Hacker
10,099 Followers
Recent papers in Hacker
Over the years, millions of data and information in transit have been abused, compromised or lost to cybercriminals/hackers due to inefficient security measures adopted during data transmission. To address this issue this paper reviewed... more
When critics consider young people’s practices within cyberspace, the focus is often on negative aspects, namely cyber-bullying, obsessive behaviour, and the lack of a balanced life. Such analyses, however, may miss the agency and... more
La figura del hacker ha sido protagonista de múltiples relatos, los cuales coinciden con el imaginario colectivo cultivado por los medios de comunicación: piratas informáticos, que se entrometen en cuentas privadas, en sistemas bancarios... more
The Internet is driving force on how we communicate with one another, from posting messages and images to Facebook or "tweeting" your activities from your vacation. Today it is being used everywhere, now imagine a device that... more
The state of security on the internet is bad and getting worse. One reaction to this state of affairs is termed as Ethical Hacking which attempts to increase security protection by identifying and patching known security vulnerabilities... more
The Internet is driving force on how we communicate with one another, from posting messages and images to Facebook or “tweeting” your activities from your vacation. Today it is being used everywhere, now imagine a device that connects to... more
In the thirty years from 1970 to 2000, open source software (OSS) began as an assumption without a name or a clear alternative. It has evolved into a sophisticated movement that has produced some of the most stable and widely used... more
Driven by constant and remarkable technological innovation, the Internet has increasingly changed the routine activities of Americans. Connecting with friends and family, shopping, banking, media consumption, and other daily activities of... more
Since the microcomputing revolution in the 1970s we live in the age of permanent technological disruptions, but institutional and educational practices remain unchanged. As noted by Flavin, " technologies come and go but the university... more
This paper discusses the reliability of the criteria for determining Śaṅkara’s authorship established by Paul Hacker. His analysis of terminological peculiarities is based on only one of Śaṅkara’s works—the commentary on the... more
Verso il cyberpunk e l’hacktivism: lotte di resistenza e strategie di trasformazione, contro l’imperialismo capitalista delle multinazionali. Il libro, di circa 600 pagine, in formato 24x30 cm, realizzato da Tommaso Tozzi, prodotto e... more
Vastly growing online free-hospitality networks are a phenomenon of modern times. They have been already subject of social and peace studies, here explored from the perspective of information science. The main focus in this research,... more
Julian Paul Assange 3 Temmuz 1971 Avustralya doğumlu, internet aktivisti (hacker) ''Wikileaks'' adlı internet sitesinin editörü ve basın sözcüsüdür.
2013-0612-戰略研究-Antoine Jomini "The Art of War" and the New Era of Application in Cyber Warfare-約米尼與《戰爭藝術》與新時代網路戰
La Russie recrute les hackers les plus recherchés par le FBI : sommes-nous encore capables de gagner cette guerre de l'ombre ? Qu'ils soient offensifs ou défensifs, les Occidentaux-et tout particulièrement les Etats-Unis-disposent d'un... more
Vulnerability scanners are information security tools able to detect security weaknesses on hosts in a network. Secure hosts in a proactive manner. A proactive approach is considered to be better than reactive approaches followed by, for... more
Si trasladamos el presupuesto de que entre 100 programadores, uno se hace hacker, y que para 100 programadores encontramos solo a 10 mujeres, ¿cuantas mujeres programadoras necesitamos para encontrar una mujer hacker?. Estas suelen elegir... more
By looking closely at Little Brother (2008), For The Win (2010), Pirate Cinema (2012), Homeland (2013) and Lawful Interception (2013) I intend to show which concepts of society these young adult novels mark as desirable and what role... more
The Internet is driving force on how we communicate with one another, from posting messages and images to Facebook or “tweeting” your activities from your vacation. Today it is being used everywhere, now imagine a device that connects to... more
Protest rhetoric has always provided a prime example of how communication can work to change the human condition, but strategies of protest have evolved as the United States has transformed into an information economy. Although protest... more
Жаргон, сленг, терминология и мемы игровых субкультур, многопользовательских онлайн-игр, компьютерщиков, хакеров, геймеров, киберспортсменов и гиков Jargon, slang, terminology and memes of gaming subcultures, massively multiplayer online... more
Social Engineering and phishing technique are subjects that have been evolving as the years pass, mainly through email, which is one of the most used communication tools in the world. Phishing emails are usually related to Social... more
"Cyberattaque de masse : une catastrophe mondiale difficilement évitable quoiqu'en pense Edward Snowden. La cybertattaque survenue il y a quelques jours est peu commune, quant à son étendue et son mode d'action. En moins de 24 heures, 75... more
• Una avvincente indagine sulle origini • Chi sono i veri HACKER, chi i Cybercriminali e i Cybercop • ISECOM 12 Dispense in italiano per “diventare” Ethical Hacker • Principi fondamentali di VAPT • Cenni alle metodologie OSSTMM e OWASP •... more
Cybersecurité : les piratages massifs sont inévitables, il est grand temps d'apprendre à vivre avec le fait que nos données seront volées Alors que les Assises de la Cybersécurité se sont tenues mercredi 11 octobre à Monaco,Yahoo vient... more
While the making of the bricoleur, who uses what he has close at hand, involves deeply “undoing” the “project” of the engineer, according to Claude Lévi-Strauss, that of the tactician, described by Michel de Certeau, rather encourages a... more
Certified Ethical Hacker or CEH is a hacker who possesses the certification of the same name. The certificate assesses and ensures that the hacker is proficient in identifying potential and actual vulnerabilities in specific computer... more
We talk about how to best protect Australia against cyberterrorist attacks of the type in which the offenders use a computer to attack or in which the offenders attack computers. Our concern is phenomena like Stuxnet and Ransomware, but... more