Showing posts with label Zen of Hacking. Show all posts
Showing posts with label Zen of Hacking. Show all posts

Thursday 29 November 2018

Hackers Could be Thwarted by New 'deception consistency' Method

Computer hackers could be thwarted by new 'deception consistency' method.
Researchers working to make it harder for attackers to know when a system begins to detect and deceive a bad actor.

    Can you deceive a deceiver? That's the question that computer scientists have recently been exploring. That's the question that computer scientists at Binghamton University, State University of New York have recently been exploring. The researchers are looking at how to make cyber deception a more effective tool against malicious hackers.

Assistant Professor of Comp

Publicizing Security Levels May Strengthen Security

Cyber attacks grow in prominence each and every day; in fact, 2017 was the worst year to-date for data breaches, with the number of cyber incidents targeting businesses nearly doubling from 2016 to 2017.

In a research done by University of British Columbia - Sauder School of Business like a month or two ago, it was found out that according to their study, publicizing a firm's security levels may strengthen security over time. The research quantified the security levels of more than 1,200 Pan-Asian companies in order to determine whether increased awareness of one's security levels leads to improved defense levels against cybercrime.

How Hackers Are Using GPUs

GPU stands for "Graphics Processing Unit". It's a single-chip processor designed to handle graphics operations. It's primarily used to manage and boost the performance of video and graphics by use of features designed to lessen the work of the CPU and produce faster video and graphics. A GPU is not only used in a PC on a video card or motherboard; it is also used in mobile phones, display adapters, workstations and game consoles.

Web browsers use GPUs to render graphics on desktops, laptops, and smart phones. GPUs are also used to accelerate applications on the cloud and data centers. GPUs are usually programmed

Friday 16 November 2018

The Zen Of Hacking

Originally term hacker meant someone who did the impossible with very
little resources and much skill. The basic definition is “someone who makes fine
furniture with an axe”. Hackers were the people who knew the computer inside
and out and who could perform cool, clever, and impossible feats with their
computers. Now days the term has been corrupted to mean someone who
breaks into computers, but in this book we use hacker in its original honorable
form.
My first introduction to true hackers was when I joined the Midnight
Computer Club when I went to college. This wasn't an official club, just a group
of people who hung out in the PDP-8 lab after midnight to program and discuss
computers.
I remember one fellow who had taken $10 of parts from Radio Shack and
created a little black box which he could use with an oscilloscope to align
DEC Tape drives. DEC at the time needed a $35,000 custom built machine to do
the same thing.
There were also some people there who enjoyed programming the PDP-8 to
play music. This was kind of

Let's Talk Anonymity: A Short Treatise On Anonymity

The internet takes a very serious position in our everyday lives. We do a lot of activities over the web, some of which we would like our ...