Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
Technology plays a major role in the development of the economy of a country and in general in organizations. It is known that it is used in the massive media, the Internet, known by society, which favors all, in this case banking, which... more
    • by 
    •   6  
      HackersElectronic BankingTrojan HorseCybercriminals
    • by 
    •   5  
      TechnologyJournalismMediaInformation
    • by 
    •   5  
      EngineeringSociologyLawHackers
Le culture del cyberpunk sono culture che si affermano in un ben preciso momento storico, gli anni Ottanta, in cui lo sviluppo del post-fordismo sta fornendo una nuova spinta propulsiva alla storica e progressiva soppressione del tempo... more
    • by 
    •   15  
      SociologyCyberpunkHacktivismTime Perception
Assassins Creed Unity Generateur Key vous donnera le pouvoir de générer une clé légitime pour Assassins Creed Unity. Avec notre outil, vous aurez une clé dans seulement quelques instants, avec seulement quelques clics.
    • by 
    •   6  
      Video GamesHackingGamesHackers
. .
    • by 
    • Hackers
Der Artikel geht an die Anfänge des Internets zurück und nimmt seine Pioniere und Partisanen, die ersten Hacker, in den Blick, die als die Urahnen heutiger Social Media gelten können. Diese lassen sich letztlich zurückführen auf den... more
    • by 
    •   7  
      HistoryComputer ScienceMedia StudiesMedia Archaeology
    • by 
    •   3  
      HackersÜniversitelerde DönüşümNeoliberalizm
    • by 
    •   9  
      Social MovementsInternet GovernanceCyberspaceCybersecurity
There is a new game in town that is making a lot of news lately. And if you are looking for Coin Master cheats, you are on the right page.
Suddenly, I see a lot of friends asking me how they can get unlimited spins in the Coin Master game.
    • by 
    •   4  
      Video GamesGamesHackersHacked Arcade Games
    • by 
    •   3  
      HackingEthical HackingHackers
A implementable plan to seed the process of the Creative Economy and redeem America's misspent wealth. Utilizes the Pangaia World Game, available here, for managing it. Be sure to see the most recent version of both these documents at... more
    • by 
    •   6  
      BusinessScience EducationHackersCreative Economy
    • by 
    •   12  
      BusinessCriminologyCybercrimesPolitical Science
Glitches are moments of disruption; they represent the exposure of technical process, moving away from the binaries of input and output to consider what comes in-between. The growing ubiquity of interconnected systems prompts a desire... more
    • by 
    •   14  
      AlgorithmsArtificial IntelligenceInformation TechnologyDigital Humanities
La figura del hacker ha sido protagonista de múltiples relatos, los cuales coinciden con el imaginario colectivo cultivado por los medios de comunicación: piratas informáticos, que se entrometen en cuentas privadas, en sistemas bancarios... more
    • by 
    •   3  
      HackerHackingHackers
Hacking is a set of practices with code that provides the state an opportunity to defend and expand itself onto the internet. Bringing together science and technology studies and sociology scholarship on boundary objects and boundary... more
    • by  and +1
    •   4  
      State TheoryHackingEthical HackingHackers
This article discusses the phenomenon of “virtual reality” and its influence on the digital transformation of the modern society of social interaction. Separately, the authors analyze the problems of crimes committed with the help of... more
    • by 
    •   5  
      Cyber EthicsCyber crimeHackersCyber Law
The past five years have seen a global flourishing of political initiatives in which tech-minded actors of different kinds (geeks, hackers, bloggers, online journalists, citizen politicians, etc.) have played prominent roles. From... more
    • by 
    •   13  
      AnthropologyTechnologyMedia StudiesInternet Studies
Aprendendo a Ser Hacker
    • by 
    • Hackers
The Internet is driving force on how we communicate with one another, from posting messages and images to Facebook or "tweeting" your activities from your vacation. Today it is being used everywhere, now imagine a device that... more
    • by 
    •   20  
      Computer ScienceInformation TechnologyInformation SecurityMachine Learning
Le mode d'apprentissage CEH eLEARNING respecte scrupuleusement la totalité du cursus de formation officiel EC-Council. Le cursus eLEARNING aborde de manière successive chaque module tel le cours présentiel BOOTCAMP avec des exercices, des... more
    • by 
    •   7  
      HackingComputer HackingEthical HackingHackers
There is no shortage of books on all matters relating to information management and information technology. This booklet adds to this large collection and attempts to do a number of things: • offer non-technical readers an insight into... more
    • by 
    •   7  
      Internet StudiesCyberstudiesCyberwarfareCybersecurity
This paper gives the introduction of cyber-attacks, their types, motives and consequences. But the main aim of this paper is to provide the insight of some of the major cyber-attacks that took place all over the world and their effects.... more
    • by 
    •   4  
      HackersCyber SecurityCyber AttackDoS attacks
During the early and mid-1980s, a home computing practice of use and openness of software emerged in Greece. This computer culture both reflected and reinforced the local economic and technological characteristics. Because the protection... more
    • by 
    •   3  
      Computer HackingHackersPersonal Computers
    • by 
    •   7  
      Information TechnologyPolitical PhilosophyPolitical TheoryClass
    • by 
    •   180  
      Information SystemsElectronic EngineeringCommunication EngineeringSociology
In research on Massively Multiple Online Games and Worlds (MMOs) like World of Warcraft, Everquest or Second Life, the term “worldness” addresses how the various layers of a virtual world–the animated 3D pictorial spectacle, the... more
    • by 
    •   8  
      Linguistic AnthropologyVirtual CommunitiesVirtual WorldsEthnography of Virtual Worlds
Hacking, Programming. Python, Author: Justin Seitz
    • by 
    •   5  
      HackingProgrammingEthical HackingHackers
    • by 
    •   6  
      Computer ScienceComputer EngineeringLinuxHacking
i want to hack a facebook account
    • by 
    •   2  
      HackingHackers
De McKenzie Wark
    • by 
    •   4  
      The InternetEthical HackingHackersEtica Hacker
This essay argues that key aspects of Fluxus have a striking resemblance to the ideas and antics of the computer “hackers” who, in the sixties and seventies, defined the culture of MIT’s Artificial Intelligence lab. The past several... more
    • by 
    •   8  
      FluxusAvant-GardeInstitutional CritiqueJohn Cage
Es una pequeña reseña de la vida de Aaron Swartz, su legado y el desafío a vivir como él.
    • by 
    •   5  
      ChristianityHackersCristianismoBiografías
https://ekitap.alternatifbilisim.org/hack_kulturu_ve_hacktivizm.html Bir yıl önce gerçekleştirdiğimiz HackCon I etkinliği oldukça verimli tartışmalara vesile oldu. Her toplantıda olduğu gibi, süre kısıtı nedeniyle sözler biraz eksik... more
    • by  and +1
    •   7  
      SociologyDigital CultureHacktivismDigital Theory and Culture
    • by 
    •   5  
      SystemtheorieHackingHackersKunst
Research concerning computer hackers generally focuses on how to stop them; far less attention is given to the texts they create. Phrack, an online hacker journal that has run almost continuously since 1985, is an important touchstone in... more
    • by 
    •   201  
      Creative WritingRhetoric (Languages and Linguistics)HistoryHistory of Science and Technology
The loosely organized hacktivist group “Anonymous” first appeared in major news outlets in 2008 after it targeted the Church of Scientology (Olson 2012). Anonymous is a set of individuals who engage in a diverse repertoire of collective... more
    • by 
    •   5  
      Social MovementsHacktivismAnonymousActivism
    • by 
    •   7  
      Information TechnologyNew MediaOnline JournalismThe future of news
    • by 
    •   3  
      LawHackersSoftware Bugs
    • by 
    •   8  
      HackingComputer HackingHackersCracked
This paper explores factors that lead to individuals’ adoption of the maker identity reproduced by a small-town hackerspace. This paper presents the findings of a 15-month ethnography of the hackerspace and a series of targeted interviews... more
    • by  and +2
    •   8  
      Peer ProductionDIY cultureHackersDo It Yourself (DIY)
    • by 
    • Hackers
    • by 
    •   5  
      HackingComputer HackingEthical HackingHackers
Cyber-deterrence has become a fashionable concept, and there has been a wealth of literature and polemic produced which seeks to simplify it, sell it as an applicable theory and fight for its insertion into national security strategies;... more
    • by 
    •   22  
      Computer ScienceInternational RelationsCybercrimesNetwork Security
De los hacks, hackings y hackers, hemos escuchado que tienen que ver con actos delictivos como robos de información, extorsiones, tráfico ilegal de números de tarjetas de crédito y hasta terrorismo cibernético: nada de esto es cierto... more
    • by 
    •   3  
      PhilosophyArt HistoryHackers
El presente manual es el resultado de dos años de investigación en los que, a partir de la sistematización de la experiencia, se identificaron elementos esenciales presentes en el modelo que permitan a otros interesados instrumentar un... more
    • by 
    •   19  
      Telecommunications EngineeringSoftware EngineeringTelecommunicationsMobile Technology
This article explores socialist and postsocialist technoculture in postsocialist Romania, focusing upon both retrospective and speculative accounts of what did, and what could have, transpired beyond the purview of the state and of... more
    • by 
    •   11  
      GlobalizationPostsocialismGentrificationCorruption (Corruption)
Este artículo analiza la figura del hacker en la novela El delirio de Turing, en su capacidad para responder a los problemas derivados de la globalización y al neoliberalismo. El objetivo es demostrar que, si la representación del hacker... more
    • by 
    •   6  
      Science FictionLatin American literatureLiteratura LatinoamericanaHackers
The Internet is driving force on how we communicate with one another, from posting messages and images to Facebook or “tweeting” your activities from your vacation. Today it is being used everywhere, now imagine a device that connects to... more
    • by 
    •   20  
      Computer ScienceInformation TechnologyInformation SecurityMachine Learning
nusududhsudhsudhsudh bdsdushd sdsdsdsd
    • by 
    • Hackers