Similar Articles |
|
RootPrompt.org May 31, 2000 Noel |
Cracked! Part 4: The Sniffer Noel continues the story of when some Unix boxes that he helped admin were cracked. This article tells how they found the sniffer that the cracker was running on their network and what they did next.... |
RootPrompt.org July 10, 2000 |
Cracked! Part 7: The Cracker's Revenge This is the seventh part of the story of a community network that was cracked and what was done to recover from it. |
RootPrompt.org June 28, 2000 |
Cracked! Part 6: Talking with the Enemy This is the sixth part of the story of a community network that was cracked and what was done to recover from it. |
RootPrompt.org May 3, 2000 Noel |
Cracked! Part 1: Denial and Truth The phone rings or an email comes in and someone tells you that they have reason to believe that your box or boxes have been cracked.... |
RootPrompt.org May 22, 2000 Noel |
Cracked! Part 3: Hunting the Hunter Noel continues the story of when some Unix boxes that he helped admin were cracked. This article talks about some of the efforts made to track down the cracker and some surprises.... |
RootPrompt.org May 10, 2000 Noel |
Cracked! Part 2: Watching and Waiting In the second article Noel continues the story of when some Unix boxes that he helped admin were cracked. This article talks about watching the cracker with a sniffer and talking to the the FBI's Computer Crimes Squad.... |
PC Magazine November 16, 2005 David A. Karp |
The Web Your Way Improve your favorite Web sites with the Greasemonkey extension for Mozilla Firefox. |
RootPrompt.org March 13, 2000 Lance Spitzner |
Know Your Enemy: III In the third part of this three part series Lance Spitzner tells us about what happens once a Script Kiddie gains root. Specifically, how they cover their tracks and what they do next.... |
Macworld February 2001 Dori Smith |
Script Debugger 2.0 AppleScript Development Environment Adds Powerful New Features... |
Macworld February 2002 Dori Smith |
Script Debugger 3.0.1 AppleScript development environment adds features, OS X capabilities... |
Salon.com April 4, 2001 Caroline Benner |
The phantom cyber-threat We should stop worrying about computer terrorism and learn who our real enemies are... |
Linux Journal December 2000 Michael O'Brien |
A Linux-Based Automatic Backup System A step-by-step procedure for establishing a backup system that will save time and money. |
Macworld July 2000 Joseph Schorr |
Automate Your Folders Don't Let Your Folders Just Sit There--Put Them to Work |
InternetNews February 20, 2009 Richard Adhikari |
Attack Preys on New Adobe Acrobat Vulnerability Experts warn businesses and government agencies on the latest flaw uncovered in one of Adobe's popular applications. |
Macworld October 13, 2006 Richard Dyce |
Script Debugger 4.0 Scripting application gets ground-up rewrite |
RootPrompt.org July 12, 2000 |
Using expect for System Administration 'Expect' is an easy way to automate those tasks you end up doing again and again because they span different machines or because it requires more interaction than you can get easily from a bash/c/korn shell script. |
Entrepreneur August 2004 Kimberly L. McCall |
Learn Your Lines It takes more than practice to sell successfully over the phone. You need a stellar sales pitch to capture customers. These 8 steps will help you create one. |
RootPrompt.org July 17, 2000 |
Calling the Cops I have had a lot of questions concerning the police and the cracker that I have written about in the Cracked! articles. With these questions in mind I have written this article that explains several incidents involving the police and system administrators and attempts to answer some of these questions.... |
AskMen.com November 19, 2003 Steve Richer |
How To: Sell Your Screenplay What does it take to sell your script to Hollywood? |
Linux Journal May 1, 2000 Jacek Artymiak |
Python Programming for Beginners If you want to outsmart the Spanish Inquisition, learn Python. This article is a practical introduction to writing non-trivial applications in Python. |
Macworld February 2001 Scott Love |
Take Control of FileMaker Pro Built-in Scripts Help You Automate and Customize Your Databases... |
Search Engine Watch April 14, 2011 Kristine Schachinger |
3 Website Exploits - Are You Protected? Examining three common attacks that can hurt your visitors and rankings, and tips on how to prevent your site from being hacked. |
Macworld June 2002 Adrienne Robillard |
Straightforward Scriptwriting Program Takes the Hassle Out of Professional Script Formatting How fast can a writer pound out a script? Pretty quickly, thanks to Final Draft 6. Like version 5, this incarnation is a full-featured yet uncomplicated application customized for screenwriters and playwrights... |
Linux Journal June 22, 2002 Tom Poe |
Information Management for the Desktop A perl script to save e-mail messages into a searchable database for later retrieval. |
InternetNews January 3, 2007 Andy Patrizio |
Exploit Surfaces in Web Browser PDF Plug-Ins Several security firms have found a vulnerability in the Adobe Reader that is surprisingly easy to initiate and also very dangerous. |
InternetNews January 30, 2009 Richard Adhikari |
Fannie Mae IT Worker Indicted for Hack Attempt A contract worker at Fannie Mae has been charged with planting malicious script that would have taken down all the organization's 4,000 servers. |
Financial Planning April 1, 2011 Brad Klontz |
Behavior Modification Psychologically minded financial planners are in an excellent position to help clients become conscious of their assumptions about money, the first step to changing them. |
InternetNews December 12, 2005 Jim Wagner |
ClairAccess Lets You Message The Database ClairAccess provides one-click access to application and database information to BlackBerrys, digital wireless phones and the desktop. |