LT   EN   RU  
Friday 29 March 2024 Straipsniai.lt - Independent and informative portal
Home
Phorum
Contacts
Login
Register   Login
News subscribe
Subscribe   Unsubscribe
Partners
www.slaptai.lt www.gamezone.lt
www.penki.lt www.hakeriai.lt
   
   
Advertising
Statistic
Visits since 2002 09 12 - 70583419
Pages in Straipsniai.lt: 40735
  
  Computers > Computer technologies > Hackers
Angelina Jolie on Hackers....
Usage rating

"I talked to a lot of male hackers who told me that, even though it's changing, very few hackers are women, so it's difficult for them to fit in. I think that's why Kate is so strong-willed and disciplined: she knows she's good, but she feels she has to be tough to be accepted as an equal." - Angelina Jolie

Interview with "Destiny"
Usage rating

1) In your own words, define hacker. I believe its someone who watches over systems, They try to find a solution to a problem, They are constantly curious and try to learn as much as they can. 2) I understand hackers assume an online nickname to become known by - how did you acquire your nickname? I gave it to myself. What I learn today could very well be my "Destiny". 3) What is your technical background. (Which platform do...

Mitnick speaks!
Usage rating

Kevin Mitnick is the most famous hacker in history. He has been in prison for more than four years for crimes that, when you get down to it, amount to little more than illegally copying proprietary software belonging to major companies including Motorola, Nokia and Sun. He was made a household name by New York Times reporter John Markoff, who featured Mitnick in a book called Cyberpunk (published in 1991), then wrote a front page story for the Times on July 4, 1994, that portrayed Mitnick as a superhacker who could wreak cyberhavoc--and ruin lives--if not caught by the Feds....

Hackers are the gremlins of the of the '90s
Usage rating

Phiber Optik - real name: Mark Abene - is the hacker even computer illiterates have heard of, the one who got sent to jail for a year and a day for messing around with the phone company, the kind of whiz kid the FBI would have us believe is single-handedly going to bring down the information superhighway. So who better to give us the scoop on HACKERS vs. hackers? Do you call yourself a hacker? Yeah, sure, despite the way...

 Comments Comments: 1
Interview with Carol P. Meinel
Usage rating

MS Industrial engineering - great for understanding complex human/machine systems. Lots of theoretical background. Shade-tree hackers make fun of finite state machine, Turing machine etc. theory, but they actually help focus the mind. Of course any real hacker can't resist learning to program. Hacking without programming is like a blind man learning to appreciate Rembrandt. He can say the right things and pass an art appreciation exam, but he's missing something big. Estimate how much time you spend online per...

Hacker Manifesto
Usage rating

You bet your ass we're all alike... we've been spoon-fed baby food at school when we hungered for steak... the bits of meat that you did let slip through were pre-chewed and tasteless. We've been dominated by sadists, or ignored by the apathetic. The few that had something to teach found us willing pupils, but those few are like drops of water in the desert. This is our world now... the world of the electron and the switch, the beauty of the baud. We make use of a service already existing without paying for what could be dirt-cheap if it...

Hackers Heroes of the Computer Revolution
Usage rating

The Tech Model Railroad Club or the TMRC was a club at MIT that build sophisticated railroad and trains models. These were among the first hackers. Key figures of the club were Peter Samson , Alan Kotok , Jack Dennis , and Bob Saunders . The club was composed of two groups, those who were interested in the modeling and landscaping, and those who created the Signals and Power Subcommittee who created the circuits that made the trains run. The latter would be among the ones who popularized the term hacker among many other slang terms, and who eventually moved...

Hacker ethic
Usage rating

1. The belief that information-sharing is a powerful positive good, and that it is an ethical duty of hackers to share their expertise by writing open source code and facilitating access to information and to computing resources wherever possible. 2. The belief that system-cracking for fun and exploration is ethically OK as long as the cracker commits no theft, vandalism, or breach of confidentiality. Both of these normative ethical principles are widely, but by no means universally, accepted among hacker s. Most hackers subscribe to the hacker ethic in sense 1, and many act on it by writing and giving...

Hacking
Usage rating

Have there been some famous hacks? There have been many wonderful hacks, emacs is one example. I doubt many of them are famous, however, because noncomputer people rarely understand exactly what makes a hack famous. To be famous, a hack must show a high degree of novelty, as well as a deep understanding of the way computers work, and must be significantly more elegant than a kludge. What are some methods that crackers use? Some recent crackers have sent programs in email to unsuspecting users as attachments. Running these programs will give the cracker access to the computer. The programs...

Map