«
Expand/Collapse
481 items tagged "hacker"
Related tags:
audio [+],
video [+],
social engineering [+],
slides [+],
black hat [+],
read [+],
news [+],
lulzsec [+],
ipad [+],
hacker group [+],
group [+],
facebook [+],
court [+],
attack [+],
accused [+],
year [+],
video hacker [+],
usa [+],
steve dunker [+],
pwned [+],
jailed [+],
hackers [+],
hacker attack [+],
guide [+],
dunker [+],
course [+],
computer [+],
breach [+],
alleged [+],
world [+],
stefan zehl [+],
science authors [+],
science [+],
russian hacker [+],
russian [+],
quiz [+],
police [+],
paper [+],
owner [+],
net [+],
malware [+],
magazine [+],
job [+],
iphone [+],
initial rounds [+],
hacking [+],
hacker threat [+],
government [+],
drew miller [+],
distinct research [+],
claims [+],
chaos communication camp [+],
arrested [+],
army [+],
admits [+],
zine issue [+],
zine [+],
yearender [+],
year in review [+],
works [+],
winn schwartau [+],
windows security [+],
windows [+],
website [+],
web [+],
washington [+],
warns [+],
verizon [+],
unix signals [+],
trojan [+],
transportation [+],
traced [+],
toorcamp [+],
tjx [+],
target [+],
stock fraud [+],
stock [+],
steals [+],
state [+],
space [+],
solidarity [+],
seriously [+],
second [+],
scarlett johansson [+],
recent news [+],
quiz format [+],
project [+],
ports [+],
port [+],
pleads [+],
playstation [+],
pirates [+],
phone hacker [+],
perspective [+],
personal info [+],
oscars [+],
not [+],
mulls [+],
miley cyrus [+],
miley [+],
messing [+],
lisa thalheim [+],
kinect [+],
just [+],
judge [+],
jailbreak [+],
jail [+],
issue [+],
hacker news magazine [+],
hacker community [+],
hack [+],
gets [+],
geohot [+],
future [+],
fraud scheme [+],
fraud [+],
fort monmouth [+],
fort [+],
for [+],
fears [+],
fbi [+],
duel [+],
diginotar [+],
dan kaminsky [+],
cyrus hacker [+],
customer record [+],
cons [+],
concurrency issues [+],
concurrency [+],
comodo [+],
classic [+],
chinese hacker [+],
chaos computer club [+],
bsnl [+],
bill [+],
arduino [+],
anonymous [+],
android [+],
after [+],
Software [+],
Public [+],
Hackerspaces [+],
ARM [+],
zynga [+],
zodiac island [+],
zodiac [+],
zeus botmaster [+],
zeus [+],
zero day [+],
zelda and [+],
yesterday [+],
years [+],
worm [+],
wooden propeller [+],
wireless security [+],
wicked [+],
web pages [+],
wearable [+],
water plant [+],
wash [+],
warnings [+],
vows [+],
volunteer program [+],
volunteer [+],
vmware [+],
virus [+],
virtual poker [+],
vienna [+],
video world [+],
video wall [+],
video projectors [+],
video poker [+],
viacom [+],
vendor [+],
use [+],
unmasking [+],
unlocks [+],
unlocking the iphone [+],
university of wisconsin system [+],
university of wisconsin [+],
university [+],
universal music [+],
unhappiness [+],
understatement [+],
uk student [+],
uk hacker [+],
uk decision [+],
uconn [+],
ubuntu [+],
typer [+],
two and a half years [+],
twitter [+],
tries [+],
tricks [+],
translates [+],
tracking cookie [+],
tracking [+],
tkkrlab [+],
tinfoil hat [+],
timeline [+],
threat [+],
thief [+],
theft [+],
the netherlands [+],
texas hospital [+],
texas [+],
terror [+],
terabyte [+],
team [+],
taught [+],
targets [+],
tags [+],
tackles [+],
tables [+],
system [+],
suspected [+],
suit [+],
subpoenas [+],
student computer [+],
student [+],
stratfor [+],
store web [+],
stolen [+],
stole [+],
sting [+],
steve jobs [+],
stereotypes [+],
steal [+],
ssl [+],
spy [+],
speculation [+],
source code [+],
source [+],
someone [+],
soldercore [+],
sold [+],
soca [+],
slovenia [+],
slammer [+],
sixth [+],
six years [+],
single [+],
silverton oregon [+],
sights [+],
siemens industrial [+],
siemens [+],
show [+],
sharing knowledge [+],
sextortionist [+],
sexism [+],
settled [+],
set [+],
serial hacker [+],
sentiment [+],
sentences [+],
sentenced [+],
self [+],
sega consoles [+],
sega [+],
seeks [+],
security professionals [+],
secure [+],
second time [+],
sec [+],
season [+],
search [+],
scorns [+],
scene [+],
sandwich [+],
san francisco [+],
sabotage [+],
s. man [+],
s. authorized [+],
ryan cleary [+],
rugby [+],
rowley associates [+],
rose heading [+],
rose [+],
robots [+],
robot arm [+],
robot [+],
robocontrol [+],
rival group [+],
risk [+],
ring [+],
reveal [+],
respect [+],
required [+],
renovations [+],
remain [+],
releases [+],
refuses [+],
recruiters [+],
recovers [+],
rear window [+],
rear [+],
rbs [+],
rats [+],
rampage [+],
raids [+],
quick [+],
pwns [+],
pwn [+],
purported [+],
prosthesis [+],
prosecuted [+],
product developer [+],
probe [+],
privacy regulations [+],
primer [+],
price tag [+],
power symbol [+],
porridge [+],
police cruiser [+],
poker chips [+],
poker [+],
pointless website [+],
pointer finger [+],
playstation 3 [+],
plays [+],
pirate [+],
physical spaces [+],
phone [+],
phillip torrone [+],
personal data [+],
personal [+],
pay [+],
paul [+],
pastime [+],
passwords [+],
parking meters [+],
parking [+],
pages [+],
owned [+],
outs [+],
outnumber [+],
orlando florida [+],
oregon [+],
ordered [+],
ops employees [+],
ops [+],
opening doors [+],
once [+],
old [+],
octocopter [+],
obama [+],
nyse [+],
notorious [+],
norton antivirus [+],
norton [+],
north korea [+],
north [+],
nod [+],
next gen iphone [+],
news of the world [+],
new york city [+],
nevada [+],
network [+],
neah bay washington [+],
neah bay [+],
nashville tn [+],
nashville [+],
nasa hacker [+],
nasa [+],
nano [+],
nabs [+],
must [+],
multiple [+],
mozilla [+],
movement [+],
motorola [+],
motorcycle engines [+],
month [+],
mohawks [+],
modern warfare [+],
modem [+],
misc [+],
mind tricks [+],
millions [+],
milestones [+],
mike doell [+],
microcontrollers [+],
metal keys [+],
medical [+],
mckinnon [+],
mayor [+],
may [+],
marriot [+],
mariposa [+],
manhunt [+],
makes [+],
make [+],
mainstream [+],
mac trojan [+],
mac [+],
lunar lander game [+],
luigi [+],
low hanging fruit [+],
linked [+],
limor fried [+],
limor [+],
life in prison [+],
legal bills [+],
led bulbs [+],
led [+],
leader louise boat [+],
lawyers [+],
launches [+],
launched [+],
larry [+],
lady gaga [+],
lady [+],
korea [+],
koobface [+],
knuckles [+],
kiwi [+],
kim jong [+],
kills [+],
kickstarter [+],
kernel [+],
julian skidmore [+],
julian [+],
judge sentences [+],
joins [+],
job seekers [+],
job interview [+],
jester [+],
jails [+],
jailbroken [+],
irish [+],
iphone hacker [+],
ios [+],
invades [+],
into [+],
international [+],
internal affairs [+],
internal [+],
intel [+],
inquirer [+],
identities [+],
ibutton [+],
hyundai [+],
hunts [+],
hunt [+],
humiliation [+],
hotline [+],
hospital [+],
homebrew computer [+],
home [+],
holiday decorations [+],
hobbyists [+],
hits [+],
his [+],
helps [+],
heist [+],
hassle [+],
harsh sentence [+],
happy new year [+],
happens [+],
half [+],
hacker world [+],
hacker stereotypes [+],
hacker scene [+],
hacker identities [+],
hacker hits [+],
hacker culture [+],
hacker crew [+],
hacker cracks [+],
hacker conference [+],
hacker case [+],
hacker attacks [+],
hackaday [+],
guilty [+],
grows [+],
greets [+],
government sites [+],
government rules [+],
government businesses [+],
georgia [+],
george hotz [+],
gen iphone [+],
gears [+],
games [+],
game spy [+],
gaga [+],
frogster [+],
friendly [+],
friend eric [+],
free sony [+],
fox news [+],
forever [+],
focused [+],
fix [+],
fire [+],
finger [+],
finds [+],
fellow hacker [+],
federal reserve [+],
federal grand jury [+],
fear [+],
fat [+],
fake news [+],
fake [+],
failure [+],
faces [+],
faceniff [+],
face off [+],
face charges [+],
extradition [+],
exploits [+],
experimenters [+],
exercise [+],
evil hacker [+],
evil [+],
evidence [+],
european models [+],
eric evenchick [+],
eric [+],
erased [+],
emerges [+],
ebay hacker [+],
ebay [+],
easy [+],
duty [+],
dup [+],
dream [+],
downloads [+],
downing [+],
down [+],
doom [+],
dont budge [+],
donations [+],
dojo [+],
doctor wily [+],
dissolution [+],
develops [+],
dev [+],
detain [+],
design patterns [+],
design [+],
delivers [+],
delay [+],
defends [+],
defence contractors [+],
defacer [+],
dedicated [+],
decision [+],
debug mode [+],
ddos tool [+],
ddos [+],
day [+],
dating site [+],
data breach [+],
data [+],
dailin [+],
cyber theft [+],
cyber bill [+],
customer data [+],
current technologies [+],
cuffed [+],
cryptography [+],
crisis [+],
cripples [+],
crims [+],
crimps [+],
criminal [+],
crimes [+],
crew [+],
cracks [+],
cops [+],
cookie [+],
controls [+],
consortium [+],
console [+],
computer hacker [+],
computer gear [+],
compromises [+],
compromised [+],
compromise [+],
company [+],
commodore 64 [+],
commodore [+],
comcast [+],
colornode [+],
color [+],
code [+],
cloud [+],
city bank [+],
cisco [+],
chinese government [+],
chinese [+],
china [+],
charged [+],
challenging [+],
certificate [+],
celebrities [+],
cctv [+],
camp [+],
call of duty [+],
california [+],
calendars [+],
calendar [+],
burglary [+],
building [+],
british [+],
brit [+],
breaks [+],
breaching [+],
brags [+],
botnet [+],
botmaster [+],
boasts [+],
blue [+],
bit computers [+],
billboard [+],
behind [+],
bbc [+],
bans [+],
banning [+],
bank account [+],
bank [+],
bail [+],
baby kisser [+],
aware [+],
avoids [+],
authorities [+],
attendees [+],
atascadero [+],
ashton kutcher [+],
apple jailbreak [+],
apple hires [+],
apple [+],
appearance [+],
anvisoft [+],
antisec [+],
answer question [+],
anonymous hacker [+],
amex [+],
american [+],
amazon [+],
albert gonzalez claims [+],
albert gonzalez [+],
albert [+],
al qaida web site [+],
al qaida [+],
against [+],
affairs [+],
adobe [+],
account [+],
academic papers [+],
abortion provider [+],
Release [+],
HackIt [+],
General [+],
ExploitsVulnerabilities [+],
Countermeasures [+],
6 years [+],
23th [+],
10 million [+],
chaos communication congress [+],
sony [+],
jeopardy [+],
hacks [+],
zoz,
your,
xbox,
x is,
wrt,
wreaks,
worries,
worldpay,
wonderland,
woman,
with,
wired,
wire fraud,
wilderness,
wikileaks,
why,
when,
website hacker,
website defaced,
webmail,
web traffic,
washington state university,
warning,
vulnerability,
voting,
voip services,
voip,
virus attacks,
victims,
victim,
verdict,
venezualan,
vendetta,
vault,
va.,
v for vendetta,
v for,
utopia,
users,
us history,
updated,
unstoppable,
unleashes,
university of north florida,
university database,
universal,
undo,
u.s.,
type,
tut,
turkey,
tsunami warning,
tsunami,
track,
toy vault,
toy,
town,
tory mp,
tory,
told,
time,
tiempo compartido,
threat analysis,
thomas cannon,
third party,
third,
thin clients,
that,
than snow,
than,
testifying,
testifies,
temple,
tell,
teen hacker,
teen,
technology,
technological utopia,
techcrunch,
tax,
taoist temple,
taoist,
takes,
t hacker,
swipes,
sweden,
survival,
super,
stuxnet,
study,
stock exchange,
step checklist,
step,
stealing,
state website,
state house,
stage,
st. louis police computer,
spy program,
spree,
spikes,
spammer,
south africa,
source codes,
sophistication,
social,
snow leopard,
snes,
smartphones,
slap,
skunkd,
skool,
site hacker,
site,
siphoning,
sinks,
silence,
shuts,
shut,
shaquille oneal,
shaquille o neal,
sexier,
sex sting,
sex,
serve,
serial and parallel ports,
september,
sentence,
seminal piece,
seller,
security web,
security hole,
secret service,
sea creature,
scripts,
scots,
scientology website,
scientology,
school,
scheme,
sarah palin,
same time,
russians,
runs,
royal navy,
royal,
routt,
rose and,
rootkit,
rips,
ripped,
riddled,
rick dakan,
rich,
revenge,
reports,
report,
replaces,
remotely,
released,
redirected,
reddit,
radio,
quot,
que es un hacker,
qualys,
puppies,
promises,
program,
process,
probation,
prison time,
prison term,
prison,
pretends,
police nab,
police computer,
pkk,
pirate bay,
phreaknic,
photos,
photo,
personal life,
persecution,
perelli,
pentagon,
peculiar combination,
pdf files,
pcs,
payroll files,
pax,
paula dockery,
patrick becker,
patches,
parliament website,
parliament,
palin,
pakistan,
pakbugs,
p2p,
own,
owes,
out,
other,
osu,
org,
online,
offers,
ns geode,
notacon,
north florida computer,
noisebridge,
nintendo gaming,
nintendo,
nexus,
new,
neighbor,
navy website,
nat traversal,
nat,
name,
nabbed,
nab hacker,
mules,
mother,
moscow,
months,
monstr,
mods,
mod editor,
minority report,
minority,
ministry of sound,
ministry,
mile zero,
microsoft,
michael schearer,
miami,
media accounts,
mechanical setup,
mcafee,
manipulation,
manifesto,
mandela,
manages,
malikaii,
malfeasance,
major,
mail hacker,
mail,
mafia,
low,
louisiana,
looks,
lone hacker,
lily allen suing,
lily allen,
life,
liable,
lets,
left behind,
left,
laws,
latvian,
laptop,
kids,
justin bieber,
joe,
jailbreaks,
italian friends,
israeli hacker,
israeli,
iphone 4,
iowa university,
iowa,
internet,
insurance company,
insider trading,
innocent man,
info,
infiltration,
infiltrates,
infected,
indicted,
india,
identifies,
iceman,
how,
hosts,
honeypots,
homeland security,
hitler photo,
hitler,
hit,
heu,
hero,
heralds,
healthcare,
hdtvs,
havoc,
harvard study,
harvard college,
harvard,
harassed,
handbook,
hacking game,
hackers de software,
hacker web,
hacker site,
hacker posts,
hacker hero,
hacker forum,
hacker ethic,
hacker detection,
hacker computer,
hacked,
guns n roses tour,
guns n roses,
gravity,
google,
glimmer of hope,
glimmer,
glider,
geode gx1,
geek,
game,
gains,
gagging order,
g. mark hardy,
fun,
foul mouth,
forum,
fortune,
foreign,
forbes,
floodlights,
flaws,
flaw,
flash units,
firmware,
firefox,
file,
figures,
feds,
federal crimes,
federal,
favourite,
fast,
fashion,
fall,
fake accounts,
facing,
faced,
facebook friends,
extradited,
exposes,
exposed,
exploit,
example source,
example,
examines,
evolution game,
evolution,
everyone,
ettercap,
esteban,
enlists,
emt,
email,
electronic alchemy,
electronic,
electoral fraud,
elaborat,
editor buffer,
editor,
east expo,
east anglia,
e mail,
dsniff,
dshs,
drug arrest,
drug,
droid,
drm,
dream machine,
doe,
dll,
diy,
dismisses,
disasters,
disaster survival,
disables,
digital,
dick,
dhh,
detection,
desire,
des moines,
derailed,
deportation,
demonstrates,
democrat,
dell streak,
dell,
defcon,
defaces,
defacement,
defaced,
decline,
decades,
darknet,
danger,
dae,
d.c.,
cyberattack,
cyber crime,
cyber,
customs,
custom firmware,
custom,
culture event,
culture,
crutch mounted,
crime,
credit card data,
credit,
cracked,
crack,
court appearance,
couple,
county web,
could,
conviction,
controller to,
continues,
continue,
contests,
contest series,
construction glass,
conspiracy,
conscience of a hacker,
conscience,
confidential employee,
confidential,
computer server,
complicit,
commits,
college,
climbs,
climate research unit,
classifieds,
cheong,
checklist,
charles schwab,
ceridian,
cereal,
central moscow,
central,
case,
cars,
carbon trading,
capital,
cameras,
camera flash,
cadrer,
cable modem,
cable,
bust,
builds,
build,
buffer overflow vulnerability,
bsql,
bruce raisley,
bristol,
break,
breadboarding,
breaches,
breached,
brains,
bof,
blog,
blackberry,
bit,
biotech,
biggest,
big,
betta splendens,
bedia,
become,
battle,
balked,
axl rose,
axl,
autonomous machines,
australian,
attempted theft,
attempt,
attacks,
atms,
atm,
aslr,
asif ali zardari,
asif ali,
article,
arrests,
arrest,
arp spoofing,
arp poisoning,
apple to,
apple persecution,
annual report,
annual,
analysis,
alice gate,
alice,
alibaba,
alchemy,
aka,
again,
adopt,
adelaide,
adds,
adafruit,
acting,
accesses,
access,
a way,
Philes,
Newbie,
Learn,
Interviews,
Discussion,
Discusion,
Area,
5 million,
4 months,
3 years,
10 years
-
-
4:51
»
SecDocs
Tags:
social Event:
Chaos Communication Congress 21th (21C3) 2004 Abstract: Despite her gender handicap, b9punk has managed to chill out in the American Hacker scenes and retain her self-respect. Her contemporaries think that's a pretty big accomplishment and would like her to talk to you about her (pending) patented formula for what she crudely calls "putting up with the bullpucky, and getting something out of the hacker scene besides sex. She's also conducted a extensive survey with some of your favorite hacker celebrities and ordinary people to sort out the Fact from the Fiction concerning myths about girls in the hacker scene.
-
-
14:07
»
SecDocs
Authors:
Stefan Zehl Tags:
hacker jeopardy Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: The well known quizshow format, but of course covering topics not usually seen on television Hacker Jeopardy is a quiz following the well known inverted answer-question scheme. Heise once entitled it "Number guessing for geeks", which is of course a very unfair abbreviation: it's also guessing for letters and special characters :)
-
14:07
»
SecDocs
Authors:
Stefan Zehl Tags:
hacker jeopardy Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: The well known quizshow format, but of course covering topics not usually seen on television Hacker Jeopardy is a quiz following the well known inverted answer-question scheme. Heise once entitled it "Number guessing for geeks", which is of course a very unfair abbreviation: it's also guessing for letters and special characters :)
-
-
2:56
»
SecDocs
Authors:
Dan Kaminsky Tags:
hacking Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: In the near future, hackers are facing new challenges that can't easily be compared to the ones in the recent years. Operating systems have been hardened and the task of taking advantage of bugs and flaws is getting more complicated every day
-
2:56
»
SecDocs
Authors:
Dan Kaminsky Tags:
hacking Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: In the near future, hackers are facing new challenges that can't easily be compared to the ones in the recent years. Operating systems have been hardened and the task of taking advantage of bugs and flaws is getting more complicated every day
-
-
12:22
»
SecDocs
Authors:
Lisa Thalheim Tags:
vulnerability Event:
Chaos Communication Camp 2007 Abstract: This lecture wants to make the audience a bit more familiar with a species of bugs that is not yet as boring and overfished as your vanilla buffer overflow: concurrency issues. Bring your debugger and some rubber gloves, because when investigating these beasts, you will need them. Concurrency of operation can be found in most larger software systems; think multi-threading, think UNIX signals, think asynchronous I/O operations, to give just a few hints. However, since concurrency always adds complexity in non-obvious ways, there are all kinds of things that it can make go wrong. Usually, this boils down to the violation of assumptions the system's developers have made - and violated assumptions have always been a hacker's best friend. After a brief introduction to what concurrency issues actually are, this presentation will show how to approach finding and exploiting these issues in software systems and highlight some of the challenges the nosy hacker faces in doing so. The presented material will be supported by examples from real-world software.
-
12:22
»
SecDocs
Authors:
Lisa Thalheim Tags:
vulnerability Event:
Chaos Communication Camp 2007 Abstract: This lecture wants to make the audience a bit more familiar with a species of bugs that is not yet as boring and overfished as your vanilla buffer overflow: concurrency issues. Bring your debugger and some rubber gloves, because when investigating these beasts, you will need them. Concurrency of operation can be found in most larger software systems; think multi-threading, think UNIX signals, think asynchronous I/O operations, to give just a few hints. However, since concurrency always adds complexity in non-obvious ways, there are all kinds of things that it can make go wrong. Usually, this boils down to the violation of assumptions the system's developers have made - and violated assumptions have always been a hacker's best friend. After a brief introduction to what concurrency issues actually are, this presentation will show how to approach finding and exploiting these issues in software systems and highlight some of the challenges the nosy hacker faces in doing so. The presented material will be supported by examples from real-world software.
-
-
9:31
»
Hack a Day
Just a few weeks ago we were wondering if we’d try to build our own prosthesis if we were ever to lose a limb. This pair of hacks answers that query with a resounding “YES!”. To the right is a replacement pointer finger. The missing digit took the first two knuckles with it, but there’s enough [...]
-
-
12:07
»
SecDocs
Tags:
hacker jeopardy Event:
Chaos Communication Congress 23th (23C3) 2006 Abstract: The well known quizshow format, but of course covering topics not usually seen on television Hacker Jeopardy is a quiz following the well known inverted answer-question scheme. It was once entitled as "number guessing for geeks", which is of course a very unfair abbreviation: it's also guessing of letters and special characters :) The quiz is played in three initial rounds with three candidates each, competing for their seat in the final round, in which last years winner joins in as a fourth candidate
-
-
21:37
»
SecDocs
Tags:
hacker jeopardy Event:
Chaos Communication Congress 23th (23C3) 2006 Abstract: The well known quizshow format, but of course covering topics not usually seen on television Hacker Jeopardy is a quiz following the well known inverted answer-question scheme. It was once entitled as "number guessing for geeks", which is of course a very unfair abbreviation: it's also guessing of letters and special characters :) The quiz is played in three initial rounds with three candidates each, competing for their seat in the final round, in which last years winner joins in as a fourth candidate
-
-
6:01
»
Hack a Day
Toorcamp is all wrapped up after four great days of talks, hacking, and parties. Located in Neah Bay, Washington, Toorcamp was a four day event modelled after European hacker camps. This is the second time Toorcamp has been run, and it’s clear that both the organizers and attendees know how to throw an awesome stateside [...]
-
-
12:01
»
Hack a Day
Last month, we lamented that Toorcamp was coming but we weren’t going to be able to attend. Since then, we’ve brought a new writer on board that will be going to Toorcamp! [Eric Evenchick] will be attending and supplying coverage for Hackaday. For those who haven’t heard yet, Toorcamp is a 4 day hacker event [...]
-
4:01
»
Hack a Day
The [Hacker Dojo], as you might have suspected, is a California based hacker space that would like your money to help with renovations. Sure, there is nothing wrong with a little dust on the ground, but half of this space was apparently deemed unfit to use for it’s member hackers. For this purpose, they are [...]
-
-
10:01
»
Hack a Day
It seems like hacker-friendly ARM development boards are just exploding into the market right now. Here’s one we haven’t looked at yet. The SolderCore is made by Rowley Associates and is packed with features which help to explain the $80 price tag. [CharlieX] just ordered one and posted a bit about his first day with [...]
-
-
14:01
»
Hack a Day
The last stop on my trip this summer was the Hacker Consortium in Nashville TN. The Hacker Consortium has been around since late 2007 after acquiring a building that had been abandoned for several years. They had quite the task ahead of them, since parts of the roof had caved in and the building was [...]
-
-
21:50
»
SecDocs
Authors:
Stefan Zehl Tags:
hacker jeopardy Event:
Chaos Communication Camp 2011 Abstract: The Hacker Jeopardy is a quiz show. The well known reversed quiz format, but of course hacker style. It once was entitled "number guessing for geeks" by a German publisher, which of course is an unfair simplification. It's also guessing of letters and special characters. ;) Three initial rounds will be played, the winners will compete with each other in the final.
-
-
21:31
»
SecDocs
Authors:
Sergey Bratus Tags:
hacking Event:
Chaos Communication Congress 27th (27C3) 2010 Abstract: Although most academics and industry practitioners regard "hacking" as mostly ad-hoc, a loose collection of useful tricks essentially random in nature, I will argue that hacking has in fact become a "distinct research and engineering discipline" with deep underlying engineering ideas and insights. Although not yet formally defined as such, it are these ideas and insights that drive the great contributions that hacking has been making to our understanding of computing, including the challenges of handling complexity, composition, and security in complex systems. I will argue that hacking uncovers and helps to understand (and teach) fundamental issues that go to the heart of Computer Science as we know it, and will try to formulate several such fundamental principles which I have learned from hacker research. At some point I realized that I was learning more about what really matters in computer science from hacker conventions, Phrack, Uninformed, and other hacker sources than from any academic source. Moreover, it wasn't just about exploits and vulnerabilities, it was about how systems were really designed, as opposed to how developers thought and students were taught they were. Then I realized that the reason for vulnerabilities that kept on giving were quite deeply theoretical and involved, e.g., theory of computation and information theory. Very little of this was quoted or understood in the academic publications.
-
21:31
»
SecDocs
Authors:
Sergey Bratus Tags:
hacking Event:
Chaos Communication Congress 27th (27C3) 2010 Abstract: Although most academics and industry practitioners regard "hacking" as mostly ad-hoc, a loose collection of useful tricks essentially random in nature, I will argue that hacking has in fact become a "distinct research and engineering discipline" with deep underlying engineering ideas and insights. Although not yet formally defined as such, it are these ideas and insights that drive the great contributions that hacking has been making to our understanding of computing, including the challenges of handling complexity, composition, and security in complex systems. I will argue that hacking uncovers and helps to understand (and teach) fundamental issues that go to the heart of Computer Science as we know it, and will try to formulate several such fundamental principles which I have learned from hacker research. At some point I realized that I was learning more about what really matters in computer science from hacker conventions, Phrack, Uninformed, and other hacker sources than from any academic source. Moreover, it wasn't just about exploits and vulnerabilities, it was about how systems were really designed, as opposed to how developers thought and students were taught they were. Then I realized that the reason for vulnerabilities that kept on giving were quite deeply theoretical and involved, e.g., theory of computation and information theory. Very little of this was quoted or understood in the academic publications.
-
-
21:28
»
SecDocs
Authors:
Sergey Bratus Tags:
hacking Event:
Chaos Communication Congress 27th (27C3) 2010 Abstract: Although most academics and industry practitioners regard "hacking" as mostly ad-hoc, a loose collection of useful tricks essentially random in nature, I will argue that hacking has in fact become a "distinct research and engineering discipline" with deep underlying engineering ideas and insights. Although not yet formally defined as such, it are these ideas and insights that drive the great contributions that hacking has been making to our understanding of computing, including the challenges of handling complexity, composition, and security in complex systems. I will argue that hacking uncovers and helps to understand (and teach) fundamental issues that go to the heart of Computer Science as we know it, and will try to formulate several such fundamental principles which I have learned from hacker research. At some point I realized that I was learning more about what really matters in computer science from hacker conventions, Phrack, Uninformed, and other hacker sources than from any academic source. Moreover, it wasn't just about exploits and vulnerabilities, it was about how systems were really designed, as opposed to how developers thought and students were taught they were. Then I realized that the reason for vulnerabilities that kept on giving were quite deeply theoretical and involved, e.g., theory of computation and information theory. Very little of this was quoted or understood in the academic publications.
-
-
21:37
»
SecDocs
Tags:
hacker jeopardy Event:
Chaos Communication Congress 27th (27C3) 2010 Abstract: The Hacker Jeopardy is a quiz show. The well known reversed quiz format, but of course hacker style. It once was entitled "number guessing for geeks" by a German publisher, which of course is an unfair simplification. It's also guessing of letters and special characters. ;) Three initial rounds will be played, the winners will compete with each other in the final.
-
21:37
»
SecDocs
Tags:
hacker jeopardy Event:
Chaos Communication Congress 27th (27C3) 2010 Abstract: The Hacker Jeopardy is a quiz show. The well known reversed quiz format, but of course hacker style. It once was entitled "number guessing for geeks" by a German publisher, which of course is an unfair simplification. It's also guessing of letters and special characters. ;) Three initial rounds will be played, the winners will compete with each other in the final.
-
-
7:01
»
Hack a Day
We really love when friendly competition leads to excellent hacking. Not too long ago, we showed you a nicely done Sega Genesis portable put together by console hacker [Downing] who challenged fellow hacker [EVIL NOD] to a build off. The two were hacking Sega consoles, [Downing’s] for personal use, while [EVIL NOD] was working on [...]
-
-
11:01
»
Hack a Day
[Paul] was looking to spice up his holiday decorations this year, so he picked up some GE Color Effects lights and started hacking away. We’ve already seen how hacker-friendly these LED bulbs are, which is why [Paul] decided to give them a try. His ultimate goal was to synchronize several sets of lights from one [...]
-
5:01
»
Hack a Day
Yes, the Kinect is over one year old now, and after some initial unhappiness from [Microsoft], it’s become a hacker’s best friend. [Eric] decided to celebrate this with an Article all about how it works. If you’re new to this piece of hardware and want to get into working with it, this should be a [...]
-
-
12:38
»
Hack a Day
Above you can see Doctor Wily a Chinese hacker starting up one of the propellers on his octocopter. It seems that the man is using a collection of eight motorcycle engines, each with its own wooden propeller to create an eight-bladed helicopter. We were able to locate some video footage of his experiments, which you’ll find [...]
-
-
14:01
»
Hack a Day
To say that Commodore 64 aficionados are a dedicated group would be quite the understatement. There are still quite a few individuals that spend all sorts of time building and programming for the C64 in order to make using them enjoyable, and to keep up to date with current technologies. [Luigi] is one of these [...]
-
-
9:42
»
Hack a Day
Finding alternative ways to unlock doors is a favorite hacker pastime. TkkrLab recently took on the challenge themselves. The hackerspace, which is located in the Netherlands, faced a problem common to communal workshops; how could they manage keyed access for a large number of members? The metal keys for the door are special, and cannot be [...]
-
-
6:06
»
Hack a Day
[Phillip Torrone] gave us a heads up about a project he and [Limor Fried] along with [Mike Doell] have just wrapped up. Their aptly-named “iCufflinks” softly pulsate with light the same way in which you see many Mac products do. The cufflinks are made from machined aluminum and have the ubiquitous “power symbol” milled into [...]
-
-
7:02
»
Hack a Day
Many a hacker has put together one of those cheap $30 robot arm kits you can get in just about any store with a section labeled, “science”. In an ongoing search for a cheap robot arm, [Larry] decided to modify one of them to be controlled with a PC through an Arduino. The article doubles as [...]
-
-
12:01
»
Hack a Day
2600, the magazine familiar to many as a preeminent hacking quarterly, is publishing a calendar. While, according to the 2600 site, most calendars only mark holidays, 2600 intends to “provide as complete a guide to milestones in the hacker world as humanly possible.” Not an easy task considering that, depending on your definition, hacking could [...]
-
13:21
»
Hack a Day
Yesterday, the BBC posted an article on [Julian Skidmore]‘s AVR-based homebrew computer. [Julian]‘s project uses an AVR and a derivative of Forth to recreate the capabilities of the 8-bit computers of yesteryear. With 8kB of RAM, [Julian] got a TV-out up and running, and even included code for a Lunar Lander game. We’re happy for [Julian] getting some [...]
-
-
5:03
»
Hack a Day
We generated the screen full of code seen above literally by bashing a hand on the keyboard repeatedly like a monkey. You know, just like how hackers are portrayed in the movies? Hacker Typer makes you look like you know what you’re doing even though you’re too lazy to do something real. It’s a pointless website [...]
-
6:05
»
Hack a Day
The Mayor of Silverton, Oregon is a hacker and wants to use roll-your-own hardware in the town’s parking meters. It’s not that he thinks he can do a better job than companies selling modern meters (although there have been notable problems with those), but he wants to retain the sentiment of the 1940′s era parking [...]
-
-
10:00
»
Hack a Day
Though some people differ on what exactly a “hacker” is, there is one thing that can be said for certain – this global community of tinkerers, experimenters, and hobbyists we belong to is one of big hearts. Through our various projects and tutorials, we lead by example – sharing knowledge and offering help whenever we [...]
-
15:01
»
Hack a Day
[paulgeering] has a set of 10 video projectors, usually found inside Sony’s RVP 4010Q 40″ rear projection system that he must get rid of. He is offering them up for free to any Hack-a-Day reader that is interested. He doesn’t have the room to store them any longer, but he can’t bear to see them [...]