Articles related to hackers
Hacker Definition and Alternate Spellings - Internet for Beginners
You've heard of "hackers", and you've seen sensationalized versions of hackers in movies. But what exactly is a hacker? And are they the same as "haxors"?
The Best Hacker Movies of All Time
While none of these movies depict what hacking truly involves, each of these stories is memorable in some way as good escapist fiction. Here they are: The 30 ...
Hackers, Scammers, and ID Thieves: Protect Yourself Against These ...
Hackers, Scammers, and ID Thieves: Protect Yourself Against These Online Crooks. Sadly, the Internet and the Web are filled with dishonest people who know ...
Hacking - What is a Hacker in Computer Networking?
In computer networking, hacking is any technical effort to manipulate the normal behavior of network connections and connected systems. Historically, hacking ...
4 Secrets Hackers Don't Want You to Know - Security - About.com
Are you afraid of becoming the next victim of a wireless hack attack? Here are 4 secrets that wireless hackers don't want you to know about wireless security.
Hacker Tools and Utilities - Security - About.com
Tamper Data: The Firefox Addon That Hackers Don't Want You to Know About · Tamper Data might just be one of the best kept hacker secrets. Learn what this ...
BackTrack Security Audit - Hackers' Tools - About.com
BackTrack is a free security audit toolkit comprised of hundreds of open-source security tools used by both security professionals as well as hackers.
Friend or Hacker? - Facebook Security Tips - About.com
Maybe that's how your grandma rolls, but chances are it's probably the hacker who just "pwned" her Facebook account. Here are some tips to help you tell the ...
Hacker Turn-ons and Turn-offs - Security - About.com
Whether you're trying to attract a hacker or drive one away, here are some hacker turn-ons and turn-offs that might help you in your quest.
Hacker Defense Tools and Utilities - Security - About.com
Tools To Defend Your Computer or Network From Hackers or Malicious Programs. By Tony Bradley, CISSP-ISSAP. Share this. Mixed race woman using laptop ...