Hackers

Results: 356



#Item
181GUI widget / Push-button / Clothing / Graphical user interfaces / Button

The following is a sample of Copy Hackers Book 3: Buttons and Click-Boosting Calls to Action, updated in June 2014 and copyright of Joanna Wiebe. To get this whole ebook and others in the Copy Hackers series – so you c

Add to Reading List

Source URL: copyhackers.com

Language: English - Date: 2014-06-22 23:01:38
182Hacker ethic / Hacker / Electron / Psychological subversion / Computer crime / Tron / Kevin Mitnick / Phreaking / Hacker Manifesto / Computing / Hacking / Electronics

1 Women Hackers Cornelia Sollfrank Lecture march 1999, ‚next Cyberfeminist International‘

Add to Reading List

Source URL: www.obn.org

Language: English - Date: 2010-08-09 11:39:50
183Digital divide / Hackers: Heroes of the Computer Revolution / Steve Jobs / Steve Wozniak / Information society / Wisdom / Knowledge / Hacker / Home computer / Computing / Technology / Electronics

Information → Knowledge → Wisdom: Progression of Society in the Age of Computer Ralph C. Losey1 The personal computer revolution started by the Hacker elite in the 1970s

Add to Reading List

Source URL: ralphlosey.files.wordpress.com

Language: English - Date: 2015-04-08 19:26:20
184Ransomware / Antivirus software / Hackers: Heroes of the Computer Revolution / Hacker / Computer virus / Backup / Email spam / Computing / Malware / Extortion

Computer users face hard choice—pay ransom or lose files

Add to Reading List

Source URL: phys.org

Language: English - Date: 2015-04-18 10:39:30
185Hacker ethic / Hackers: Heroes of the Computer Revolution / Hacker / What the Hack / Information wants to be free / Hacks at the Massachusetts Institute of Technology / Electron / Steven Levy / Hacker Emblem / Computing / Electronics / Hacking

How Digital Technology Found Utopian Ideology: Lessons From the First Hackers’ Conference Fred Turner Department of Communication Stanford University Forthcoming in David Silver and Adrienne Massanari, eds., Critical C

Add to Reading List

Source URL: fredturner.stanford.edu

Language: English - Date: 2012-08-02 18:55:52
186Software / Computing / Bomgar / Remote administration / Remote desktop software / Remote Desktop Services / Virtual Network Computing / Radmin / Remote Desktop Protocol / Remote administration software / Remote desktop / System software

Are You Helping or Hindering Hackers? Five Steps to Secure Remote Access A BOMGAR WHITEPAPER WHITEPAPER

Add to Reading List

Source URL: www.bomgar.com

Language: English - Date: 2013-05-31 14:56:05
187Smartphones / Antivirus software / Mobile virus / Caribe / Symbian / Computer virus / Commwarrior-A / Malware / BitDefender / Software / System software / Computing

TECHNOLOGY NEWS Mobile Phones: The Next Frontier for Hackers? Neal Leavitt

Add to Reading List

Source URL: www.leavcom.com

Language: English - Date: 2013-04-12 14:46:14
188Identity theft / Computing / Sony Pictures Entertainment / Copyright law of the United States / Hackers: Heroes of the Computer Revolution

NB pro seminar on the Sony hack

Add to Reading List

Source URL: www.noticebored.com

Language: English - Date: 2015-03-12 16:50:13
189X Window System / Mac OS X / Firefox / Software / Google Chrome / Portable software

WINNING AT THE HACKERS’ GAME: Practical Security that Works H-Server Overview The H-Server is server-side software for the remote management of large scale deployments of applications in high-risk client environments

Add to Reading List

Source URL: www.eisst.com

Language: English
190Cardiac electrophysiology / Medical equipment / Prosthetics / Medical technology / Medical device / Artificial cardiac pacemaker / Medtronic / Bluetooth / Insulin pump / Medicine / Technology / Implants

T ECHN O LOGY NE W S Researchers Fight to Keep Implanted Medical Devices Safe from Hackers Neal Leavitt

Add to Reading List

Source URL: www.leavcom.com

Language: English - Date: 2013-04-12 14:46:09
UPDATE