform and remix the original music to make it more lovely and likeable. But in real life if we want to be the DJ it might not be possible. Because... [Read more of this review] Free Typing Software Who might not want to have speedy typing in typical QWERTY keyboard? You might search for good typing tutor software in internet. The consequence is you end up with purchasing some typing software which is not worth a buck; because there are large list of free typing software available to help you increase your typing speed. But sometimes you may also...

97. Hacking The Academy
More hacking Criticisms of this Book News Home hacking the Academy is a project of the Center for History and New Media, George Mason University.
http://hackingtheacademy.org/
Hacking the Academy
A Book Crowdsourced in One Week
May 21-28, 2010
What This Is, and How to Contribute Next Steps
Table of Contents
Hacking the Academy is a project of the Center for History and New Media George Mason University

98. Social Hacking
Oct 25, 2010 Posted by theharmonyguy in Facebook No comments Thoughts on the Wall Street Journal s Facebook Investigation. A frontpage story in last
http://theharmonyguy.com/
Oct. 25, 2010 Posted by theharmonyguy in Facebook No comments
A front-page story The report generated controversy across the Web, and some reactions were strongly negative. On TechCrunch, Michael Arrington dismissed the article surveyed other responses Sep. 21, 2010 Posted by theharmonyguy in Facebook General 2 comments
Instant Personalization Program Gets New Partner, Security Issue ...
reported on the cross-site scripting (XSS) holes, and made this prediction Aug. 19, 2010 Posted by theharmonyguy in Facebook 4 comments
Facebook Places Brings Simple Location Sharing to the Masses
Inside Facebook has a run-down of the overall functionality. Jul. 27, 2010 Posted by theharmonyguy in General 1 comment
Security Through Obscurity and Privacy in Practice
Yesterday, security researcher Ron Bowes published a 2.8GB database of information collected from public Facebook pages. These pages list all users whose privacy settings enable a public search listing for their profile. Bowes wrote a program to scan through the listings and save the first name, last name, and profile URI of each user (though only if their last name began with a Latin character). The database includes this data for about 171 million profiles. Pete Warden Jul. 26, 2010

99. An Educator's Guide To Hacking
One fraudulent act that is illegal in some ways and helpful in others is hacking . hacking is basically knowing programmable systems and how they work.
http://education.illinois.edu/wp/crime-2002/hacking.htm
Computer Hacking Addendum Written by Ginger Kastor , Millburn C.C. School, Wadsworth, Illinois
Original
by David M. Stone, University Laboratory High School, Urbana, IL Introduction Issues Educators can warn students about the complications of the works of hackers and crackers. By educating students about hackers, they can take proper steps in trying to secure themselves from having their information stolen or their computers broken into by unauthorized people to the best of their ability. The educators can also show students that they are ultimately in control of their actions on the computer. Their actions, if illegal, can get them into major trouble. Educators can talk to students about the consequences of their actions and talk openly about computer ethics. The students should be able to discuss right from wrong on the computer and Internet as well as other parts of their lives. Minimizing Potential One way to minimize the consequences of having a hacker is by protecting the computer system. This is comparable to locking you doors to your house when you leave so you know that breaking and entering is illegal, but that doesn't mean that you leave your doors unlocked. Protection against hackers is basically the same thing. First the software has to be safe and stable so you can rely on it being secure. The second part is the government's job of certifying that the software used is really tested and reliable for the commonwealth interest. Lastly, have firewalls in place and make sure that encryption and other protection are used to have information remain private. By educators and other computer owners using these three steps, the hackers will have a more difficult time getting information that is supposed to remain private.

100. Hack In The Box :: Keeping Knowledge Free
Oct 29, 2010 “Both countries face the challenge of Advanced Persistent Threat (APT), which is a longterm pattern of sophisticated hacking attacks aimed
http://www.hackinthebox.org/

Page 5     81-100 of 140    Back | 1  | 2  | 3  | 4  | 5  | 6  | 7  | Next 20

free hit counter