background preloader

Threat Encyclopedia

Threat Encyclopedia

http://www.trendmicro.com/vinfo/us/threat-encyclopedia/

Related:  security and hackingWeek 6: Technological ThreatsComunisecurity

Hacker (programmer subculture) A team of hackers competing in the CTF competition at DEF CON 17 A hacker is an adherent of the subculture that originally emerged in academia in the 1960s, around the Massachusetts Institute of Technology (MIT)'s Tech Model Railroad Club (TMRC)[1] and MIT Artificial Intelligence Laboratory.[2] A hacker is someone who loves to program or who enjoys playful cleverness, or a combination of the two.[3] The act of engaging in activities (such as programming or other media[4]) in a spirit of playfulness and exploration is termed hacking. Richard Stallman explains about hackers who program: What they had in common was mainly love of excellence and programming.

Anne Collier: The Best Digital Citizenship Curriculum @coolcatteacher Digital citizenship can’t be taught from a book. Anne Collier’s views are rich with examples from around the world of best practice in digital citizenship education. Anne should know. She works on Facebook’s Safety Advisory Board and edits NetFamilyNews. Anne argues “digital citizenship” shouldn’t even be the term – in today’s world, these conversations are part of citizenship. Listen to “An Educators Guide to Digital Citizenship” Free Windows Desktop Software Security List Security List Index Select a Security Category: All Items Keys

How To Become A Hacker Copyright © 2001 Eric S. Raymond As editor of the Jargon File and author of a few other well-known documents of similar nature, I often get email requests from enthusiastic network newbies asking (in effect) "how can I learn to be a wizardly hacker?". Back in 1996 I noticed that there didn't seem to be any other FAQs or web documents that addressed this vital question, so I started this one. A lot of hackers now consider it definitive, and I suppose that means it is. 80+ Best Free Hacking Tutorials Learning to become hacker is not as easy as learning to become a software developer. I realized this when I started looking for learning resources for simple hacking people do. Even to start doing the simplest hack on own, a hacker requires to have in depth knowledge of multiple topics. Some people recommend minimum knowledge of few programming languages like C, Python, HTML with Unix operating system concepts and networking knowledge is required to start learning hacking techniques. Though knowing a lot of things is required, it is not really enough for you to be a competent and successful hacker. You must have a passion and positive attitude towards problem solving.

Social Media at School: Teaching Safety on the Virtual Playground These days, social media gets a pretty bad rap. It seems like every other day there is a celebrity apology or a story about a teen who commits suicide due to cyberbullying. It's true, social media can breed some pretty awful stuff. And that awful stuff is great material for the digital citizenship unit that all of my school's incoming freshmen are expected to complete. Acceptable Use

The Real Science Behind Cracking Passwords b46f685f85e0af830d82ddbbe795eff3 By adding a unique salt, I can do something about that. I created a quick Javascript program that takes the user’s name, and pulls the first and last three letters from their username and makes them into a salt. Then, the program takes the salt, plus the user’s password, and runs them through the MD5 algorithm and produces the hash that will be their password. Hacker ethic While some tenets of hacker ethic were described in other texts like Computer Lib/Dream Machines (1974) by Ted Nelson, Levy appears to have been the first to document both the philosophy and the founders of the philosophy. Levy explains that MIT housed an early IBM 704 computer inside the Electronic Accounting Machinery (EAM) room in 1959. This room became the staging grounds for early hackers, as MIT students from the Tech Model Railroad Club sneaked inside the EAM room after hours to attempt programming the 30-ton, 9-foot-tall (2.7 m) computer. The hacker ethic was described as a "new way of life, with a philosophy, an ethic and a dream".

Location Based Safety Guide Privacy is a freedom we give ourselves. It is spring break. Facebook is full of my friends saying where they are (with their whole families), and it looks like most of them are posting publicly. Someone could easily look at the Camilla, Georgia and publicly see who is out of town. Location Based Girl-Finding App Uses FourSquare and Facebook

Free and Open Source Cyber Security Learning Cybrary | 0P3Nuser generated content What is 0P3N? 0P3N is content you won't find anywhere else on the web.

Related: