Search results
Jump to navigation
Jump to search
- {{wiktionary|hacking}} '''Hacking''' may refer to: ...1 KB (173 words) - 22:39, 1 July 2025
- | name = Out of the Inner Circle: A Hacker's Guide to Computer Security ...it does show what brought on many of the current trends we see in network security today.<ref>{{Cite web |last=Friedland |first=Nat |date=September 1985 |titl ...1 KB (190 words) - 22:18, 23 January 2025
- ...may be used for [[security exploit]]s.<ref name=hacking>{{cite book|title=Hacking: the art of exploitation|series=No Starch Press Series|publisher=Safari Boo {{security-software-stub}} ...1 KB (138 words) - 02:39, 24 November 2022
- ...[[Security hacker|security hacking]]; the practice of defeating [[computer security]]. ...sword cracking]], the process of discovering the plaintext of an encrypted computer password. ...1 KB (151 words) - 23:51, 1 October 2024
- ...tion and defence as well as being a media pundit and author on information security topics. He advised the UK Parliament on the [[Investigatory Powers Act, 201 ...popular aspect of the book is the apparently salacious printouts of actual hacking attempts (although confidential details, such as passwords, are blacked out ...2 KB (345 words) - 20:55, 14 June 2023
- {{Short description|Computer hacking technique}} ...194|url-access=subscription }}</ref> in [[computer security]] is a type of hacking technique related to [[Man-in-the-middle attack|man-in-the-middle]] and [[R ...3 KB (414 words) - 18:19, 25 May 2025
- ...security-journalist-steve-gold-dies/article/392210/ "Respected Information Security Journalist Steve Gold Dies"], ''SC Magazine'', 13 January 2015</ref> ...chive at TNMOC |url=https://www.tnmoc.org/news-releases/2016/5/18/computer-hacking-archive-at-tnmoc |website=The National Museum of Computing |date=18 May 201 ...3 KB (428 words) - 14:37, 13 July 2024
- {{Short description|2004 computer worm}} ...ery pieces of [[computer software|software]] designed to enhance [[network security]], and carried a destructive payload, unlike previous worms. It is so named ...3 KB (385 words) - 01:34, 26 April 2024
- {{short description|American computer hacker}} ...undevil]] and was caught while serving in the United States Air Force as a computer cryptography specialist. ...2 KB (255 words) - 20:21, 6 April 2025
- {{Short description|Computer magazine}} category = [[Computer magazines]]| ...2 KB (183 words) - 17:38, 5 November 2023
- {{Short description|Computer worm}} The '''Kama Sutra''' [[Computer worm|worm]], also known as Blackworm, Nyxem, and Blackmal, is a type of [[m ...2 KB (284 words) - 22:09, 29 April 2024
- |genre = [[Social engineering (security)|Social engineering]] ...f how social engineering can be combined with [[hacker (computer security)|hacking]]. ...3 KB (436 words) - 02:30, 24 July 2024
- | next = [[Hacking at Random]] (2009) ...Hacking at Random]] in 2009, [[Observe. Hack. Make.]] in 2013 and [[Still Hacking Anyway]] in 2017. The most recent edition was [[May Contain Hackers]] in 20 ...3 KB (476 words) - 04:31, 15 January 2024
- {{Short description|American computer hacker (born 1959)}} ...h">{{cite web | url=https://www.scmagazine.com/home/security-news/women-in-security-2017/female-blackhats/ | title=Female blackhats | date=10 July 2017 | acces ...4 KB (541 words) - 03:23, 6 July 2024
- {{Short description|Computer security qualification}} |focus = Ethical hacking ...6 KB (831 words) - 01:03, 8 June 2025
- {{Short description|American computer security researcher and programmer}} *[[Computer Oracle and Password System]] (COPS) ...5 KB (618 words) - 19:09, 6 January 2025
- ...is one of the founders of the [[Cult of the Dead Cow]] [[Hacker (computer security)|hacker]] group, along with Franken Gibe and Sid Vicious. His official tit {{computer-security-stub}} ...2 KB (235 words) - 05:33, 23 August 2022
- [[File:Hackingexplota.jpg|right|250px|"Hacking, ''The art of exploitation''"]] ...dition » Linux Magazine |url=http://www.linux-magazine.com/Online/Features/Hacking-The-Art-of-Exploitation-2nd-Edition |access-date=2024-01-07 |website=[[Linu ...8 KB (1,112 words) - 11:42, 17 June 2025
- {{Short description|British computer security consultant (born 1963)}} ...ity]] and training banks, large companies and universities in the UK on IT security. In 2014 he began developing the software on which SecuritySmart runs from ...5 KB (765 words) - 19:40, 6 January 2025
- ...{ISBN|978-1-59327-144-2}}</ref> [[Andrew Huang (hacker)|Andrew Huang]]'s ''Hacking the Xbox'', and ''[[How Wikipedia Works]]''.<ref>{{cite book | last = Ayers ...[computer security]], [[hacker (computer security)|hacking]], [[Linux]], [[computer programming|programming]], technology for kids, [[Lego]], [[math]], and [[s ...4 KB (559 words) - 06:15, 21 March 2024