141 results on '"hackers"'
Search Results
2. Respawn: Gamers, Hackers, and Technogenic Life
- Author
-
Milburn, Colin
- Subjects
Video games ,Hackers ,Social aspects of technology ,“All your base are belong to us ,” Zero Wing ,Edward Snowden ,meme ,technopolitics ,hacking ,science fiction ,Spacewar! ,Anonymous ,LulzSec ,Will Crowther ,Don Woods ,Adventure ,Atari ,System Shock ,Portal ,glitching ,Anonymous ,Chanology ,Occupy ,PlayStation Network ,PlayStation 3 ,Sony ,Anonymous ,hacktivists ,City of Heroes ,superhero ,online activism ,diaspora ,environmental risk ,Shadow of the Colossus ,Super Mario Sunshine ,Ratchet and Clank ,green gaming ,Final Fantasy VII ,petroculture ,sustainability ,responsibility ,pwn ,Animal Crossing ,Resetti ,For the Win ,Ready Player One ,save point - Abstract
In Respawn Colin Milburn examines the connections between video games, hacking, and science fiction that galvanize technological activism and technological communities. Discussing a wide range of games, from Portal and Final Fantasy VII to Super Mario Sunshine and Shadow of the Colossus, Milburn illustrates how they impact the lives of gamers and non-gamers alike. They also serve as resources for critique, resistance, and insurgency, offering a space for players and hacktivist groups such as Anonymous to challenge obstinate systems and experiment with alternative futures. Providing an essential walkthrough guide to our digital culture and its high-tech controversies, Milburn shows how games and playable media spawn new modes of engagement in a computerized world.
- Published
- 2018
3. Logics and Legacy of Anonymous
- Author
-
Coleman, E. Gabriella, Hunsinger, Jeremy, editor, Allen, Matthew M., editor, and Klastrup, Lisbeth, editor
- Published
- 2020
- Full Text
- View/download PDF
4. Hacking Multifactor Authentication
- Author
-
Roger A. Grimes and Roger A. Grimes
- Subjects
- Computers--Access control--Testing, Computer networks--Security measures, Computer security, Hacking, Hackers, Cryptography
- Abstract
Protect your organization from scandalously easy-to-hack MFA security “solutions” Multi-Factor Authentication (MFA) is spreading like wildfire across digital environments. However, hundreds of millions of dollars have been stolen from MFA-protected online accounts. How? Most people who use multifactor authentication (MFA) have been told that it is far less hackable than other types of authentication, or even that it is unhackable. You might be shocked to learn that all MFA solutions are actually easy to hack. That's right: there is no perfectly safe MFA solution. In fact, most can be hacked at least five different ways. Hacking Multifactor Authentication will show you how MFA works behind the scenes and how poorly linked multi-step authentication steps allows MFA to be hacked and compromised. This book covers over two dozen ways that various MFA solutions can be hacked, including the methods (and defenses) common to all MFA solutions. You'll learn about the various types of MFA solutions, their strengthens and weaknesses, and how to pick the best, most defensible MFA solution for your (or your customers') needs. Finally, this book reveals a simple method for quickly evaluating your existing MFA solutions. If using or developing a secure MFA solution is important to you, you need this book. Learn how different types of multifactor authentication work behind the scenes See how easy it is to hack MFA security solutions—no matter how secure they seem Identify the strengths and weaknesses in your (or your customers') existing MFA security and how to mitigate Author Roger Grimes is an internationally known security expert whose work on hacking MFA has generated significant buzz in the security world. Read this book to learn what decisions and preparations your organization needs to take to prevent losses from MFA hacking.
- Published
- 2021
5. Hybrid professionalism in journalism: Opportunities and risks of hacker sources
- Author
-
Philip Di Salvo and Colin Porlezza
- Subjects
boundary work ,hackers ,hybridity ,journalism ethics ,news sources ,field theory ,hacking ,Communication. Mass media ,P87-96 ,Social Sciences - Abstract
Hackers have a double relevance with regard to the transformation of the journalistic field: first, they have established themselves as journalistic actors, even if their work may sometimes seem unfamiliar. Second, hackers have not only become important sources for information but they are also a topic of public interest in a data-driven society increasingly threatened by surveillance capitalism. This paper critically discusses the role of hackers as news sources by analyzing the “stalkerware” investigation carried out by the online news magazine Motherboard. Drawing from field theory and boundary work, the article sheds light on how hackers exert an increasing influence on journalism, its practices, epistemologies, and ethics, resulting in an increasing hybridization of journalism. Journalism has become a dynamic space, in which hackers are not only becoming relevant actors in the journalism field, but they often represent the only sources journalists have to shed light on wrongdoings. Hence, hackers are increasingly defining the conditions under which journalism is carried out, both in terms of its practices as well as in its normative framework.
- Published
- 2020
- Full Text
- View/download PDF
6. The World of Defacers: Looking Through the Lens of Their Activities on Twitter
- Author
-
Cagri Burak Aslan, Shujun Li, Fatih V. Celebi, and Hao Tian
- Subjects
Cyber attacks ,defacers ,defacement ,graph-based analysis ,hacking ,hackers ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
Many web-based attacks have been studied to understand how web hackers behave, but web site defacement attacks (malicious content manipulations of victim web sites) and defacers' behaviors have received less attention from researchers. This paper fills this research gap via a computational data-driven analysis of a public database of defacers and defacement attacks and activities of 96 selected defacers who were active on Twitter. We conducted a comprehensive analysis of the data: an analysis of a friendship graph with 10,360 nodes, an analysis on how sentiments of defacers related to attack patterns, and a topical modelling based analysis to study what defacers discussed publicly on Twitter. Our analysis revealed a number of key findings: a modular and hierarchical clustering method can help discover interesting sub-communities of defacers; sentiment analysis can help categorize behaviors of defacers in terms of attack patterns; and topic modelling revealed some focus topics (politics, country-specific topics, and technical discussions) among defacers on Twitter and also geographic links of defacers sharing similar topics. We believe that these findings are useful for a better understanding of defacers' behaviors, which could help design and development of better solutions for detecting defacers and even preventing impeding defacement attacks.
- Published
- 2020
- Full Text
- View/download PDF
7. Penetration Testing Essentials
- Author
-
Sean-Philip Oriyano and Sean-Philip Oriyano
- Subjects
- Hacking, Hackers, Computer security
- Abstract
Your pen testing career begins here, with a solid foundation in essential skills and concepts Penetration Testing Essentials provides a starting place for professionals and beginners looking to learn more about penetration testing for cybersecurity. Certification eligibility requires work experience—but before you get that experience, you need a basic understanding of the technical and behavioral ways attackers compromise security, and the tools and techniques you'll use to discover the weak spots before others do. You'll learn information gathering techniques, scanning and enumeration, how to target wireless networks, and much more as you build your pen tester skill set. You'll learn how to break in, look around, get out, and cover your tracks, all without ever being noticed. Pen testers are tremendously important to data security, so they need to be sharp and well-versed in technique, but they also need to work smarter than the average hacker. This book set you on the right path, with expert instruction from a veteran IT security expert with multiple security certifications. IT Security certifications have stringent requirements and demand a complex body of knowledge. This book lays the groundwork for any IT professional hoping to move into a cybersecurity career by developing a robust pen tester skill set. Learn the fundamentals of security and cryptography Master breaking, entering, and maintaining access to a system Escape and evade detection while covering your tracks Build your pen testing lab and the essential toolbox Start developing the tools and mindset you need to become experienced in pen testing today.
- Published
- 2017
8. A Brief History of Hacking and Cyberdefense
- Author
-
Baumard, Philippe, Gaycken, Sandro, Editor-in-chief, Kierkegaard, Sylvia, Series editor, Mallery, John, Series editor, Murdoch, Steven J., Series editor, Geers, Kenneth, Series editor, Kasper, Michael, Series editor, and Baumard, Philippe
- Published
- 2017
- Full Text
- View/download PDF
9. Hacking : Edition Digital Culture 2
- Author
-
Dominik Landwehr and Dominik Landwehr
- Subjects
- Multimedia (Art), Video art, Hacking, Hackers
- Abstract
Seit der Popularisierung der Computertechnologie durch Personal Computer und Internet übt die Strategie des Hackings eine besondere Faszination auf die Medienkunst aus. Warum ist das so? Welche Botschaften vermitteln die Künstler mit diesen Projekten? Der zweite Band der Reihe ‹Edition Digital Culture› geht diesen Fragen auf den Grund. Ein Hack ist eigentlich eine gewitzte Lösung für ein Computerproblem. Hacken steht aber auch für das kreative Aufbrechen einer Technologie und den damit verbundenen Systemen. Ein Hacker will mehr als nur vorgegebene Regeln befolgen, er will die Systeme selbst verändern. Das macht die Figur des Hackers und seine Tätigkeit schillernd und mehrdeutig. Mit Texten von Hannes Gassert, Verena Kuni, Claus Pias, Felix Stalder und Raffael Dörig.
- Published
- 2014
10. Hackings Brand-Equity Nexus.
- Author
-
Kshetri, Nir and Voas, Jeffrey
- Subjects
- *
COMPUTER crimes , *COMPUTER hacking , *CYBERTERRORISM , *BRAND equity - Abstract
Cyberattacks can significantly affect brand reputation, but companies can take measures to repair the damage. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
11. Identification and Integration of Information Security Topics : Applied in a Web Application Programming Course
- Author
-
Brown, Justin, Irvine, Cynthia, editor, and Armstrong, Helen, editor
- Published
- 2003
- Full Text
- View/download PDF
12. The Danger of USB Drives.
- Author
-
Tischer, Matthew, Durumeric, Zakir, Bursztein, Elie, and Bailey, Michael
- Abstract
This study suggests that average users don't recognize the danger of connecting unknown peripherals to a computer, underscoring the continued risk posed by USB drives. Steps organizations can take to safeguard against USB-based attacks are discussed. [ABSTRACT FROM PUBLISHER]
- Published
- 2017
- Full Text
- View/download PDF
13. Hacking in the University: Contesting the Valorisation of Academic Labour
- Author
-
Joss Winn
- Subjects
hacking ,hackers ,academic labour ,valorisation ,history of science ,Marxism ,historical-materialism ,Communication. Mass media ,P87-96 ,Communities. Classes. Races ,HT51-1595 - Abstract
In this article I argue for a different way of understanding the emergence of hacker culture. In doing so, I outline an account of ‘the university’ as an institution that provided the material and subsequent intellectual conditions that early hackers were drawn to and in which they worked. I argue that hacking was originally a form of academic labour that emerged out of the intensification and valorisation of scientific research within the institutional context of the university. The reproduction of hacking as a form of academic labour took place over many decades as academics and their institutions shifted from an ideal of unproductive, communal science to a more productive, entrepreneurial approach to the production of knowledge. A such, I view hacking as a peculiar, historically situated form of labour that arose out of the contradictions of the academy: vocation vs. profession; teaching vs. research; basic vs. applied research; research vs. development; private vs. public; war vs. peace; institutional autonomy vs. state dependence; scientific communalism vs. intellectual property.
- Published
- 2013
- Full Text
- View/download PDF
14. CRAFT(Y)NESS.
- Author
-
STEINMETZ, KEVIN F.
- Subjects
- *
COMPUTER hackers , *COMPUTER hacking , *SOCIAL skills , *LABOR , *PHENOMENOLOGY - Abstract
The idea of the 'hacker' is a contested concept both inside and outside the hacker community, including academia. Addressing such contestation the current study uses ethnographic field research and content analysis to create a grounded understanding of 'the hacker'. In doing so, hacking is revealed to parallel features found in craftwork, often sharing (1) a particular mentality, (2) an emphasis on skill, (3) a sense of ownership over tools and objects of labour, (4) guild-like social and learning structures, (5) a deep sense of commitment, (6) an emphasis on process over result, (7) a common phenomenological experience, and (8) tendencies towards transgression. The final result is that hacking is identified as a kind of transgressive craft or craft(y). [ABSTRACT FROM AUTHOR]
- Published
- 2015
- Full Text
- View/download PDF
15. Web hacker's toolbox : tools used by successful hackers
- Author
-
Packt Publishing, publisher, production company. and Czagan, Dawid, speaker, author.
- Published
- 2022
16. Cyber crime law & economics / The economics of cyber crime
- Author
-
Χατζής, Αριστείδης, Σχολή Οικονομικών, Επιχειρηματικών και Διεθνών Σπουδών. Τμήμα Οργάνωσης και Διοίκησης Επιχειρήσεων, and Δίκαιο και Οικονομία
- Subjects
Economics ,Οικονομικά ,Lawrence Lessig ,Cyber security ,Οικονομική ανάλυση του δικαίου ,Διαδικτυακές επιθέσεις ,Δικτυακό έγκλημα ,e-Crime ,Δίκαιο ,Οικονομική ανάλυση ,Internet ,European Convention on Cybercrime ,Four modalities of constraint ,Hackers ,Hacking ,Κυβερνοχώρος ,Σύμβαση της Βουδαπέστης ,Economic analysis ,Ηλεκτρονικό έγκλημα ,Διαδίκτυο ,Web ,Έγκλημα στον κυβερνοχώρο ,Becker ,Πάροχοι υπηρεσιών διαδικτύου ,Cyber crime ,Law - Abstract
Η παρούσα εργασία επιχειρεί να καταδείξει τις πολυσύνθετες διαστάσεις του ηλεκτρονικού εγκλήματος ως κοινωνικού φαινομένου που γεννήθηκε με την ψηφιακή εποχή και αναδείχθηκε σε διεθνή απειλή, αόρατη, πλην όμως, με ορατό κοινωνικό και οικονομικό αντίκτυπο στον κόσμο του σήμερα. Το ηλεκτρονικό έγκλημα, για το οποίο δεν υπάρχει ομοφωνία ως προς τον ορισμό του από τα περισσότερα κράτη, εμφανίζεται με πολλές μορφές, ορισμένες εκ των οποίων γεννήθηκαν με την άνθηση του Διαδικτύου και ορισμένες αποτελούν την ψηφιακή διάσταση ήδη γνώριμων παραδοσιακών εγκλημάτων. Η εξαντλητική απαρίθμηση δεν είναι εφικτή όχι μόνο λόγω της περιορισμένης έκτασης της παρούσας μελέτης αλλά και λόγω της διαρκούς εμφάνισης νέων προεκτάσεων, οι οποίες γεννούν νομοθετικές προκλήσεις και φέρνουν στο προσκήνιο την αναγκαιότητα σύμπλευσης των μεθοδολογικών εργαλείων περισσότερων επιστημών επί τη βάσει της αναζήτησης κοινωνικά βέλτιστων λύσεων. Στην κατεύθυνση αυτή, στόχος της προκείμενης έρευνας είναι η παρουσίαση καίριων προβληματικών μέσα από την προσέγγιση του ηλεκτρονικού εγκλήματος από κοινωνιολογική, οικονομική και νομική σκοπιά, αφενός με εστίαση της προσοχής στην αναγκαιότητα διεθνούς νομοθετικής εναρμόνισης και συνεργασίας, και αφετέρου, με παράλληλη εξέταση μοντέλων εναλλακτικής δράσης που σκοπούν στην ενίσχυση της προληπτικής λειτουργίας του Ποινικού Δικαίου. Στο πρώτο (1ο) κεφάλαιο παρουσιάζεται το ηλεκτρονικό έγκλημα ως κοινωνικό φαινόμενο μέσα από την κατάδειξη των συνηθέστερων μορφών του και των λαμβανόμενων προεκτάσεων που συχνά δεν περιορίζονται στα στενά όρια ενός μόνο κράτους, αλλά εμφανίζουν διασυνοριακά χαρακτηριστικά. Παρατίθενται ακόμη, προβληματικές σε σχέση με τις δυσκολίες ακριβούς αποτίμησης της προκαλούμενης ζημίας και τον οικονομικό-κοινωνικό αντίκτυπο που βαίνει ολοένα αυξανόμενος. Τέλος, θίγονται δικονομικά ζητήματα που προκύπτουν από το διασυνοριακό χαρακτήρα του ηλεκτρονικού εγκλήματος και αφορούν στη δικαιοδοσία και την έκδοση, παρατιθέμενης προσθέτως της προβληματικής της έρευνας και κατάσχεσης των ψηφιακών μέσων. Στο δεύτερο (2ο) κεφάλαιο παρατίθενται οι σημαντικότερες, κατά τη γνώμη της γράφουσας, προσπάθειες νομοθετικής αντιμετώπισης σε επίπεδο Ποινικού Δικαίου, εστιαζόμενες στο παράδειγμα της Αμερικής και των σχετικών ρυθμίσεων σε ομοσπονδιακό επίπεδο, τη Σύμβαση της Βουδαπέστης ως του κύριου διεθνούς κειμένου στο πλαίσιο επιδίωξης κοινής αντεγκληματικής πολιτικής με στόχο την προστασία της κοινωνίας από το ηλεκτρονικό έγκλημα, ιδίως μέσα από την υιοθέτηση της κατάλληλης νομοθεσίας και την ενίσχυση της ταχείας και καλά συντονισμένης διεθνούς συνεργασίας, και τέλος, αποτυπώνονται οι σχετικές προβλέψεις της ελληνικής έννομης τάξης. Στο τρίτο (3ο) κεφάλαιο, επιδιώκεται η ανάδειξη της σημασίας των μεθοδολογικών εργαλείων της Οικονομικής Ανάλυσης του Δικαίου ως κλάδου που ερευνά τα κίνητρα στη συμπεριφορά των δραστών στη βάση της υπόθεσης του ορθολογικά δρώντος υποκειμένου που επιδιώκει τη μεγιστοποίηση της ωφέλειάς του. Στο πλαίσιο αυτό και υπό τη σκέψη ότι η διάπραξη του εγκλήματος συνιστά απόρροια της στάθμισης επιμέρους πιθανοτήτων, επιδιώκεται η κατάδειξη πρόσθετων παραμέτρων ικανών να συμβάλουν στη διαμόρφωση ενός νομοθετικού πλαισίου που δεν ερείδεται σε μια λειτουργία τιμωρητικού σκοπού, αλλά, που στοχεύει, πράγματι, στο κοινωνικά βέλτιστο αποτέλεσμα. Τέλος, και υπό τη σκέψη ότι η εύρεση αποτελεσματικών λύσεων είναι σκόπιμο να αναζητηθεί, παράλληλα με το νομοθετικό πλαίσιο, σε νέα μοντέλα που θα συνεπικουρούν το ρόλο του Ποινικού Δικαίου, παρατίθενται εναλλακτικοί τρόποι αντιμετώπισης από τη σκοπιά των ενδιάμεσων παρόχων υπηρεσιών, των υποψήφιων θυμάτων και των ίδιων των δραστών. Στο τελευταίο κεφάλαιο, έχοντας υπόψη τις εκτεθείσες προβληματικές, η μελέτη καταλήγει στην παράθεση συμπερασμάτων με γνώμονα την παράλληλη δράση σε πλείονα επίπεδα με στόχο την καταπολέμηση των νέων φαινομένων, που απαιτεί, κατά την άποψη της γράφουσας, αποδέσμευση από τις παραδοσιακές μεθόδους δράσης και θέαση του προβλήματος με μια συνολική ματιά που θα περιλαμβάνει την προσαρμογή της νομοθεσίας στις αναδεικνυόμενες προκλήσεις σε μια εποχή που η τεχνολογία της πληροφορίας έχει διαποτίσει κάθε πτυχή της ανθρώπινης δραστηριότητας., The present paper seeks to capture the aspects of cybercrime as a social phenomenon emerged in the digital age, which has received international dimensions, being an invisible threat but at the same time having a significant social and economic impact on the modern world. There is not a unanimous universal definition for what the cybercrime is and the latter occurs under many forms, some of which were born with the boom of the Internet and others constitute the digital dimension of familiar types of traditional crimes. The exhaustive enumeration is not feasible not only due to the limited scope of this thesis but also due to the constant development of new forms of cybercrime, which give rise to legislative challenges and highlight the need to combine the methodological tools of more scientific fields seeking social optimum solutions. Though, the aim of this research is to present the key problems by studying the cybercrime from a sociological, an economic and a legal point of view, focusing on the need for international legislative harmonization and cooperation while examining any alternative action models which could potentially enhance the preventive function of Criminal Law. The first chapter examines cybercrime as a social phenomenon through the presentation of the most common types and the extensions received that go beyond the domestic context. Furthermore, another issue under consideration pertains to the difficulties of estimating accurately the damage being caused and the increasing socio-economic impact. Finally, some procedural issues arising from the cross-border nature of cybercrime are addressed, such as jurisdiction and extradition in combination to search and seizure problems of digital media. The second chapter lists the most important, according to the writer’s opinion, legislative efforts of Criminal Law to regulate cybercrime, focusing on the example of America and the relative legislative actions at a federal level, on the Budapest Convention as the main international treaty pursuing a common anti-crime policy of justice aiming at the protection of society from cybercrime by adopting appropriate legislation and enhancing a fast and well-coordinated international cooperation. Finally, the relevant pro-visions in the Greek legal system are presented. In the third chapter, the analysis aim to highlight the importance of the methodological tools of the Economic Analysis of Law, being a field that investigates perpetrators’ motivations on the basis of the assumption of existence of a rational individual who seeks to maximize her benefit. In this context, taking into account that the commission of crimes is a result of the weighting of individual probabilities, I present additional parameters in the creation of a legislative framework, not aiming at a punitive function but, instead, for the sake of social good. Finally, taking into consideration that effective solutions should be sought, alongside the legislative framework, in new models to complement the role of Criminal Law, the study examines alternative ways to deal with intermediary providers, potential victims and perpetrators themselves. In the final chapter, taking into account the problems encountered, the thesis concludes with suggestions for parallel action at a number of different levels aiming at combating new phenomena, which, in the view of the writer, require release from the traditional approaches, towards a new holistic approach including adaptation of the legislation to emerging technological challenges.
- Published
- 2020
- Full Text
- View/download PDF
17. The World Of Defacers: Looking Through The Lens Of Their Activities On Twitter
- Author
-
Fatih V. Celebi, Hao Tian, Cagri Burak Aslan, and Shujun Li
- Subjects
QA75 ,Topic model ,General Computer Science ,Computer science ,02 engineering and technology ,World Wide Web ,TK5105.888 ,defacement ,020204 information systems ,graph-based analysis ,0202 electrical engineering, electronic engineering, information engineering ,General Materials Science ,Social media ,Hacker ,QA76.76.I59 ,TK5105.875.I57 ,Sentiment analysis ,General Engineering ,defacers ,Hierarchical clustering ,Categorization ,Key (cryptography) ,020201 artificial intelligence & image processing ,hackers ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,hacking ,lcsh:TK1-9971 ,Cyber attacks - Abstract
Many web-based attacks have been studied to understand how web hackers behave, but web site defacement attacks (malicious content manipulations of victim web sites) and defacers’ behaviors have received less attention from researchers. This paper fills this research gap via a computational data-driven analysis of a public database of defacers and defacement attacks and activities of 96 selected defacers who were active on Twitter. We conducted a comprehensive analysis of the data: an analysis of a friendship graph with 10,360 nodes, an analysis on how sentiments of defacers related to attack patterns, and a topical modelling based analysis to study what defacers discussed publicly on Twitter. Our analysis revealed a number of key findings: a modular and hierarchical clustering method can help discover interesting sub-communities of defacers; sentiment analysis can help categorize behaviors of defacers in terms of attack patterns; and topic modelling revealed some focus topics (politics, country-specific topics, and technical discussions) among defacers on Twitter and also geographic links of defacers sharing similar topics. We believe that these findings are useful for a better understanding of defacers' behaviors, which could help design and development of better solutions for detecting defacers and even preventing impeding defacement attacks.
- Published
- 2020
18. Hacking in the University: Contesting the Valorisation of Academic Labour.
- Author
-
Winn, Joss
- Subjects
COMPUTER hackers ,UNIVERSITIES & colleges ,COMPUTER hacking ,RESEARCH ,LABOR process ,UNIVERSITY autonomy ,INTELLECTUAL property - Abstract
In this article I argue for a different way of understanding the emergence of hacker culture. In doing so, I outline an account of 'the university' as an institution that provided the material and subsequent intellectual conditions that early hackers were drawn to and in which they worked. I argue that hacking was originally a form of academic labour that emerged out of the intensification and valorisation of scientific research within the institutional context of the university. The reproduction of hacking as a form of academic labour took place over many decades as academics and their institutions shifted from an ideal of unproductive, communal science to a more productive, entrepreneurial approach to the production of knowledge. A such, I view hacking as a peculiar, historically situated form of labour that arose out of the contradictions of the academy: vocation vs. profession; teaching vs. research; basic vs. applied research; research vs. development; private vs. public; war vs. peace; institutional autonomy vs. state dependence; scientific communalism vs. intellectual property. [ABSTRACT FROM AUTHOR]
- Published
- 2013
- Full Text
- View/download PDF
19. Meanings that Hackers Assign to their Being a Hacker.
- Author
-
Turgeman-Goldschmidt, Orly
- Abstract
This study analyzes the ways in which hackers interpret their lives, behavior, and beliefs, as well as their perceptions of how society treats them. The study was based on unstructured, face-to-face interviews with fifty-four Israeli hackers who were asked to tell their life stories. Analysis of the data reveals differences in the hackers' self-presentation and the extent of their hacking activity. Although these differences imply the importance of informal labeling since childhood, it seems that hackers succeed in avoiding both, the effects of labeling and secondary deviance and that they feel no shame. Furthermore, they structure their identities as positive deviants and acquire the identity of breakers of boundaries, regardless of the number and severity of the computer offenses they have committed. [ABSTRACT FROM AUTHOR]
- Published
- 2008
20. What Hackers Learn that the Rest of Us Don't: Notes on Hacker Curriculum.
- Author
-
Bratus, S.
- Abstract
To learn security skills, students and developers must be able to switch from their traditional conditioning to the attacker's way of thinking. Exposure to the hacker culture through hacker conferences such as Defcon and others, Phrack and similar publications, and to comprehensive collections such as Packet Storm helps provide the necessary culture slunk or "a-ha" moment and should be integral to every in-depth security curriculum. Recipes for preventing particular kinds of exploits are only a small part of the value these materials provide. The primary and much underappreciated value of these sources lies in facilitating a deeper understanding of the underlying systems by exposing their designers' implicit assumptions and concentrating the students' and developers' attention on the bigger picture of the system and its environment, especially on issues typically glossed over. [ABSTRACT FROM PUBLISHER]
- Published
- 2007
- Full Text
- View/download PDF
21. Hackers' Accounts: Hacking as a Social Entertainment.
- Author
-
Turgeman-Goldschmidt, Orly
- Subjects
- *
COMPUTER hackers , *COMPUTER crimes , *CRIMINALS , *COMPUTER software , *SOCIAL problems , *TECHNOLOGY & society - Abstract
Hacking is a widespread international phenomenon, and hackers' actions occasionally reach the media headlines. This study was designed to explore hackers' accounts. Understanding the concept of accounts is important in itself because it enables us to comprehend how people view themselves within their cultural context. The research was based on unstructured, in-depth, face-to-face interviews with 54 Israeli hackers who where asked to tell their life stories. The interviewees were located by a snow- ball or chain referral sampling strategy. This study found that hacking in general, and penetrating computer systems or software in particular, constitutes a new form of entertainment for hackers. Thus, as it is based on the play-like quality that characterizes the use of digital technology, hacking often constitutes a new form of social activity. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
22. Hacking e práticas de liberdade : conspirando com hackers outros mundos
- Author
-
Walter, Bruno Eduardo Procopiuk, Hennigen, Ines, Hennigen, Inês, Maraschin, Cleci, Gerner, Alexander, and Azambuja, Marcos Adegas de
- Subjects
Informática ,Hackers ,Liberty ,Psicologia social ,Technical Objects ,Hacking ,Objets techniques ,Practices of Freedom ,Computer hackers ,Social psychology ,Pratiques de liberté ,CIENCIAS HUMANAS::PSICOLOGIA::PSICOLOGIA SOCIAL [CNPQ] ,Common ,Algorithmic governmentality ,Tecnologia ,Governamentalidade ,Commun ,Liberdade ,Gouvernementalité algorithmique - Abstract
À travers cette recherche, nous cherchons à penser/problématiser/tordre notre mode de relation ordinaire avec les objets techniques, en conspirant avec les hackers d’autres modes de relations qui amplifient notre degré de liberté. Plus que les hackers en eux-mêmes, nous nous intéressons aux autres mondes possibles qu’ils portent avec eux, aux pratiques de liberté qu’ils effectuent et qui nous permettent d’accéder à d’autres modes de relations avec les savoirs et les pouvoirs institués. Cependant, nous ne décrivons pas seulement quelques hacks, mais, surtout, nous opérons aussi dans le sens d’ouvrir des objets techniques qui, en général, sont des boîte-noires pour nous. Dans la première des trois parties, qui constituent cette thèse, en ayant Gilbert Simondon comme interlocuteur privilégié, nous parlons de quelques positions que nous pouvons occuper pendant les rencontres avec les objets techniques (comme inventeur, producteur, consommateur, utilisateur, etc.), en soulignant que le hacking apparaît comme étant un mouvement inventif à travers lequel le sujet reprend les virtualités des objets pour les actualiser. On n’aborde pas seulement notre mode de relation avec les objets techniques tangibles, mais aussi avec un type très spécial d’objets qui sont les softwares, en mettant en question leurs ouverture/fermeture. Dans la deuxième partie, nous nous retardons à penser et à problématiser nos rencontres avec les réseaux d’objets techniques hétérogènes qui participent à différentes stratégies de la surveillance et de la conduction des conduites. Principalement, avec Antoinette Rouvroy, nous parlons de deux phénomènes qui sont définis avec les termes Internet de choses et Big Data, en accentuant l’omniprésence des objets techniques, la récolte massive de donnés – qui ne sont pas rares en temps réel – et la production de profils selon lesquels ils opèrent et que l’auteure définie comme “gouvernementalité algorithmique”. Avec les pratiques hackers, qui vont au-delà de l'anonymat jusqu'à la création et la disponibilisation des programmes et de leurs codes source, nous cherchons à présenter d’autres modes de composition qui puissent contribuer à exercer des pratiques de liberté. Enfin, dans la troisième et la dernière partie, nous nous consacrons à aborder la création de nouveaux mondes. Pour cela, on prend les idées de Michel Hardt et Antonio Negri, et nous parlons des combats autour du commun (contre sa expropriation, pour sa production collaborative et pour les formes de le gérer). Aussi, en s’appuyant sur une vision plus philosophique, nous reprenons la création de nouveaux mondes par le biais du hacking, en tant qu’action inventive, en se basant sur Gilles Deleuze et Pierre Lévy. Ainsi, à travers d'innombrables rencontres – avec les objets techniques, les algorithmes, les hackers, les philosophes, les activistes, etc. - nous soulignons, tout au long de cette thèse, l’urgence de repenser le mode à travers duquel nous nous relions avec les objets techniques. Nesta tese buscamos pensar/problematizar/tensionar nosso modo de relação ordinário com os objetos técnicos, conspirando com os hackers modos outros de relação que ampliem o nosso grau de liberdade. Mais do que os hackers em si, interessamo-nos pelos outros mundos possíveis que eles carregam consigo, pelas práticas de liberdade que efetuam e que nos permitem participar de outros modos de relação com os saberes e os poderes instituídos. Para isso, não só descrevemos alguns hacks, mas, sobretudo, também operamos no sentido de abrir objetos técnicos que, no geral, nos são como que caixas-pretas. Na primeira das três partes que compõe esta tese, tendo Gilbert Simondon como interlocutor privilegiado, discorremos acerca de algumas posições que podemos ocupar nos encontros com os objetos técnicos (a de inventor, a de produtor, a de consumidor, a de usuário etc.), destacando que o hacking aparece enquanto um movimento inventivo por meio do qual o sujeito retoma virtualidades dos objetos para atualizá-las. Não só abordamos nosso modo de relação com os objetos técnicos tangíveis, mas também com um tipo muito especial de objeto que são os softwares, colocando em questão sua abertura/fechamento. Na segunda parte, detemo-nos a pensar e problematizar nossos encontros com redes de objetos técnicos heterogêneos que participam de diferentes estratégias de vigilância e condução de condutas. Sobretudo com Antoinette Rouvroy, discorremos acerca de dois fenômenos aos quais se têm referido por meio dos termos Internet das Coisas e Big Data, ressaltando a ubiquidade dos objetos técnicos, a coleta massiva de dados – não raro em tempo real – e a produção de perfis por meio dos quais opera o que a autora denomina de “governamentalidade algorítmica”. Com as práticas hackers, que vão desde práticas de anonimato até a criação e disponibilização de programas e seus códigos-fonte, buscamos apresentar outros modos de composição que podem contribuir para exercermos práticas liberdade. Por fim, na terceira e última parte, dedicamo-nos a abordar a criação de novos mundos. Para isto, apropriando-nos do pensamento de Michel Hardt e Antonio Negri, discorremos a respeito de lutas em torno do comum (contra sua expropriação, pela sua produção colaborativa e pelas formas de geri-lo). Também, por um viés mais filosófico, retomamos a criação de novos mundos por meio do hacking, enquanto ação inventiva, pensando-o a partir de Gilles Deleuze e Pierre Lévy. Assim, por meio de inúmeros encontros – com objetos, com algoritmos, com hackers, com filósofos, com ativistas etc. –, ressaltamos, ao longo desta tese, a urgência de repensarmos o modo pelo qual nos relacionamos com os objetos técnicos. This thesis aims at thinking/discussing/tensioning our ordinary way of relating with the technical objects, conspiring to other types of relations with the hackers in order to broaden our degree of freedom. More than the hackers themselves, there is the interest for other possible worlds they carry around, the practices of freedom they perform, allowing us to participate in other types of relations with knowledge and the ruling power. To achieve this, we didn’t only describe some hacks; but, above all, we also operated in the sense of opening technical objects which, in general, we see as black boxes. The thesis is composed by three parts; in the first one, having Gilbert Simondon as a privileged interlocutor, we addressed some positions that we can occupy in the encounters with the technical objects (as an inventor, a producer, a consumer, a user, and so on), highlighting that hacking appears as an inventive movement whereby the individual takes back the object virtualities to update them. We do not only approach our way of relating with the tangible technical objects, but also with a very special type of objects, which are the softwares, calling into question their opening/closing. In the second part, we dwelled on thinking and discussing our encounters with the nets of heterogeneous technical objects that participate of different surveillance strategies and conduct of conducts. Especially with Antoinette Rouvroy, we addressed two phenomena which have been referred by the terms Internet of Things and Big Data, highlighting the ubiquity of the technical objects, the massive data collection – not rare in real time – and the profile production through which is operated by what the author calls “algorithmic governmentality”. With the hackers’ practices, going from anonymity practices to the creation and provision of programs and their source code, we aim at presenting other forms of composition that can contribute, so we can exercise practices of freedom. Lastly, in the third and final part, we dedicated ourselves to address the creation of new worlds. To achieve this, we took as basis the thoughts of Michel Hardt and Antonio Negri, we argued about the fights over the common (against its expropriation, for its collaborative production and for ways of dealing with it). Also, employing a more philosophical background, we resumed the creation of new worlds through hacking as an inventive act, considering it under the views of Gilles Deleuze and Pierre Lévy. Thus, by means of countless encounters – with objects, with algorithms, with hackers, with philosophers, with activists, etc. – we emphasize, throughout this thesis, the urgency of rethinking the way we relate with the technical objects.
- Published
- 2019
23. Respawn
- Author
-
Colin Milburn
- Subjects
Adventure ,“All your base are belong to us ,Atari ,System Shock ,green gaming ,PlayStation Network ,PlayStation 3 ,environmental risk ,diaspora ,City of Heroes ,Social and Behavioral Sciences ,LulzSec ,For the Win ,Video games ,science fiction ,Will Crowther ,Resetti ,hacktivists ,glitching ,petroculture ,Anonymous ,Chanology ,Hackers ,Super Mario Sunshine ,Ready Player One ,ComputingMilieux_PERSONALCOMPUTING ,Edward Snowden ,Final Fantasy VII ,Sony ,superhero ,Don Woods ,Spacewar! ,sustainability ,Occupy ,” Zero Wing ,online activism ,Animal Crossing ,Ratchet and Clank ,save point ,Shadow of the Colossus ,technopolitics ,Portal ,Arts and Humanities ,responsibility ,pwn ,Social aspects of technology ,meme ,hacking - Abstract
In Respawn Colin Milburn examines the connections between video games, hacking, and science fiction that galvanize technological activism and technological communities. Discussing a wide range of games, from Portal and Final Fantasy VII to Super Mario Sunshine and Shadow of the Colossus, Milburn illustrates how they impact the lives of gamers and non-gamers alike. They also serve as resources for critique, resistance, and insurgency, offering a space for players and hacktivist groups such as Anonymous to challenge obstinate systems and experiment with alternative futures. Providing an essential walkthrough guide to our digital culture and its high-tech controversies, Milburn shows how games and playable media spawn new modes of engagement in a computerized world.
- Published
- 2018
24. SolarWinds' CEO Wants To Give The Hackers Who Attacked It A Headache By Massively Multiplying Code.
- Author
-
Giles, Martin
- Subjects
COMPUTER hackers ,COMPUTER hacking ,CHIEF executive officers ,MALWARE ,SUPPLY chains - Abstract
Russia-based hacking group Nobelium spreads malware by compromising software supply chains. Sudhakar Ramakrishna wants to make that much harder to do by creating code in triplicate. [ABSTRACT FROM AUTHOR]
- Published
- 2021
25. Four Questions Today's Cybersecurity Summit Between President Biden And U.S. Business Leaders Urgently Needs To Answer.
- Author
-
Giles, Martin
- Subjects
CYBERTERRORISM ,INTERNET security ,PRESIDENTS of the United States - Abstract
American businesses are looking for bold government action to help combat rapidly escalating cyber threats. [ABSTRACT FROM AUTHOR]
- Published
- 2021
26. Email Still Trumps Slack—That's Why Hackers Are Targeting Microsoft Exchange Servers.
- Author
-
Giles, Martin
- Subjects
COMPUTER hackers ,PANTS ,INTERNET ,CHIEF executive officers ,COMPUTER hacking - Abstract
Corporate messaging platforms haven't been able to kill off what Slack's cofounder and CEO, Stewart Butterfield, once dubbed "the cockroach of the internet." [ABSTRACT FROM AUTHOR]
- Published
- 2021
27. 'Millions' Of Payment Terminals Are Vulnerable To Credit Card Theft Hacks.
- Author
-
Brewster, Thomas
- Subjects
CREDIT cards ,COMPUTER hacking ,THEFT ,PAYMENT - Abstract
Verifone and Ingenico devices, used in shops across the world, contain weaknesses that allow 5-minute hacks to steal credit card data. [ABSTRACT FROM AUTHOR]
- Published
- 2020
28. Congress Fights Back Against Cyberattacks.
- Author
-
King, Angus and Gallagher, Mike
- Published
- 2021
29. Cybersecurity Needs a New Alert System.
- Author
-
Subrahmanian, V.S.
- Subjects
- *
CYBERTERRORISM , *INTERNET security , *JUDICIAL opinions , *CYBER intelligence (Computer security) - Published
- 2021
30. SAFETY POLICY OF E-BUSINESS WITH EMPHASIS ON CYBERCRIME
- Author
-
Sekelšek, Aleš and Bobek, Samo
- Subjects
forms of ciber crime ,the motivation of hackers ,elektronsko poslovanje ,hekanje ,examples of ciber crime ,statistika ,varnostna politika ,ciber crime ,varnost elektronskega poslovanja ,safety standards ,e-business ,primeri računalniškega kriminala ,safety of e-business ,računalniški kriminal ,oblike računalniškega kriminala ,motivacija hekerjev ,statistics ,e-business in Slovenia ,udc:004 ,hekerji ,hackers ,standardi pri zagotavljanju varnosti ,hacking ,elektronsko poslovanje v Sloveniji ,safety policy - Abstract
Pomemben element elektronskega poslovanja je varnost. Ker se število uporabnikov povečuje, je varnost še toliko bolj pomembna. Posledica rasti elektronskega poslovanja predstavljajo vdori in zlorabe. Zaradi varnosti, so pomembni raznovrstni varnostni mehanizmi in zakonodaja. Bolj kot so podatki zaupne narave in vrednosti, večjo varnost bomo morali zagotoviti. Pri tem nam pomaga najsodobnejša tehnologija, ki nam podatke zaupne narave med prenosom in hranjenjem ščiti V tem diplomskem delu sem predstavil problematiko varnostne politike elektronskega poslovanja, s poudarkom na računalniškem kriminalu. Na začetku sem definiral osnovne pojme, ki jih moramo poznati, da lahko razumemo problematiko elektronskega poslovanja. Podrobno sem opisal pojme kot so internet, kaj je računalniški kriminal, kakšne varnostne politike poznamo, kako pravo ureja in sankcionira računalniški kriminal itd... Navedel sem različne statistične podatke (št. računalniškega kriminala v Sloveniji, finančne izgube zaradi rač. kriminal v ZDA, rač. kriminal po sektorjih, itd.), ki se nanašajo na temo in predstavil dejanske primere napadov, ki so se zgodili v svetu. Zadnje poglavje sem namenil temi hekerjev. Definiral sem pojma heker in hekanja, predstavil hekerje skozi zgodovino, navedel razloge zakaj prihaja do vdorov in zaključil z primeri hekerskega vojskovanja. An important element of e-business is security. Because the number of users is increasing, safety is becoming even more important. The increase in use of e-business is resulting in intrusions and abuses. Important factors in ensuring safety are diverse security mechanisms and legislation. The more confidential and valuable the informations, the greater safety we will have to provide. Advanced technology is very helpful, by protecting confidential data during transfer and storage. In this thesis I presented the problem of safety policy in e-business, with emphasis on ciber crime. At the beginning I defined the basic concepts that we need to know, if we want to understand the problems of e-business... I have described in detail concepts such as the Internet, what is ciber crime, what kind of safety policies we know, how the law regulates and penalizes computer crime, etc. ... I have included different statistics, that refere to the topic (no. of ciber crime in Slovenia, financial losses due to ciber crime in the U.S., ciber crime by sectors, etc...) and presented actual examples of attacks that have taken place in the world. The last chapter I devoted to the topic of hackers. I defined the terms hacker and hacking, introduced hackers throughout history, indicated the reasons for intrusions and ended with examples of hacker warfare.
- Published
- 2010
31. Losing $450,000 in Three Days: Hackers Trick Victims Into Big Wire Transfers.
- Author
-
Ensign, Rachel Louise
- Subjects
- *
ELECTRONIC funds transfers , *MOBILE food services , *EMAIL hacking , *CORPORATE profits , *COMMERCIAL crimes - Published
- 2020
32. Security threats and solutions for people with broadband
- Author
-
Bilan, Carolina and Hedberg, Carl
- Subjects
Bredband ,Hackers ,Säkerhet ,Computer Sciences ,Brandvägg ,Hacking ,Firewall ,Broadband ,Virus ,Personlig Brandvägg ,Datavetenskap (datalogi) ,Hackare ,Antivirus ,Hackning ,Security - Abstract
As more and more people gain access to broadband in their properties, the security threats get bigger. A lot more people also have computers that they carry home from work where they store important information concerning the company. The information stored on theese computers can be very easy to retrieve if you have the will and the skill to do it. Very few people have any knowledge how to protect themselves from theese threats.
- Published
- 2001
33. Atoms Want to Be Free Too! Expanding the Critique of Intellectual Property to Physical Goods.
- Author
-
Söderberg, Johan and Daoud, Adel
- Subjects
INTELLECTUAL property ,INTANGIBLE property ,COMPUTER software ,COMPUTER input-output equipment ,INFORMATION economy - Abstract
"Atoms are the new bits". That is the latest buzz arising from the Californian trade press. What do we get when this dictum is sampled with the old rallying cry: "Information wants to be free"? We suggest that the predominant, bounded critique of intellectual property is thereby destabilised. Constitutive of that critique was the exceptionality attributed to information goods (bits) vis-a-vis tangible goods (atoms). It was thus intellectual property could be presented as something altogether different from private property. We recognise that this way of framing the issue has had tactical advantages, but contend that it has stood in the way of a deeper understanding of what intellectual property is. When the critique of proprietary software is expanded by an emerging movement for open hardware development, however, the boundary between intellectual property and property as such crumbles. This enables us to renew our critique of the political economy of information. [ABSTRACT FROM AUTHOR]
- Published
- 2012
- Full Text
- View/download PDF
34. Law Enforcements’ Perceptions and Preparedness to Address Child Exploitation Via Hacking
- Author
-
Lightfoot, Jack W
- Subjects
- : Predators, Pedophiles, Child Predators, Hackers, Hacking, Webcam, Social and Behavioral Sciences, Jack N. Averitt College of Graduate Studies, Electronic Theses & Dissertations, ETDs, Student Research
- Abstract
Throughout recorded history, children have been subjected to sexual exploitation. Child predators and pedophiles often take great risk and go to extreme lengths to sexually exploit a child. With technological advancements many individuals became globalized and connected with the invention of the computer, the internet and its attributes. However, child predators quickly took note of the vulnerability of children as they begin to groom them online. The problem quickly evolved as the Deep (Dark) Web and encryption were created. This put great stress upon law enforcement entities as locating and combating these predators became exhausting tasks. It’s most often that these predators evolve quicker than law enforcement. Most recently, the use of hacking has become a successful tool in a child predator’s arsenal. To better understand this new phenomena, this study will focus on interviewing local, state, and federal law enforcement agents on detection, combating, prevention and direction of this problem. The results suggests that child predator hacking is a very rare crime. In fact, only one of the five officers interviewed for this study had experienced child predator hacking. Instead, child predators use easier techniques such as grooming and manipulation as children are naïve and are consensually giving the child predators explicit material. However, there is still a possibility that child predator hackers were successfully able to blackmail the child and there the crime will go unreported.
- Published
- 2016
35. The 5G Promise and the Huawei Threat.
- Author
-
Rogers, Mike
- Subjects
- *
5G networks , *BANK fraud , *CRIMINAL behavior , *INTELLIGENCE service - Published
- 2019
36. How Wearing a Smartwatch Can Help Hackers Steal Your ATM PIN.
- Author
-
Reisinger, Don
- Published
- 2016
37. Anonymous Hacks ISIS Twitter Accounts in Gay Pride Tribute.
- Author
-
Reisinger, Don
- Published
- 2016
38. Russian Hackers Stole Democrats' Opposition Research on Donald Trump.
- Author
-
Meyer, David
- Published
- 2016
39. The Latest Security Threat Could Be Hiding in Your Car.
- Author
-
Barzilai, David
- Published
- 2016
40. Not All Hackers Are Evil.
- Author
-
Moussouris, Katie
- Published
- 2016
41. The Unseen Threat of Digital Warfare.
- Author
-
Cohen, Jared
- Published
- 2016
42. Anonymous Hacks Nissan Site to Support Whales.
- Author
-
Reisinger, Don
- Published
- 2016
43. New York Dam Hacked by Iran, Report Says.
- Author
-
Reisinger, Don
- Published
- 2016
44. Anonymous Celebrates ISIS Trolling Day.
- Author
-
Reisinger, Don
- Published
- 2016
45. Hackers Threaten to Put Bullet in Researcher’s Brain.
- Author
-
Hackett, Robert
- Published
- 2016
46. Let’s Talk About Anonymous Versus ISIS.
- Author
-
Hackett, Robert
- Abstract
The two factions are engaged in an all-out cyberbrawl. [ABSTRACT FROM PUBLISHER]
- Published
- 2015
47. Tensions Flare as Hackers Root Out Flaws in Voting Machines.
- Author
-
McMillan, Robert and Volz, Dustin
- Subjects
- *
ELECTION security measures , *VOTING machines , *UNITED States elections , *SECURITY systems - Published
- 2018
48. ISIS Calls Anonymous 'Idiots' As Cyber War Heats Up.
- Author
-
Reisinger, Don
- Published
- 2015
49. Anonymous Declares Cyber War on ISIS. Why It Matters.
- Author
-
Reisinger, Don
- Published
- 2015
50. Why Hollywood doesn’t ‘get’ hackers.
- Author
-
Bukszpan, Daniel
- Abstract
With rare exception, most movies and TV shows are ridiculously off base. [ABSTRACT FROM PUBLISHER]
- Published
- 2015
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.