Internet, Groupware, & Telecommunications
mobi, epub |eng | 2011-01-19 | Author:McGonigal, Jane [McGonigal, Jane]

CRUEL 2 B KIND, like many happiness hacks, isn’t a product. There’s no software to download, no license to buy, no fee to pay. It’s meant to be a solution ...
( Category: Cognitive Psychology January 6,2015 )
mobi | | | Author:Christopher Hadnagy

( Category: Hacking January 6,2015 )
mobi |eng | 2011-07-01 | Author:Kevin Mitnick

I did a directory listing to find out what files were on the computer, looking for the LocK-11 program and associated files and stumbled on something I found shocking: a ...
( Category: Human-Computer Interaction January 6,2015 )
mobi | | | Author:Nitesh Dhanjani

( Category: Software Development January 6,2015 )
epub |eng | 2013-10-11 | Author:Kannon Yamada

3. Overview of Feedly’s Advanced Features Feedly includes a number of features that beginning users may find difficult to use. However, as your list of feeds expand, utilizing a greater ...
( Category: Internet, Groupware, & Telecommunications January 6,2015 )
epub |eng | 2012-01-09 | Author:Lachlan Roy

A Usenet Client Finally, you’ll need to use a program called a Usenet client to access Usenet content. What Am I Looking For? There are three different kinds of Usenet ...
( Category: Internet, Groupware, & Telecommunications January 6,2015 )
mobi, pdf |eng | 2004-12-15 | Author:Paul Graham

where w is the token whose probability we're calculating, good and bad are the hash tables I created in the first step, and G and B are the number of ...
( Category: Hacking December 31,2014 )
epub, mobi, pdf |eng | 2014-12-04 | Author:Justin Seitz [Seitz, Justin]

Kicking the Tires Click the Extender tab in Burp, click the Add button, and use the same procedure we used for our previous extensions to get the Wordlist extension working. ...
( Category: Viruses December 27,2014 )
epub, azw3, mobi, pdf |eng | 2014-12-15 | Author:Tyler Wrightson [Wrightson, Tyler]

Active Wireless Recon Before we know which wireless attack will be the most lucrative, we need to identify if there are any access points to target. We will perform active ...
( Category: Hacking December 15,2014 )
mobi, epub |eng | 2014-08-22 | Author:Thomas P. Keenan

New York City was a pioneer in the Open Data arena. In October 2009, with considerable fanfare, they released a number of municipal data sets. The next day, they had ...
( Category: Canadian November 23,2014 )
epub, azw3 |eng, eng | 2012-09-19 | Author:Gina Keating

CHAPTER NINE THE BEST YEARS OF OUR LIVES (2005–2006) AFTER ANTIOCO DROPPED BLOCKBUSTER’S BID for Hollywood Video, a furious Icahn immediately took aim in the press. Antioco began to ignore ...
( Category: Company Profiles November 23,2014 )
epub |eng | 1995-11-22 | Author:W. Richard Stevens & Gary R. Wright

Release interface reference 117-122 A check is made that the reference count is not negative, and then IFAFREE decrements the reference count for the ifaddr structure and releases it by ...
( Category: TCP-IP November 23,2014 )
epub, azw3 |eng | | Author:Shane Harris

Some of the FBI’s most important intelligence targets today are Chinese cyber spies stealing intellectual property. “We do a lot of collection on China’s victimizing US companies,” says a former ...
( Category: Privacy & Online Safety November 18,2014 )
mobi, epub, pdf |eng | 2013-08-08 | Author:Adam Nathan

( Category: Software Development November 14,2014 )
epub |eng | 2011-08-31 | Author:Stryker, Cole [Stryker, Cole]

Despite my pessimistic tone, I predict that “Anonymous” will continue to grow. As more and more attention is given to these “secret websites,” more and more people are clamoring to ...
( Category: Hacking November 11,2014 )

Categories