Geometry.Net - the online learning center
Home  - Book_Author - Hackers The

e99.com Bookstore
  
Images 
Newsgroups
Page 2     21-40 of 180    Back | 1  | 2  | 3  | 4  | 5  | 6  | 7  | 8  | 9  | Next 20
A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

         Hackers The:     more books (99)
  1. The Database Hacker's Handbook: Defending Database Servers by David Litchfield, Chris Anley, et all 2005-07-14
  2. The Hacker Diaries : Confessions of Teenage Hackers by Dan Verton, 2002-03-26
  3. The Downhill Lie: A Hacker's Return to a Ruinous Sport (Vintage) by Carl Hiaasen, 2009-05-05
  4. The Mac Hacker's Handbook by Charles Miller, Dino Dai Zovi, 2009-03-03
  5. Certified Ethical Hacker Exam Prep by Michael Gregg, 2006-04-17
  6. The Best of 2600: A Hacker Odyssey by Emmanuel Goldstein, 2008-07-28
  7. Developmental Exercises to Accompany Rules for Writers by Diana Hacker, 2007-10-15
  8. The Ultimate Pipe Book by Richard Carleton Hacker, 1989-09
  9. Off Center: The Republican Revolution and the Erosion of American Democracy; With a new Afterword by Professor Jacob S. Hacker, Professor Paul Pierson, 2006-09-26
  10. Developmental Exercises to Accompany A Writer's Reference by Diana Hacker, 2006-12-06
  11. A Hacker Manifesto by McKenzie Wark, 2004-10-04
  12. Love, Death, and the Changing of the Seasons by Marilyn Hacker, 1995-03-17
  13. Hackers: Heroes of the Computer Revolution by StevenLevy, Steven Levy, 2000-12-31
  14. The Bedford Handbook by Diana Hacker, 2010-06

21. Discovery Online, Hackers' Hall Of Fame
Hackers Hall of Fame. A Hackers' GLOSSARY back door n. In the security ofa system, a hole deliberately left in place by designers or maintainers.
http://www.discovery.com/area/technology/hackers/glossary.html
A HACKERS' GLOSSARY back door n. In the security of a system, a hole deliberately left in place by designers or maintainers. May be intended for use by service technicians. Syn. trap door. bit bucket n. 1. The universal data sink. Discarded, lost or destroyed data is said to have gone to the bit bucket . Sometimes amplified as The Great Bit Bucket in the Sky cracker n. One who breaks security on a system. Coined by hackers in defense against journalistic misuse of the term "hacker." The term "cracker" reflects a strong revulsion at the theft and vandalism perpetrated by cracking rings. There is far less overlap between hackerdom and crackerdom than most would suspect. deep magic n. An awesomely arcane technique central to a program or system, esp. one that could only have been composed by a true wizard. Many techniques in cryptography, signal processing, graphics and artificial intelligence are deep magic. foo 1. interj. Term of disgust. 2. Used very generally as a sample name for absolutely anything, esp. programs and files. ... etymology is obscure. hacker n. 1. A person who enjoys exploring the details of programmable systems and how to stretch their capabilities. 2. One who programs enthusiastically. 3. A person who is good at programming quickly. 4. An expert at a particular program, as in 'a Unix hacker'. 5. [deprecated] A malicious meddler who tries to discover sensitive information by poking around. The correct term for this sense is "cracker."

22. Old And New Hacker Ethics
Is there a Hacker Ethic for 90s Hackers?
http://www.fiu.edu/~mizrachs/hackethic.html
Is there a Hacker Ethic for 90s Hackers?
by Steven Mizrach
Introduction
The goal of this text analysis project was to take the texts of the computer underground and to analyze them for the presence of a) knowledge about the Hacker Ethic and b) evolution of that Ethic. Many writers, such as Steven Levy, bemoan the fact that modern-day hackers (the computer underground) are not worthy of the name because they do not live up to the principles of the original Hacker Ethic, and as unethical individuals, should simply be called "computer terrorists" or "juvenile delinquents." I sought to examine whether 90s new hackers knew of the old Hacker Ethic, if they had added anything to it, and the reasons why they felt they acted differently from their predecessors. I broadened my text analysis to look at what they saw as ethical violations, and reasons why some might repudiate the Hacker Ethic or the idea of having an ethic. As my text project evolved, I found that after discovering the existence of a new hacker ethic for new hackers, I was wondering if people expressing the principles of the new ethic also expressed the old. I expected that the adoption of a new set of ethics would not necessarily mean the complete abandonment of the old. This would establish some continuity between both groups of hackers, and some familiarity by new hackers with the old ideals. If the hypothesis of continuity turns out to be true, then new hackers are not as different from old hackers as authors like Levy (or certain computer security professionals) might claim. They would then not only have their own ethics, but also utilize some ethical principles of their predecessors.

23. Wired News: Congress No Haven For Hackers
Even as the world's geeks march against the Digital Millennium Copyright Act, key legislators and lobbyists are dismissing concerns about the controversial law as hyperbole. By Declan McCullagh.
http://www.wired.com/news/politics/0,1283,45522,00.html
Welcome to Wired News. Skip directly to: Search Box Section Navigation Content Search:
Wired News Animations Wired Magazine HotBot (the Web)
Congress No Haven for Hackers
By Declan McCullagh Also by this reporter Page 1 of 2 next
02:00 AM Jul. 25, 2001 PT The law that led to the arrest of Russian programmer Dmitry Sklyarov last week and an immediate outcry among programmers continues to enjoy remarkably broad support on Capitol Hill. No bill has yet been introduced in Congress to amend the DMCA for one simple reason: Official Washington loves the law precisely as much as hackers and programmers despise it.
Story Tools
See also
Today's Top 5 Stories
"The law is performing the way we hoped," said Rep. Howard Coble (R-North Carolina), chairman of the House Judiciary subcommittee on intellectual property. The FBI arrested Sklyarov last week in Las Vegas for allegedly "trafficking" in software that circumvents the copy protection techniques that Adobe uses in its e-book format. Under the DMCA, selling such software is a federal felony

24. Frontline: Hackers: Who Are Hackers?
are Hackers outlaws or watchdogs arrow The views of Bruce Schneier, an expert incryptography and computer security; Reid and Count Zero, members of the Cult
http://www.pbs.org/wgbh/pages/frontline/shows/hackers/whoare/
var loc = "../../../";
This young hacker was caught breaking into NASA's computers and sentenced to six months in jail. The government says that at one time, he took possession of $1.7 million in software. In his interview he talks about the weaknesses he found in the government's computers and how he had warned them. Because of his age, FRONTLINE is protecting his identity.
Reid and Count Zero are members of the Cult of the Dead Cow , a hacker organization which developed "Back Orifice," a computer program which allows the user to remotely view and control any computer running Windows 95 or later. They say the developed the program to demonstrate the weak security in Microsoft products.
Curador is a 18-year old hacker from rural Wales who in the winter of 2000 stole an estimated 26,000 credit cards numbers from a group of e-commerce web sites, and posted the numbers on the web. After ex-hacker Chris Davis tracked him down, Curador was arrested in March 2000, and charged under the United Kingdom's computer crime statute.
The views of Bruce Schneier, an expert in cryptography and computer security; Reid and Count Zero, members of the Cult of the Dead Cow hacker organization; Robert Steele of Open Source Solutions; Robert Giovagnoni of iDEFENSE; Martha Stansell-Gamm, chief of the U.S. Justice Dept's Computer Crime section; and Steven Lipner, Microsoft security analyst.

25. Security System Hackers Group
Raccoglie articoli, link, programmi e script utili per aumentare la sicurezza dei propri sistemi e conoscere le tecniche impiegate dagli hacker,
http://www.babulon.bbk.org/index.shtml

26. Hackers Counter
LAIKS. 19.03.2003 030905. Gribi šadu skaititaju? Hackers counter system REGISTREJIES!Klume Apskatities darbiba var counter.Hackers.lv lapa.
http://counter.hackers.lv/

27. Hackers Attack NASA, Navy
NASA, the Navy, and university campuses throughout the nation were the targets Monday evening of denial of service attacks on computers running Microsoft Windows NT and Windows 95 operating systems. News.com
http://www.news.com/News/Item/0,4,19674,00.html?st.ne.fd.mdh

28. Hackers Internet Cafe - Kaitaia, New Zealand
Place for internet and networked gaming, located in Kaitaia.
http://www.hackers.co.nz/
This Page has been viewed
CountZ.com Times since 01-01-01 84 Commerce Street, Kaitaia: Ph (09) 408-4999 - Fax (09) 408-4222 Welcome to Hackers Internet Cafe, found in the small town of Kaitaia, in the sunny, winterless north of New Zealand. Click here for a list of Internet cafes in New Zealand.

29. Wired News: Lego Hackers Go Deeper
It was only a matter of time before programmers mastered the toy's robot kit and craved more. Now, an opensource project hopes to drill down to the silicon. By Chris Oakes. Wired News
http://www.wired.com/news/technology/0,1282,18065,00.html
Welcome to Wired News. Skip directly to: Search Box Section Navigation Content Search:
Wired News Animations Wired Magazine HotBot (the Web)
Lego Hackers Go Deeper
Page 1 of 2 next
03:00 AM Feb. 23, 1999 PT Since Lego building blocks became programmable in September, hackers have gravitated to the kids' toy, breathing carbon life and their programming dreams into moving, crawling, light-sensing Lego robots. No wonder then that the Lego world is abuzz with LegOS , a new open-source operating system for the Lego robots.
Story Tools
Today's Top 5 Stories
"What [LegOS] is doing is exposing the full power of the processor to hackers," said Fred Martin, a research scientist at MIT's Media Lab The Media Lab was the breeding ground for the Lego Mindstorms product. Martin worked on the technology that led to the robots, his team's work sponsored by Lego. "They're definitely blazing new ground," Martin said. "Basically, [LegOS is] letting you get at the guts of the RCX and do whatever you want." RCX stands for Robotic Command Explorer and is the name of the computerized brain of the programmable Lego sets. LegOS is the brainchild of Markus Noga, a programmer and robotics enthusiast based in Europe. Although he could not be reached for comment, his LegOS Web page explains his intentions.

30. [ISTF] InfoSecurity Task Force
Translate this page Prezados usuários,. O domínio www.Hackers.com.br não está mais em uso. Porfavor, direcionem seus browsers para o endereço http//www.istf.com.br/.
http://www.hackers.com.br/

31. PROJECT GUTENBERG OFFICIAL HOME SITE -- Listing By AUTHOR
The Hackers.
http://promo.net/cgi-promo/pg/cat.cgi?&label=ID&ftpsite=ftp://ibiblio.or

32. Wired News: Hackers Happy Campers
Chaos Computer Club members pitch their tents on a farm on the outskirts of Berlin. They're geared up for a weekend of hacking, networking, and swimming. Steve Kettmann reports from Berlin. Wired News
http://www.wired.com/news/culture/0,1284,21159,00.html
Welcome to Wired News. Skip directly to: Search Box Section Navigation Content Search:
Wired News Animations Wired Magazine HotBot (the Web)
Hackers Happy Campers
Page 1 of 2 next
03:00 AM Aug. 07, 1999 PT BERLIN It takes countless hours cooped up indoors in front of a computer screen to truly appreciate the giddy mood at this weekend's three-day Chaos Communication Camp. By Friday evening, more than 1,400 hackers, encryptologists, computer visionaries, and assorted geeks had pitched their tents in a scenic lakeside field, and more were on their way.
Story Tools
Today's Top 5 Stories
See also: Chaos in Berlin An afternoon of workshops gave way to a warm evening of lounging in front of tents, as people pounded away at keyboards and greeted acquaintances they had met only via networks or email. "It's a way to attach faces to email addresses," said John Gilmore, one of the founders of the San Francisco-based Cypherpunks. "It's a way to say, 'Hey, I know this person, we've been collaborating for years. Who are you?'"

33. Hackers
Hackers gets into the mindset of those people who push the computer past the envelopesof expectionssitting at the keyboard these are artists, pioneers
http://mosaic.echonyc.com/~steven/hackers.html
Heroes of the Computer Revolution M y first book and probably the most popular, even sixteen years after publication. Hackers gets into the mindset of those people who push the computer past the envelopes of expectionssitting at the keyboard these are artists, pioneers, explorers. It is here that I introduced the concept of The Hacker Ethic Access to computers should be unlimited and total. Always yield to the Hands-On Imperative All information should be free. Mistrust authoritypromote decentralization. Hackers should be judged by their hacking. You can create art and beauty on a computer. Computers can change your life for the better. The book is in three parts, exploring the canonical AI hackers of MIT, the hardware hackers who invented the personal computer industry in Silicon Valley, and the third-generation game hackers in the early 1980s. Penguin, $14.00. You can order Hackers directly from Amazon.com. Also available in Japan, UK (Penguin), and Italy. Other books: Artificial Life Insanely Great The Unicorn's Secret and Crypto A more recent book about hackers (in the less delightful sense of the word, meaning people who crack into stuff) is Bruce Sterling's fine

34. Laugh Along With GNU - GNU Project - Free Software Foundation (FSF)
Designed to provide some laughs to the working Hackers large collection of GNU/programming humor.
http://www.gnu.org/fun/humor.html
Laugh along with GNU
Chinese(Simplified) Chinese(Traditional) English Japanese
Table of contents
Introduction
This is a web page designed to provide some laughs to the working hackers.
It contains software, documentation, music, poems, etc. submitted by GNU users and collected by GNU contributers over the years. Many of the graphics in the GNU Art Gallery also have humorous twists.
Create More Laughs
Here are some more laughs that could be added here. Humor submissions are welcome and encouraged. Please read Humor Submission Guidelines for details about submitting content for the humor section. Please send us, webmasters@gnu.org , your ideas for more laughs to be added to this page and this web site!
Software
Music

35. Political Hackers Hit 300 Sites
More than 300 Web sites fell victim to a politically motivated hack this weekend, marking what might be one of the largest mass home page takeovers ever. News.com
http://www.news.com/News/Item/0,4,23881,00.html?st.ne.fd.mdh

36. Hackers (1995)
Atari demo group.Category Computers Systems Atari ST...... Hackers Society; Goldy / Therapy; Gozer/ Flash^Kruz; More scenenews. (c) Copyright 19942003, Dead Hackers Society.
http://www.imdb.com/Title?Hackers (1995)

37. Wired News: Beck Sliced, Diced By Culture Hackers
Can the king of sampling abide being appropriated by critics of copyright restrictions? Wired News
http://www.wired.com/news/culture/0,1284,10436,00.html
Welcome to Wired News. Skip directly to: Search Box Section Navigation Content Search:
Wired News Animations Wired Magazine HotBot (the Web)
Beck Sliced, Diced by Culture Hackers
Page 1 of 1
10:45 AM Feb. 20, 1998 PT The 13-track CD, Deconstructing Beck , isn't available at your local record store. Its own creators readily acknowledge the illegality of the project, which its sponsor - a San Francisco-based coalition of art academics and pranksters who call themselves rtmark - referred to in a press release as a "Beck rip-off." The CD is available only by mail order from partner Illegal Art , the brainchild of a Dartmouth grad student in music who has adopted the nom de guerre of Philo T. Farnsworth, one of the inventors of television. The Illegal Art site is hosted by the third partner in crime, detritus.net , which declares its mission to be to defend the rights of artists to "recycle" cultural information into new forms.
Story Tools
Today's Top 5 Stories
Beck himself - who is in the studio, recording the follow-up to Odelay for Geffen - has not yet heard the disc, but his management representative, Shauna O'Brien, says he is interested in hearing a copy.

38. Honeypots: Tracking Hackers
Honeypots Tracking Hackers A security resource who's value lies in beingprobed, attacked, or compromised. http//trackingHackers.nihilisme.ca.
http://www.tracking-hackers.com/
Honeypots: Tracking Hackers A security resource who's value lies in being probed, attacked, or compromised. Whitepapers and Resources
Honeypots Solutions

Honeypots Maillist

Honeypot Research Organizations
...
Mirrors

Just announced, next SANS Honeypot: Tracking Hackers
course will be July 14-16 in Washington, D.C. New mirror sponsored by Pascal Gauthier in Canada!
http://tracking-hackers.nihilisme.ca

39. Wired News: Hackers Frolic In The Woods
The HIP 97 conference in the Netherlands, like its companion festival in New York, is a chance to do some technopagan bonding. Wired News
http://www.wired.com/news/culture/0,1284,5918,00.html
Welcome to Wired News. Skip directly to: Search Box Section Navigation Content Search:
Wired News Animations Wired Magazine HotBot (the Web)
Hackers Frolic in the Woods
Page 1 of 1
06:13 PM Aug. 08, 1997 PT One of the first things participants see upon arriving at HIP 97 - a gathering this weekend of 2,500 members of the international hacking community at a campground about 30 minutes from Amsterdam - is a gravestone engraved with Bill Gates' name and the epitaph "Where do you want to go today?" "All the hackers just go crazy when they see that," event coordinator Maurice Wessling says of this goad to the fest's resolutely anti-authoritarian participants. The marker also serves, however - along with the event's willfully obscure location - to increase the sense of the site as underground and removed from the routine world. "We are trying to disconnect people from their daily whereabouts," Wessling says, "to force them to take a different approach to reality."
Story Tools
Today's Top 5 Stories
HIP - the name stands for Hacking in Progress, a follow-up of sorts to 1993's Hacking at the End of the Universe convocation - is a kind of politicized Burning Man for hackers, tent-cities and all-night parties included. Its technopaganism is skewed pretty far toward the techno side, though. HIP is a gathering, says an amused Wessling, where "you'll see these very small igloo-like tents with 17-inch monitors in them."

40. HackersCatalog.com - Hacking Homepage!
Thank you for Choosing Hackers Catalog The Technical Bookstore . Learn from thebest Hackers how to access email accounts, servers, networks and more.
http://www.hackerscatalog.com/

A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

Page 2     21-40 of 180    Back | 1  | 2  | 3  | 4  | 5  | 6  | 7  | 8  | 9  | Next 20

free hit counter