Tag archives for Hackers - Page 3
Norton Anti-Virus Script Blocking Can Be Bypassed
Hi All, I have major issues with the quality of Norton AntiVirus. For some history, see: - Norton AntiVirus 2004 Script Blocking Failure (Rant and PoC enclosed) - Norton AntiVirus…
New, „more insidious” phishing scam is triggered when unsuspecting users open an E-mail.
Opening the wrong E-mail may soon be enough to empty your bank account. In an effort to woo security-conscious computer users, "phishers" have come up with a new technique to…
AMD joins transistor trend
Advanced Micro Devices has created new high-performance transistors in its labs based on the simple concept that sometimes two are better than one. The chipmaker said Tuesday it has manufactured…
Attacking Apache with builtin Modules in Multihomed Environments
1 - Introduction 2 - Apache Memory Layout: Virtual Hosts 3 - Get Virtual Hosts from Memory 4 - Modify a Virtual Host 5 - A sample attack 6 -…
IE exploit is top of the hacks
A Microsoft Internet Explorer exploit represented the highest number of hacking attacks in the second quarter, according to figures from ScanSafe. The London-based security company said that the No. 1…
IBM bakes new 3D circuit design
IBM says building better microchips is kind of like baking a cake. Researchers at Big Blue have devised a new 3D circuit design that uses two or more layers of…
Greatest security risk: Social engineering, says Gartner
Old-fashioned techniques for conning people are being applied to new technology in order to break into networks and computers, warns the analyst firm. The greatest security risk facing large companies…
Hacker Psych
Who are hackers, and what makes them tick? Two experts in the field of cyber forensics and psychology have some answers to that question. One is Marc Rogers, a behavioral…
No Software Patents!
Under the influence of the patent system and big industry lobbyists, the European Union is on the verge of making a huge mistake: to pass a law that would legalize…
Hackers Star Matthew Lillard Confronts his Demons, or Should We Say Dragons?
By Paula S. Bernstein Since making his debut as the superstraight, wide-eyed brother of Ricki Lake in John Water's SERIAL MOM, up-and-coming teen heartthrob Matthew Lillard has been skateboarding his…
Angelina Jolie on Hackers….
"I talked to a lot of male hackers who told me that, even though it's changing, very few hackers are women, so it's difficult for them to fit in. I…
Interview with „Destiny”
1) In your own words, define hacker. I believe its someone who watches over systems, They try to find a solution to a problem, They are constantly curious and try…
Mitnick speaks!
Adam L. Penenberg Kevin Mitnick is the most famous hacker in history. He has been in prison for more than four years for crimes that, when you get down to…
Hackers are the gremlins of the of the ’90s
Phiber Optik Sounds Off By Maitland McDonagh Phiber Optik -- real name: Mark Abene -- is the hacker even computer illiterates have heard of, the one who got sent to…
Interview with Carol P. Meinel
Author of "The Happy Hacker" In your own words define "hacker". Someone who can't resist exploring computers and communications networks to their fullest. Its an obsession, passion, disease -- take…
Hacker Manifesto
The Hackers Manifesto is a small article written by a hacker which went by the handle, or pseudonym , The Mentor during the 1980s . The contents are as follows.…
Hackers Heroes of the Computer Revolution
'Hackers Heroes of the Computer Revolution' is a book by Steven Levy about the hacker culture. It was published in 1984 in Garden City , New York by Anchor Press…
Hacker ethic
1. The belief that information-sharing is a powerful positive good, and that it is an ethical duty of hackers to share their expertise by writing open source code and facilitating…
Hacking
Recently 'hacking' has come to mean unauthorized access to data /information, to obtain or to modify it. Previously, it referred to many things, usually related to a style of working…