Hackers

Results: 356



#Item
71

Meredith L. Patterson Upstanding Hackers, Inc. LangSec@SPW May 21, 2015 https://github.com/UpstandingHackers/hammer

Add to Reading List

Source URL: spw15.langsec.org

Language: English - Date: 2015-05-22 20:33:26
    72

    Why you should use JonDonym... Anonymous surfing While surfing the web you leave small pieces of yourself behind. By combining these traces they get a face - your face. Big businesses, hackers, security services take adv

    Add to Reading List

    Source URL: anonymous-proxy-servers.net

    - Date: 2011-05-03 09:19:29
      73

      1     COLLABORATING CREATORS STILL HAVE PERSONAL PSYCHOLOGIES! The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution

      Add to Reading List

      Source URL: mambo.ucsc.edu

      Language: English - Date: 2015-04-02 17:26:48
        74

        SWISS CYBER STORM Communiqué de presse Les meilleurs jeunes hackers de Suisse : une cible de choix pour les recruteurs en informatique

        Add to Reading List

        Source URL: www.swisscyberstorm.com

        Language: French - Date: 2016-03-03 13:12:33
          75

          SWISS CYBER STORM Communiqué de presse Les meilleurs jeunes hackers suisses ont été sélectionnés La pression n’était pas des moindres pour les 17 meilleurs jeunes «cyber-talents», le week-end dernier: dans

          Add to Reading List

          Source URL: www.swisscyberstorm.com

          Language: French - Date: 2016-03-03 13:12:33
            76

            1.) ​ Treat all other hackers with utmost respect.​ Be kind to others. Do not insult or put down other attendees. Behave professionally. Remember that harassment and racist, sexist, or exclusionary jokes are not appr

            Add to Reading List

            Source URL: www.ameehacks.com

            Language: English - Date: 2015-09-04 13:24:52
              77

                  Unlocking Soldier Suicide: Inside ​Government Executive​ Magazine’s September/October Issue    Plus: Getting Patients In When the Power Goes Out; How the OPM Hackers Killed the Password; The Fallacy of Thre

              Add to Reading List

              Source URL: www.atlanticmedia.com

              Language: English - Date: 2015-09-08 16:31:42
                78Payment systems / EMV / Credit card / American Express / Magnetic stripe card / Smart card

                Fight Cybercrime by Making Stolen Data Worthless to Thieves 42.8 million cyberattacks are expected this year alone. How can businesses eliminate their data as a target for hackers? Three technologies - EMV chip, tokenisa

                Add to Reading List

                Source URL: www.pcisecuritystandards.org

                Language: English - Date: 2015-09-22 16:06:02
                79

                Whitepaper The 7 classic misconceptions regarding Web Application Security By now it’s a known fact: Web applications are hackers’ preferred entrance gates at the moment. Nevertheless some experienced administrators

                Add to Reading List

                Source URL: www.airlock.com

                Language: English - Date: 2015-07-08 10:56:15
                  80

                  Design: What It Is, and How To Teach and Learn It How I Learned to Stop Worrying and Love the Hackers Carla Diana Georgia Institute of Technology |

                  Add to Reading List

                  Source URL: www.carladiana.com

                  Language: English - Date: 2009-05-31 22:48:36
                    UPDATE