MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
Entrepreneur
December 2005
Amanda C. Kooser
Can You Hack It? Build the best defense you can against hackers. mark for My Articles similar articles
PC Magazine
August 23, 2007
John Brandon
Q&A with the Forefather of Hacking Kevin Mitnick, arguably the world's most famous hacker, sets the record straight on what he's doing now, what he didn't do back then, and why kids should not follow in his footsteps. mark for My Articles similar articles
InternetNews
March 30, 2004
Vince Barnes
An Hour with Kevin Mitnick In part one of a candid discussion, former hacker Kevin Mitnick tackles the issue of hiring hackers, talks about his consulting business, book, and expert testimonies on computer hacking and security. mark for My Articles similar articles
New Architect
February 2003
Joseph C. Panettieri
Dangerous Dealings Reformed hackers want to lend a hand with your IT security strategy. mark for My Articles similar articles
InternetNews
March 29, 2011
Is McAfee.com Insecure? Security researchers publicly expose vulnerabilities on McAfee's website. mark for My Articles similar articles
PC World
May 2001
Kim Zetter
Hacker Nation Shadowy, computer-wise predators slip in undetected to steal data, deface Web sites, crash systems--or just look around. We talk to some current and former hackers to find out more about them and what they're after... mark for My Articles similar articles
PC World
August 3, 2002
Andrew Brandt
Reality Douses DefCon Camaraderie Nation's new security priorities put new risks, greater penalties on cybercrime. mark for My Articles similar articles
PC World
April 10, 2001
Hacking's History From phone phreaks to Web attacks, hacking has been a part of computing for 40 years... mark for My Articles similar articles
InternetNews
June 3, 2005
Sean Michael Kerner
Hackers Hit MSN Korea MSN's popular MSN Korea was knocked offline Thursday after it reportedly discovered that the site had been hacked and apparently booby-trapped in order to pilfer users' passwords. mark for My Articles similar articles
The Motley Fool
June 16, 2011
Rich Smith
America Hacked! Hackers are progressing, attacking our government websites with impunity. mark for My Articles similar articles
Linux Journal
December 1, 2002
Lawrence Rosen
The Ethical System Administrator As an ethical attorney -- or at least an attorney who strives to be ethical -- I must advise everyone to obey the law. Don't make unauthorized copies of software, and don't just sit idly by when you see others in your company doing so. mark for My Articles similar articles
InternetNews
October 9, 2008
Sean Michael Kerner
No/Low/High-Tech Hacking: It All Matters Don't point the finger at hackers for all security woes. Point hacker tools at yourself to see what's wrong with your stuff, instead. mark for My Articles similar articles
InternetNews
March 16, 2004
Ryan Naraine
Microsoft Shares Own Security Secrets The software giant releases a technical case study with details of security methodologies it uses to ward off malicious hacker attacks. mark for My Articles similar articles
Fast Company
June 2013
From MIT To WikiLeaks: A Brief History Of Hacking A survey of news about hacking and hackers, both good and bad, from the 1950s to the present. mark for My Articles similar articles
AskMen.com
Branden Peters
How To: Avoid Getting Hacked Thankfully there are several ways to protect your information and identity from malicious attacks. Some are common sense and others require thought and money. mark for My Articles similar articles
InternetNews
July 7, 2010
Hackers Snipe Back in Microsoft Security Row Bruised by Microsoft's criticism dismissing the work of third-party security researchers, a band of hackers has begun a campaign to publish proof-of-concept vulnerabilities in the software giant's products. mark for My Articles similar articles
Unix Insider
May 2000
Carole Fennelly & Brian Martin
Hacker's toolchest What is a hacker's approach to penetration testing? What tools do hackers use? I decided to find out. mark for My Articles similar articles
InternetNews
April 1, 2005
Jim Wagner
Code Exec Bugs Hit Windows Microsoft's mum on the Windows vulnerabilities since it still hasn't released a patch for them. mark for My Articles similar articles
eCFO
December 2000
Karen J. Bannan
Fear of the Black Hats Increasingly, companies are hiring hackers to test their network firewalls. This may not be such a good idea. mark for My Articles similar articles
Popular Mechanics
January 13, 2010
Glenn Derene
Why China Needs Google More Than Google Needs China Yesterday Google announced that Gmail accounts of Chinese dissidents had been hacked as part of a broad spying operation apparently tied to the Chinese government. mark for My Articles similar articles
Fast Company
Chris Gayomali
Why Do Companies Keep Getting Hacked? "These days, criminal hacking is a business," Patrick Thomas, a security consultant at Neohapsis, tells Fast Company. "Everything that is done has a chain linked to real dollars. And hackers are looking for the shortest chain." mark for My Articles similar articles
CIO
April 15, 2003
Sarah D. Scalet
The Pirates Among Us The entertainment industry is battling the illegal distribution of copyrighted music and movie files -- and will stop at nothing to enlist your help. mark for My Articles similar articles
InternetNews
August 2, 2010
Google Hacking for Enterprise Security: Black Hat At the Black Hat security conference, researchers describe their work expanding on the technique known as Google hacking to leverage the search engine to improve enterprise security. mark for My Articles similar articles
BusinessWeek
August 22, 2005
Grow & Hamm
From Black Market To Free Market Frustrated computer-security firms are offering to buy tips from the very hackers who bedevil them. mark for My Articles similar articles