Search results
Jump to navigation
Jump to search
- | name = Out of the Inner Circle: A Hacker's Guide to Computer Security ...vide insight into the ways and methods of the [[Hacker (computer security)|hacking]] community in the days before [[Internet]] became prevalent. Although larg ...1 KB (190 words) - 22:18, 23 January 2025
- ...rs in the [[United Kingdom]] courts as an expert on digital evidence and [[computer forensics]] for both prosecution and defence as well as being a media pundi ...popular aspect of the book is the apparently salacious printouts of actual hacking attempts (although confidential details, such as passwords, are blacked out ...2 KB (345 words) - 20:55, 14 June 2023
- {{Short description|Computer hacking technique}} ...194|url-access=subscription }}</ref> in [[computer security]] is a type of hacking technique related to [[Man-in-the-middle attack|man-in-the-middle]] and [[R ...3 KB (414 words) - 18:19, 25 May 2025
- ...'.<ref>{{cite book | last = Ayers | first = Phoebe | title = How Wikipedia Works | publisher = No Starch Press | location = San Francisco | year = 2008 | is ...[computer security]], [[hacker (computer security)|hacking]], [[Linux]], [[computer programming|programming]], technology for kids, [[Lego]], [[math]], and [[s ...4 KB (559 words) - 06:15, 21 March 2024
- ...il]] and the events surrounding the 1987–1990 war on the [[Legion of Doom (hacking)|Legion of Doom]] network: the [[Steve Jackson Games, Inc. v. United States [[Category:Computer security books]] ...3 KB (415 words) - 20:42, 15 April 2024
- ...xplores the origins and nature of hackers and [[hacker (computer security)|hacking]] by following the adventures of [[Adrian Lamo]], and contrasting his story ...ic eye by being hacked out of the hands of people who, after making a film about the free flow of information, tried to lock away that information forever. ...4 KB (432 words) - 08:53, 11 September 2023
- [[File:Hackingexplota.jpg|right|250px|"Hacking, ''The art of exploitation''"]] ...dition » Linux Magazine |url=http://www.linux-magazine.com/Online/Features/Hacking-The-Art-of-Exploitation-2nd-Edition |access-date=2024-01-07 |website=[[Linu ...8 KB (1,112 words) - 11:42, 17 June 2025
- {{Computer hacking}} ...ntor, and belonged to the second-generation hacker group [[Legion of Doom (hacking)|Legion of Doom]].<ref name=elfinterview>{{cite web|title=Elf Qrin intervie ...6 KB (840 words) - 03:27, 24 May 2025
- ...ten in [[ASCII]] text, included descriptions of bombs, technology, and the computer scene in Sweden. These themes soon expanded over the years to include journ * [http://www.textfiles.com/magazines/UXU/ The complete works of the uXu 1991 - 2002] ...3 KB (396 words) - 20:53, 6 May 2025
- ...d-yuCME0AC&dq=security+%22Tom+Liston%22&pg=PA215 |title=Internet security: hacking ... – Google Books |isbn=9780763735364 |access-date=May 10, 2010|last1=Himm ...the network security book ''Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses''.<ref>{{cite book|url=https://books.google. ...2 KB (308 words) - 13:31, 20 December 2023
- '''''Hack-Tic''''' was a Dutch [[Hacker (computer security)|hacker]] [[magazine]] published between 1989 and 1994. It had a c ...l=http://home.kpn.nl/a.dikker1/museum/rsmagtickgalacticparadiso.html|title=Computer museum tonh (Galactic Hacker Party)|work=kpn.nl}}</ref> ...7 KB (910 words) - 16:36, 21 April 2025
- ...on of the [[bulletin board system]] (BBS) filmed by [[Software archaeology|computer historian]] [[Jason Scott]] of [[textfiles.com]].<ref>{{cite magazine|url=h # [[FidoNet]]: details the largest volunteer-run computer network in history ...8 KB (1,016 words) - 14:29, 17 May 2025
- [[Category:Books about free software]] [[Category:Books about computer hacking]] ...4 KB (547 words) - 09:25, 25 July 2024
- {{Short description|Computer virus prevention and detection magazine}} ...[[spam (electronic)|spam]]. It regularly features analyses of the latest [[Computer virus|virus]] threats, articles exploring new developments in the fight aga ...4 KB (527 words) - 09:54, 15 February 2025
- ...cumentary film]] sympathetic to the convicted [[Hacker (computer security)|computer hacker]] [[Kevin Mitnick]], directed by [[Eric Corley|Emmanuel Goldstein]] ...]], which is based on disputed events. The film also documents a number of computer enthusiasts who drive across the United States searching for Miramax repres ...5 KB (768 words) - 23:34, 7 June 2025
- ...ll sorts of strange computer-related [[Hack (technology slang)|hacking]]/[[computer security|security]] jobs. ...BPS). A genius in computer hacking and security who can do anything on any computer, or phone. ...6 KB (943 words) - 18:30, 23 July 2024
- ...tizen. It was the concentration platform of funny and satirical derivative works. However, due to the poor management of the administrators, many users have ...of the Golden Computer Centre launched the website with information about computer hardware and software prices, thus increasing the transparency of the marke ...6 KB (892 words) - 02:14, 3 October 2024
- ...edia]] stereotype. The group welcomes new members who want to learn about hacking, and attempts to teach them more positive aspects and steer them away from ...high school, StankDawg came up with the name on his way to the "Sweet 16" computer programming competition. He jokingly referred to his teammates as "The Digi ...15 KB (2,191 words) - 01:44, 27 September 2024
- {{About|the 2000 film|similar uses|Trackdown (disambiguation){{!}}Trackdown|and|Tak ...'Takedown: The Pursuit and Capture of Kevin Mitnick, America's Most Wanted Computer Outlaw—By the Man Who Did It''|[[Tsutomu Shimomura]]|[[John Markoff]]}} ...8 KB (1,089 words) - 14:20, 18 April 2025
- | category = [[Computer]]s, [[technology]] ...[Internet]] protocols and services, as well as general news concerning the computer [[Counterculture|underground]]. ...11 KB (1,551 words) - 14:55, 18 August 2025