The Hacker

Results: 480



#Item
231Cyberwarfare / Hacking / Hackers: Heroes of the Computer Revolution / Hacker / Advanced persistent threat / Malware / Trojan horse / Trend Micro / Computing / Cybercrime / Computer crimes

Peter the Great vs Sun Tzu - A Trend Micro Opinion Paper

Add to Reading List

Source URL: www.trendmicro.com

Language: English - Date: 2013-03-12 23:50:27
232Hackathon / Internet slang / OpenBSD / University of Cincinnati / Association for Computing Machinery / Hacker / Computing / Software development / Association of Public and Land-Grant Universities

RevolutionUC Hacked a Big Weekend! By: Ashley Duvelius ### UPDATE: UC’s first Hackathon, RevolutionUC, was a great success with over 150 participants from across the country working tirelessly around-the-clock to spur

Add to Reading List

Source URL: ceas.uc.edu

Language: English - Date: 2014-04-24 17:49:01
233Hackers on Planet Earth / Hacking / Phreaking / Kevin Mitnick / Hacker / Hope / John Draper / WikiLeaks / Computing / 2600: The Hacker Quarterly / Electronics

Announcing Hackers On Planet Earth, or HOPE. Inspired by conferences like

Add to Reading List

Source URL: www.hope.net

Language: English - Date: 2014-11-24 17:34:12
234Computing / Hacking / Software testing / Vulnerability / Hacker / SAINT / Attack / Exploit / Computer security / Computer network security / Cyberwarfare

When the tables turn Black Hat Asia 2004 SensePost Research Date:

Add to Reading List

Source URL: research.sensepost.com

Language: English - Date: 2012-08-03 08:26:17
235Hacker / White hat / Electron / Operation Sundevil / Phreaking / Hacker ethic / Digital DawgPound / Computing / Hacking / Electronics

Microsoft Word - Costs and Benefits in the Digital Underground 3.doc

Add to Reading List

Source URL: www.peterleeson.com

Language: English - Date: 2005-08-12 18:03:00
236Computer programming / Hacker / Richard Stallman / Stratfor / Computing / Hacking / Cyberwarfare

Dear Judge Preska, I’ve been proud to call myself a hacker since[removed]That’s when I was hired by the MIT Artificial Intelligence Lab to join the team that developed the lab’s operating systems – for which the un

Add to Reading List

Source URL: www.stallman.org

Language: English - Date: 2015-01-16 15:28:42
237Social engineering / Spamming / Password / Phishing / Internet privacy / Facebook / Hacker / Computing / World Wide Web / Software

Safeguards for social networking: Keep your guard up on sites like Facebook, LinkedIn and Twitter. Scammers are exploiting the trust we have of our connections on these sites to gain access to your accounts and commit fr

Add to Reading List

Source URL: lancaster.ne.gov

Language: English - Date: 2012-05-17 03:08:39
238Hacking / Imperva / Cyberwarfare / CAPTCHA / Hacker / Incapsula / Password / Computer security / Spam / Computing / Computer network security / Electronic commerce

A CAPTCHA in the Rye Tal Be’ery, Web Research TL, Imperva Tal Be’ery

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2012-11-29 17:25:40
239Computing / Honeypot / Remote file inclusion / Vulnerability / Denial-of-service attack / Exploit / Hacker / Malware / Client honeypot / Computer network security / Cyberwarfare / Computer security

T H E H O N E Y N E T P R O J E C T ® | KYT Paper Know Your Tools: A dynamic, low-interaction web application honeypot The Honeynet Project

Add to Reading List

Source URL: www.honeynet.org

Language: English - Date: 2014-01-06 14:17:05
240Kidz Bop / Billboard Hot 100 / Hot Digital Songs / Move / Only by the Night / Femme Fatale / Faster / Hot 100 Airplay / Low / Singles / Billboard charts / Music industry

January 21, 2015 Page 1 of 9 INSIDE Madonna Hacker Suspect Arrested in Israel

Add to Reading List

Source URL: www.billboard.com

Language: English - Date: 2015-01-21 18:08:26
UPDATE