Hacker ethic

Results: 32



#Item
11Computer programming / Cyberwarfare / Hacker / Netochka Nezvanova / Hacker ethic / Hacker Manifesto / Computing / Electronics / Hacking

1 Not every hacker is a woman Cornelia Sollfrank Published in: ‘Technics of Cyberfeminism’, Claudia Reiche/ Andrea Sick, 2002

Add to Reading List

Source URL: www.obn.org

Language: English - Date: 2010-08-09 11:39:15
12Hacker ethic / Hackers: Heroes of the Computer Revolution / Hacker / What the Hack / Information wants to be free / Hacks at the Massachusetts Institute of Technology / Electron / Steven Levy / Hacker Emblem / Computing / Electronics / Hacking

How Digital Technology Found Utopian Ideology: Lessons From the First Hackers’ Conference Fred Turner Department of Communication Stanford University Forthcoming in David Silver and Adrienne Massanari, eds., Critical C

Add to Reading List

Source URL: fredturner.stanford.edu

Language: English - Date: 2012-08-02 18:55:52
13Google / Trojan horse / Search engine optimization / Hacker ethic / Password manager / Computing / Hacker / Password

My Business Was Ruined by a Hacker—Your Web Site Could Be Next! Hacked! My Business Was Ruined by a Hacker—Your Web Site Could Be Next

Add to Reading List

Source URL: www.boogiejack.com

Language: English - Date: 2012-01-24 20:17:08
14Hacker / Electron / Underground / Operation Sundevil / Nahshon Even-Chaim / Erik Bloodaxe / Computer Misuse Act / WANK / Hacker ethic / Computing / Hacking / Cybercrime

COMPUTER HACKERS: JUVENILE DELINQUENTS OR INTERNATIONAL SABOTEURS? Suelette Dreyfus Author

Add to Reading List

Source URL: aic.gov.au

Language: English - Date: 2009-06-09 04:55:27
15Hacker / Electron / Underground / Operation Sundevil / Nahshon Even-Chaim / Erik Bloodaxe / Computer Misuse Act / WANK / Hacker ethic / Computing / Hacking / Cybercrime

COMPUTER HACKERS: JUVENILE DELINQUENTS OR INTERNATIONAL SABOTEURS? Suelette Dreyfus Author

Add to Reading List

Source URL: www.aic.gov.au

Language: English - Date: 2009-06-09 04:55:27
16Technology / Hacker / Hacktivism / Social peer-to-peer processes / Anonymous / White hat / OpenNIC / Internet privacy / Hacker ethic / Computing / Hacking / Cybercrime

build a cantenna and steal wireless internet access • announce phony mayor resignations • give people discounts on phone gas internet or other utilities • start a pirate radio station • give away free phone cards

Add to Reading List

Source URL: www.zinelibrary.info

Language: English - Date: 2013-05-17 15:06:34
17Hacker / White hat / Electron / Operation Sundevil / Phreaking / Hacker ethic / Digital DawgPound / Computing / Hacking / Electronics

Microsoft Word - Costs and Benefits in the Digital Underground 3.doc

Add to Reading List

Source URL: www.peterleeson.com

Language: English - Date: 2005-08-12 18:03:00
18Hacker / White hat / Penetration test / Grey hat / Hacktivism / LulzSec / Computer crime / Hacker ethic / Hacker Manifesto / Hacking / Computing / Cybercrime

Getting Started with Ethical Hacking Chapter 1

Add to Reading List

Source URL: media.wiley.com

Language: English - Date: 2014-07-28 07:17:40
19Hacking / Computer programming / Cyberwarfare / Hacker / Electron / Luddite / Tron / Hacker ethic / Hacktivism / Computing / Technology / Electronics

PDF Document

Add to Reading List

Source URL: www.johansoderberg.net

Language: English - Date: 2011-10-12 16:26:33
20Computer network security / Crime prevention / National security / Software testing / Hacker / Security / Computer security / Vulnerability / Hacker ethic / Computing / Hacking / Electronics

PDF Document

Add to Reading List

Source URL: media.wiley.com

Language: English - Date: 2007-10-05 22:43:14
UPDATE