Geometry.Net - the online learning center
Home  - Computer - Hacking

e99.com Bookstore
  
Images 
Newsgroups
Page 5     81-100 of 186    Back | 1  | 2  | 3  | 4  | 5  | 6  | 7  | 8  | 9  | 10  | Next 20

         Hacking:     more books (100)
  1. Hacking the Human by Ian Mann, 2008-11-01
  2. Hacking GMail (ExtremeTech) by Ben Hammersley, 2005-12-19
  3. Windows Server 2003 (Hacking Exposed) by Joel Scambray, Stuart McClure, 2006-10-27
  4. The CEH Prep Guide: The Comprehensive Guide to Certified Ethical Hacking by Ronald L. Krutz, Russell Dean Vines, 2007-10-22
  5. Hardware Hacking: Have Fun While Voiding Your Warranty by Joe Grand, Ryan Russell, 2004-01-01
  6. Hacking the Earth by Jamais Cascio, 2009-01-01
  7. Hacking Knoppix (ExtremeTech) by ScottGranneman, 2006-01-04
  8. Hacking Exposed Wireless: Wireless Security Secrets & Solutions by Johnny Cache, Vincent Liu, 2007-03-26
  9. uCertify Guide for EC-Council Exam 312-49 Computer Hacking Forensic Investigator: Pass your CHFI Certification in first attempt (Volume 1) by uCertify team, 2010-04-08
  10. Hack Attacks Revealed: A Complete Reference with Custom Security Hacking Toolkit by John Chirillo, 2001-04-05
  11. Hacking Windows Vista: ExtremeTech by Steve Sinchak, 2007-05-29
  12. Hacking BlackBerry: ExtremeTech by Glenn Bachmann, 2006-10-30
  13. Hacking Web Services (Internet Series) by Shreeraj Shah, 2006-08-02
  14. The Oracle Hacker's Handbook: Hacking and Defending Oracle by David Litchfield, 2007-01-30

81. - The ICQ Hacking Page -
Great hacking website. Site dedicated to archiving 1000s of recent and historic hackingtexts and binaries. Belgian group specialized in hacking and phreaking.
http://www.algonet.se/~henisak/icq/
What's new? ICQ V5 specs updated. Added two other files by Manish Jethani, icqcrypt.c and icqcrypt.h. Added a new encryption example, IcqCrypt.cpp by Manish Jethani. Fixed the broken image and added some new stuff. ICQ V5 specs updated, TOC protocol and ICQ database specs added. Added new links and removed old. ICQ V5 specs updated, "ICQ box" link updated. General information If you need more information, or want to contribute, there are (at least) two ways. Join the mailing list, or visit the web based forum.
  • ICQ-Devel - Mailing list for discussions related to the ICQ protocol. ICQ Forum - Web based discussion forum.
Please do not send questions about the protocol directly to me, send them to the mailing list. I am on the mailing list, and if you don't get an answer there, you won't get one from me either. If have questions or suggestings regarding this page, you're welcome to send them to: icq@boing.nu

82. The World Of Game Hacking [CES]

http://www.gamehacking.com/
To view this Web Site, you need a frame capable browser.

83. Shift.com - Feature - HACKING FOR DEMOCRACY
Interview with Oxblood Ruffin, founder of Hacktivismo, about the ethics of political hacking. By Mark Moyes. Shift
http://www.shift.com/print/web/396/1.html
HACKING FOR DEMOCRACY
Shift.com talks to Oxblood Ruffin, founder of Hacktivismo, about the ethics of political hacking. by mark moyes page 1   The term "hacktivism" isn't new. Neither is the concept: For the past two years in a row, hacktivists brought down the World Economic Forum site at their annual meetings; more recently, hackers targeted the Recording Industry Association of America's website after they backed a bill that would allow the RIAA to electronically disrupt peer-to-peer networks like Morpheus or KaZaA. There are literally hundreds of examples and even a website dedicated to the cause. But last month, the international hacker group Hacktivismo announced open-source tools that would take hacktivism to the next level. Their tools are designed specifically to allow residents in countries with firewalls such as China and Iran to access and transmit information. Camera/Shy, a web-based steganographic application, lets users hide digital content within an image such as text, another image, or even an mp3. Six/Four is a "stealthy" peer-to-peer protocol that allows users to fly under the radar of filtering software. Oxblood Ruffin, the founder of Hacktivismo, joked that the group was "turning the web into Drag Queens for Democracy: You know, what you see is not what you get." But it brings up interesting ethical questions: When you're preaching an essentially political message, how much responsibility do you have for people who are imprisoned for using your software? On the one hand, political bodies like the U.S. have been criticized for meddling where they don't belong; on the other hand, in times of mass genocide for example, the U.N. has been criticized for not doing enough.

84. CNN In-Depth Specials - Hackers - Two Views Of Hacking
Two views of hacking. For different nefarious. Nothing could be furtherfrom the truth. Full Interview. 'hacking is a felony'. (CNN
http://www.cnn.com/TECH/specials/hackers/qandas/
MAIN PAGE WORLD ASIANOW U.S. ... news quiz
CNN WEB SITES: TIME INC. SITES: Go To ... Time.com People Money Fortune EW MORE SERVICES: video on demand video archive audio on demand news email services ...
pagenet

DISCUSSION: message boards chat feedback
SITE GUIDES: help contents search
FASTER ACCESS: europe japan
WEB SERVICES:
Main Page
Bracing for Cyberwar Hacking Primer Scenes from the 'Hacker Underground' ... Related Sites
Two views of hacking
For different perspectives on hacking, CNN Interactive posed a series of questions via e-mail to two experts in the field, one a computer security expert for IBM, the other, editor of 2600, the Hackers' Quarterly.
'Hackers are necessary'
(CNN) Emmanuel Goldstein is the editor-in-chief of 2600: The Hacker Quarterly and hosts a weekly radio program in New York called "Off the Hook." 1. How do you define hacking?
Hacking is, very simply, asking a lot of questions and refusing to stop asking. This is why computers are perfect for inquisitive people they don't tell you to shut up when you keep asking questions or inputting commands over and over and over. But hacking doesn't have to confine itself to computers. Anyone with an inquisitive mind, a sense of adventure and strong beliefs in free speech and the right to know most definitely has a bit of the hacker spirit in them. 2. Are there legal or appropriate forms of hacking?

85. Frequent Ask Questiong 4 Hackers
Een FAQ (veel gestelde vragen) over alles wat met hacking te maken heeft, opgezet door de nieuwsgroep alt.hack.nl.
http://www.faq4hackers.nl
Frequently Ask Questions 4 Hackers.
Index
Hacking
Security

Deface
...
maillijst

Updates, het laatste nieuws, forum. dit alles vindt u hier op de website vanwww.faq4hackers.nl. www.faq4hackers.nl is verbonden aan de nieuwsgroep alt.hack.nl . Deze website is daarom ook opgezet om vragen die in alt.hack.nl worden gesteld hier in het forum van antwoord te voorzien. Verder vind u hier bijna alles wat met security, hacking, en gerelateerde onderwerpen te maken heeft. Stel u vragen in het forum van www.faq4hackers.com maar let op !!!! Vragen over lame zaken zoals SUB7 en "hoe hack ik hotmail" worden absoluut niet op prijs gesteld, daarom worden de ip-adressen ook gelogged zodat bij misbruik deze worden door gestuurd naar de abuse afdeling van die gene zijn internetprovider.
:: Nieuwflits:: :: site updates ::
1 mei: Nieuwe lay out van de site online gezet.. Alles is nog onder constructie en pas zondag 5 mei online. ::Links / collega site's:: Moenen
Netric

Webwereld

DSInet
...
Security.nl

86. CNN.com - Student Gets 'A' For Hacking School Computer - Dec. 18, 2002
Student gets 'A' for hacking school computer. Reid, who skipped part of theeighth grade, said he's setting his sights on college, not hacking.
http://www.cnn.com/2002/TECH/internet/12/17/student.hack/
BREAKING NEWS
A U.S. citizen and a Canadian national have been shot to death in Yemen, authorities say. Details soon. CNN Europe CNN Asia Languages Spanish Portuguese German Italian Korean Arabic Japanese On CNN TV Transcripts Headline News CNN International ... Special Reports SERVICES Video Newswatch E-Mail Services CNN To Go SEARCH Web CNN.com
Student gets 'A' for hacking school computer
By Jeordan Legon
CNN
Reid Ellison, 15, works on a computer at school. Story Tools
(CNN) It was a breeze for 15-year-old Reid Ellison to hack into his high school's computer grading system. But what to do once he broke in took a bit more ingenuity. You see, Reid already has a perfect 4.0 grade point average at Anzar High School in San Juan Bautista, California. So to leave his mark, he decided to lower his grades to a 1.9 GPA a meager D+. "I couldn't do what most people would want to do when they hack into the school's computer," Reid said. "So I thought it would be funny to do the opposite." The hacking project, which was sanctioned by the school, left administrators so impressed they gave him a perfect score. The school is now working on fixing the security holes. "I'm helping them with it," said Reid, who's been tinkering with computers since he was in second grade and wants to be an engineer. "I basically came up with three pages to improve the security of the network in general."

87. HIP Smartcard
Information on smart card hacking.
http://cuba.xs4all.nl/~hip/

88. Hacking The Buddha
manifestation.com resources newsletter books hacking the Buddha. Subscribe now! 12,Brevity (1101.97). 11, hacking Dr. Baffa (1007.97). 10, Infoflow (0916.97).
http://www.manifestation.com/buddha/
manifestation.com resources newsletter books Hacking the Buddha Subscribe now! Enter your email address in the box below to be automatically added to the distribution list. You can unsubscribe at any time, and your email address will remain private.
Back Issues Coming of Age on the Internet The Great Kino Defrag The 10 Day Mental Challenge near life experiences ... First Hack This issue Make A Change The last issue, in which we reveal what's in store for manifestation.com.
Hacking the Buddha? Hacking the Buddha is an electronic newsletter devoted to self improvement, learning, and change, with a focus on neuro-linguistic programming (NLP).
webmaster: sabren@manifestation.com www.sabren.com

89. Hacking The Power Grid
Given the increasing number of highprofile attacks on networks hooked to the Internet, what are the chances of a crack on energy plants? By Gene Koprowski. Wired News
http://www.wired.com/news/news/story/12746.html

90. Warez Hacking Cracks MP3 Handy Hacker Passwort Cracker,
Rotalarm.de. Straftaten und Fallen im Internet. Top Crackz, Warez, MP3,Hack. Crack. hacking. MP3. Warez. Diskussionsforen. 4Freeboard. Hacker WebForum.
http://www.warez-hacking-cracks.com/

91. Your Spectrum 09 - Frontlines & Hacking Away
POKEs that simplify the Nightmare Room, improve jumping ability, and that automatically collect all the objects in a room on entry.
http://www.users.globalnet.co.uk/~jimg/yr09/yr09_03.htm
Your Spectrum
Home
Contents KwikPik DOUBLE CHIPS FIRST FORTH ON ROM FOR CURRAH ANIROG DELETE SPECTRUM BBC Radio kicks off with a double-helping of computing this Autumn with Barry Norman re-opening The Chip Shop on Radio 4 and Radio 1 listeners getting their own computer show with the launch of Radio l's Chip Shop which makes up part of the Saturday morning Mark Page Show
The Radio 1 Chip Shop will be broadcast at 7:33 am on Saturday morning, starting on September 29th and will be presented by David Freeman. Free Basicode software will be broadcast on Sunday morning at 5:55am and repeated at the same time on Saturdays. You'll need a Basicode Kit 2 Cater Road, Bristol B513 7TW
If you really can't stand the thought of getting up so early on a Saturday morning, you could always tune into The Chip Shop on Radio 4 at the slightly more reasonable time of 4:15pm though you won't get the software.
Barry Norman broadcast his second show of the series 'live' from the PCW Show on September 22nd this year. Currah, manufacturers of the MicroSpeech unit, has announced a new product to be available from them ... 'soon'.

92. Bunnie's Adventures Hacking The Xbox
bunnie's adventures hacking the Xbox. hacking and copyrights; The real truthabout the Xbox game controllers, their engineers and about Halo (humorous);
http://www.xenatera.com/bunnie/proj/anatak/xboxmod.html
bunnie's adventures hacking the Xbox
For the benefit of repeat visitors, click here to go to the most recently added stuff. Other items of interest:
  • hey! I'm finally done with my PhD thesis on supercomputer architecture ...I can finally spend some more time playing with the Xbox.
  • socket your flash
  • ROM decryption deprecated
  • JTAG pinouts
  • serial EEPROM
  • die shots
  • memory locations in the Xbox updated
  • aerogel capacitor and the real time clock
  • The real truth about the Xbox game controllers their engineers and about Halo (humorous)
  • LDT (Hypertransport) bus tap
  • LPC Multi-I/O expansion card (coming soon)
  • ROM testpoint map
  • Presentation given at CHES2002 . CHES is the Cryptographic Hardware and Embedded Systems conference. Xbox(TM) is a trademark of Microsoft Corporation
    Socket for your TSOP FLASH (29F080A-70) in the Xbox)
    I figure there are a lot of great software hackers out there going at the xbox to put linux on it (okay so this is written within a week after its intro, so give me a break if this is out of date). I'm more of a hardware-type, so here's my tiny contribution to the effort. An interesting anecdote, btw, is that when Microsoft came by MIT to give the X-BOX/recruiting presentation to the students here, we asked the guy (I forget his name, but he was importantI do recall he claimed to help define the DHCP spec :-P) if they had any plans on making it tough to hack the boxes and run linux. They dude looked honestly surprised and it hadn't even crossed his mind. This was about six months or so before the X-BOX launch. There's some commentary at the bottom of this page on the legal aspects of reverse engineering.
  • 93. Welcome To Burley-Villa School Of Riding
    Welcomes beginners or seasoned riders for hacking or Western trail riding through the New Forest. Hampshire, England.
    http://www.users.globalnet.co.uk/~burleyv/
    Beginners, Seasoned Riders, Visitors are all Welcome
    Lessons for those as young as 4 , Forest Rides for all standards
    If you need more info or advice - e mail - we are happy to help
    Have a quick look at what's new, THEN
    PRESS THE RED BUTTON TO ENTER
    e mail burleyv@globalnet.co.uk

    94. Ian Hacking
    BA, British Columbia (1956); BA, Cambridge (1958); Ph.D. (1962). OfficeRm 911, 215 Huron St., 9th Fl. Ph 9784951. Field Philosophy
    http://www.chass.utoronto.ca/ihpst/html/hacking.html
    B.A., British Columbia (1956); B.A., Cambridge (1958); Ph.D. (1962) Office: Rm 911, 215 Huron St., 9th Fl. Ph: Field: Philosophy of science; philosophy of language, philosophy of mathematics; philosophical questions about psycho-pathology. Projects and Major Publications: Most recent books are The Social Construction of What (1999) and Mad Travellers (1998). Previoius books include Multiple Personality and the Politics of Memory Le Plus pur nominalisme (1993), about Nelson Goodman's "new riddle of induction". The Taming of Chance and The Emergence of Probability are contributions to the philosophy and history of probability. His Representing and Intervening emphasizes the role of experiment in the natural sciences. Earlier books include Why Does Language Matter to Philosophy? and Logic of Statistical Inference

    95. GameShark For Gameboy Color
    hacking tools and information used with the GameShark for Gameboy Color.
    http://www.eef3soft.com/gameshark
    Send email to: GSAttack@yahoo.com Last Updated on: August 23, 2002

    96. Hacking Files
    Small archive of some common introductory texts.Category Computers hacking Text Archives......hacking Text Files General hacking Files hacking from your Web Browser by TechnophoriaNewbies Handbook - by Plowsky Phreak The ultimate Guide to hacking and
    http://www.geocities.com/TimesSquare/Dungeon/9058/hack.htm
    Hacking Text Files
    General Hacking Files
    Hacking from your Web Browser
    -by Technophoria
    Newbies Handbook
    - by Plowsky Phreak
    The ultimate Guide to Hacking and Phreaking
    - by Revelation
    The Hackers Handbook
    - by Hugo Cornwall
    A novices guide to Hacking
    - by The Mentor
    The ultimate step by step guide to hacking
    - IceKool
    UNIX
    In-depth Guide to UNIX hacking
    - by Red Knight
    UNIX: A hacking tutorial
    - by Sir Hackalot UNIX Bible - by The Psychotic Internet Services Denial of Service Introduction to Denial of Service - by Hans Husman Other Files The PC hacking FAQ - by Olcay Cirit Hacking Webpages - by Virtual Circuit and Psychotic HOME

    97. Computer Ethics
    Computer Viruses 2. Computer Viruses 3. Computer Viruses 4. hacking 1. hacking2. Copy rights 1. Copy rights 2. See who's visiting this page.
    http://www.geocities.com/lool95/
    Computer Ethics Name: Laith Mohammed Murad. Email: laith@link.net.jo
  • Computer ethics. Internet use policy. Computer Viruses 1. Computer Viruses 2. ...
  • View Page Stats

    See who's visiting this page.

    98. Hacking And Hackers - Computer Security Programs Downloading Search Engines Port
    Comprehensive collection of the best hacking news sources, tutorials, download listings, FAQs, and how to hack guides. Covers all topics from hacking to exploits plus hacking educational material for newbies to the seasoned professional.
    http://www.infosyssec.com/infosyssec/index.htm
    security security news virus news hacking news hacker trojan underground headlines newsticker security news antivirus exploit denial of service DDoS advisories trojan backdoor sniffer smurfwindows securityXP security security products security books security tips security faq authentication computer security crack crackers crash cryptography denial of service DOS email virus alerts encrypting file system encryption exploits firewall firewalls hack hacks hack files hack links hacked webpages hacker hackers hacking hacking files hacking links hot fixes icmp intruder intrusion detection news ip spoof Kerberos key logger logon microsoft security NT nt security nt server ntsecurity ntshop password password crackers patches permssions phreaking boxes port monitors proxy proxy servers secure security security news security firewalls cryptography vulnerabilities vulnerability news encrypting file system hotfixes authentication password permissions proxy servers antivirus virus system policies smart cards smart cards source route spoofing syn flood system policies texts virii virus viruses vulnerabilities vulnerability wardialers win2k sec win2k security win2k sec windows 2000 security windows 2000 windows windows NT windows nt security

    99. Hacking Information And Statistics
    Statistics and reports on attempted unauthorized accesses to one computer.Category Computers hacking......Statistics and reports on all attempted unauthorised access to my machine, as wellas information for people who are not too sure what this hacking thing is
    http://www.btinternet.com/~shawweb/george/hacks/
    Hacking Information and Statistics:
    Graphs 1
    Graphs 2 Raw Data Top Ten ... Home Page For answers to questions like "How do hackers hack?" and "How do I protect myself?" see my Information page. For statistics concerning where the access attempts come from and which methods are used, see my Graphs Top Tens , and Raw Data pages. Just click on a link above to get started! Note: Due to the time consumed in updating these statistics, I no longer update them. The 12 months of statistics I have are still available, however. I will also upload my ZoneAlarm Log Files every month, so you can still work out the statistics for yourself. I am now beginning to expand my site into other areas - see my Home Page for details. Useful Links:
    ZoneLabs
    The Register - computing news
    Steve Gibson's GRC Security
    - ShieldsUP! among other tools and articles
    SamSpade.org
    - IP address look up and other tools
    More Useful Links...
    Last updated 16/Sep/2002
    This page was written by George Shaw. Please note that these statistics were collected from one machine only, and may not be indicative of hacking/port scanning activities as a whole. Note that my use of the word 'hacker' is technically incorrect - a hacker is really just an enthusiastic programmer. The word 'cracker' would probably be better. See my information page for more information. If you have any comments, please contact

    100. E L H A C K E R . N E T
    Informaci³n, servicios y downloads sobre Inform¡tica e Internet en general. Con secciones variadas y preocupaci³n especial sobre temas relacionados con el hacking.
    http://www.elhacker.net/
    Este Web-Site usa FRAMES pero tu NAVEGADOR no los admite. Actulizate el Navegador de una jodida vez, que ya no estamos en la prehistoria GRACIAS.Were sorry but youve reached a web site that uses frames. You will need a frames-enabled browser in order to view the site. www.elhacker.net

    Page 5     81-100 of 186    Back | 1  | 2  | 3  | 4  | 5  | 6  | 7  | 8  | 9  | 10  | Next 20

    free hit counter