Skip to main content

Home/ Collective Intelligence theory research/ Group items tagged hacking

Rss Feed Group items tagged

Gonzalo San Gil, PhD.

Book Review: Ethical Hacking and Penetration Testing Guide - EH-Net Online Mag - 0 views

  •  
    "don | September 30, 2014 When asked by CRC Press to review a recently released book, Ethical Hacking and Penetration Testing Guide by Rafay Baloch, a closer look was in order before agreeing. The book description reads, "Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to complete a penetration test, or ethical hack, from beginning to end."
  •  
    "don | September 30, 2014 When asked by CRC Press to review a recently released book, Ethical Hacking and Penetration Testing Guide by Rafay Baloch, a closer look was in order before agreeing. The book description reads, "Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to complete a penetration test, or ethical hack, from beginning to end."
Gonzalo San Gil, PhD.

On Hacking - Richard Stallman - 0 views

  •  
    "Richard Stallman's personal site. https://stallman.org For current political commentary, see the daily political notes. RMS' Bio | The GNU Project On Hacking In June 2000, while visiting Korea, I did a fun hack that clearly illustrates the original and true meaning of the word "hacker". I went to lunch with some GNU fans, and was sitting down to eat some tteokpaekki (*), when a waitress set down six chopsticks right in front of me. It occurred to me that perhaps these were meant for three people, but it was more amusing to imagine that I was supposed to use all six. I did not know any way to do that, so I realized that if I could come up with a way, it would be a hack. I started thinking. After a few seconds I had an idea. "
  •  
    "Richard Stallman's personal site. https://stallman.org For current political commentary, see the daily political notes. RMS' Bio | The GNU Project On Hacking In June 2000, while visiting Korea, I did a fun hack that clearly illustrates the original and true meaning of the word "hacker". I went to lunch with some GNU fans, and was sitting down to eat some tteokpaekki (*), when a waitress set down six chopsticks right in front of me. It occurred to me that perhaps these were meant for three people, but it was more amusing to imagine that I was supposed to use all six. I did not know any way to do that, so I realized that if I could come up with a way, it would be a hack. I started thinking. After a few seconds I had an idea. "
Gonzalo San Gil, PhD.

U.S. Congress must act on government hacking, reject Rule 41 - Access Now - 0 views

  •  
    "Washington D.C. - Access Now today calls upon the U.S. Congress to reject a new rule that will expand the Federal Bureau of Investigation's (FBI) hacking operations. The call comes as the Supreme Court of the United States reported a change in the Federal Rules of Criminal Procedure, specifically Rule 41, to Congress. The change enables the FBI to hack into computers regardless of where they are located, and to hack into the computers belonging to the victims of botnet operations. Access Now strongly opposes the update to Rule 41."
  •  
    "Washington D.C. - Access Now today calls upon the U.S. Congress to reject a new rule that will expand the Federal Bureau of Investigation's (FBI) hacking operations. The call comes as the Supreme Court of the United States reported a change in the Federal Rules of Criminal Procedure, specifically Rule 41, to Congress. The change enables the FBI to hack into computers regardless of where they are located, and to hack into the computers belonging to the victims of botnet operations. Access Now strongly opposes the update to Rule 41."
Gonzalo San Gil, PhD.

FBI's Tor Hack Shows the Risk of Subpoenas to Security Researchers | WIRED - 0 views

  •  
    "Computer security researchers who expose hackable vulnerabilities in digital products face plenty of occupational hazards: They can have their work censored by threats of lawsuits from the companies whose products they hack, or they can even be criminally indicted if their white-hat hacking runs afoul of the Computer Fraud and Abuse Act. But one still-mysterious encounter between security researchers and the law points to a newer, equally troubling possibility: They can have their work subpoenaed in a criminal investigation and used as a law enforcement tool."
  •  
    "Computer security researchers who expose hackable vulnerabilities in digital products face plenty of occupational hazards: They can have their work censored by threats of lawsuits from the companies whose products they hack, or they can even be criminally indicted if their white-hat hacking runs afoul of the Computer Fraud and Abuse Act. But one still-mysterious encounter between security researchers and the law points to a newer, equally troubling possibility: They can have their work subpoenaed in a criminal investigation and used as a law enforcement tool."
Gonzalo San Gil, PhD.

5 signs your Web application has been hacked | ITworld - 0 views

  •  
    "hacked FREE Become An Insider Sign up now and get free access to hundreds of Insider articles, guides, reviews, interviews, blogs, and other premium content from the best tech brands on the Internet: CIO, CSO, Computerworld, InfoWorld, IT World and Network World Learn more. Other Insider Recommendations Java 101 primer: Composition and inheritance 6 simple tricks for protecting your passwords Free course: "JavaScript: The Good Parts" Free Course: The Dark Side of Technology Careers Website defacements? Database dumps? Mysterious files? Here's how to tell if your Web application has been hacked -- and how to secure it once and for all"
  •  
    "hacked FREE Become An Insider Sign up now and get free access to hundreds of Insider articles, guides, reviews, interviews, blogs, and other premium content from the best tech brands on the Internet: CIO, CSO, Computerworld, InfoWorld, IT World and Network World Learn more. Other Insider Recommendations Java 101 primer: Composition and inheritance 6 simple tricks for protecting your passwords Free course: "JavaScript: The Good Parts" Free Course: The Dark Side of Technology Careers Website defacements? Database dumps? Mysterious files? Here's how to tell if your Web application has been hacked -- and how to secure it once and for all"
Gonzalo San Gil, PhD.

Is Biometrics Technology Safe? - 0 views

  •  
    "Biometrics is a step forward, but it increases risks. What happens when the digital code for a fingerprint, iris scan, voice print or facial geometry is hacked?"
  •  
    "Biometrics is a step forward, but it increases risks. What happens when the digital code for a fingerprint, iris scan, voice print or facial geometry is hacked?"
Gonzalo San Gil, PhD.

Government Hacking and Subversion of Digital Security | Electronic Frontier Foundation - 0 views

  •  
    "oo often, the policies and practices of law enforcement and intelligence agencies can be disastrous for security."
Gonzalo San Gil, PhD.

Tips for learning how to give a presentation | Opensource.com - 0 views

  •  
    "Hack-A-Week is an event my team at Red Hat runs every year to encourage innovation. During that week engineers can work on any project they choose. After the week is over, each engineer gives a short presentation on what they worked on. Some examples are:"
Gonzalo San Gil, PhD.

What to Do About Lawless Government Hacking and the Weakening of Digital Security | Ele... - 0 views

  •  
    "In our society, the rule of law sets limits on what government can and cannot do, no matter how important its goals. "
  •  
    "In our society, the rule of law sets limits on what government can and cannot do, no matter how important its goals. "
Gonzalo San Gil, PhD.

The Happy Chemicals: How To Naturally Tap Into Dopamine, Serotonin, Endorphins, Oxytoci... - 0 views

  •  
    "We might not have the money we want but we do have some control over our happiness levels. Dopamine, serotonin, oxytocin and endorphins are the brain chemicals responsible for our happiness. These chemicals are can be triggered all the time, even by mundane events. But rather than thinking we have no control over them, science has proven that we can intentionally boost them. And being in a good state of mind is important for happiness, health and success. So here are some simple ways to hack our positive neurochemicals:"
Gonzalo San Gil, PhD.

A young developer explains what hackathon culture means to her | Opensource.com - 0 views

  •  
    ""It is not who you are nor what you are, but what you do.""
Gonzalo San Gil, PhD.

Announcing a call for writers on open government and open data | opensource.com - 0 views

  •  
    "Transparency, participation, and collaboration are key components to open source but also to the open government movement. During the month of May, Opensource.com will feature stories where open source and government are transforming communities. From May 12 - 23, we'll highlight some great people and projects in open government, open data, and civic hacking, and we'll provide resources on how you can get involved yourself. Get a head start on Open Government Week by checking out our latest reports on open source in government."
Gonzalo San Gil, PhD.

The new art of war: How trolls, hackers and spies are rewriting the rules of conflict -... - 0 views

  •  
    "By Steve Ranger Cyberwar isn't going to be about hacking power stations. It's going to be far more subtle, and more dangerous."
Gonzalo San Gil, PhD.

Open source code is not enough | Opensource.com - 0 views

  •  
    "Automotive software issues, such as the Jeep hack and Volkswagen cheating on emissions tests, have made headlines this year, which means the public is thinking about software in cars like never before. Some experts have argued that mandating that such software be open source is a solution to the problem. Although there are definite benefits to public scrutiny of the software, code visibility alone is no guarantee. As Sam Liles explained to me in a recent email, open source code didn't prevent ShellShock."
Gonzalo San Gil, PhD.

Online discussions about rape, cannibalism, torture are not illegal, court rules | Ars ... - 0 views

  •  
    "Judges also rule prosecutors abused the anti-hacking Computer Fraud and Abuse Act. by David Kravets (US) - Dec 5, 2015 10:35am CET"
Gonzalo San Gil, PhD.

Cracking Linux with the backspace key? [LWN.net] - 0 views

  •  
    "Anybody who has been paying attention to the net over the last week or so will certainly have noticed an abundance of articles with titles like "How to hack any Linux machine just using backspace". All this press does indeed highlight an important vulnerability, but it may not be the one that they think they are talking about."
Gonzalo San Gil, PhD.

GitHub Goes Government, Aims To Open Source Civics - ReadWrite - 0 views

  •  
    "Hey, developers! Here's how you can have more say in city, state or national government than ever before."
Gonzalo San Gil, PhD.

Be a civic hacker for your community | Opensource.com - 0 views

  •  
    "There is a civic hacker in you! He or she is in there... I promise! Today, technology has evolved into a perfect storm of open source tools, code, social networks, and lots of data. Civic technologists thrive on all of these getting together with like-minded hackers and turning all these sources into useful applications, websites and visualizations."
  •  
    "There is a civic hacker in you! He or she is in there... I promise! Today, technology has evolved into a perfect storm of open source tools, code, social networks, and lots of data. Civic technologists thrive on all of these getting together with like-minded hackers and turning all these sources into useful applications, websites and visualizations."
1 - 18 of 18
Showing 20 items per page