MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
Salon.com
October 31, 2000
Andrew Leonard
Triumph of the free-software will The passion of open-source hackers may make their success inevitable. Impugn it at your peril... mark for My Articles similar articles
Fast Company
December 2000
Astrid Sandoval
VP of Hacker Relations Job Titles of the Future: Even in the free-for-all world of open-source software, you've got to have some order -- and some orderlies, people who serve as intermediaries between the programmers (otherwise known as hackers) and the companies that use their software... mark for My Articles similar articles
PC World
May 2001
Kim Zetter
Hacker Nation Shadowy, computer-wise predators slip in undetected to steal data, deface Web sites, crash systems--or just look around. We talk to some current and former hackers to find out more about them and what they're after... mark for My Articles similar articles
Salon.com
May 18, 2001
Andrew Leonard
No recession for free software Hackers scorn the theory that the economic downturn could hurt open-source software... mark for My Articles similar articles
Linux Journal
April 2000
Brian R. Marshall
The Generation Gap An examination of the issues involved with the use of open-source software components in closed-source applications. mark for My Articles similar articles
CIO
March 15, 2004
Christopher Lindquist
Model Hacker Behavior - Under Development Forget about patches. Researchers at the Florida Institute of Technology are looking for ways to fight hackers by modeling their methods, or "exploits." The research could eventually lead to new types of security tools capable of stopping attacks that hackers haven't even invented yet. mark for My Articles similar articles
Salon.com
November 15, 2002
Andrew Leonard
AbiWord up Booms come and busts go, but open-source developers keep improving the alternatives to Microsoft's "standards." mark for My Articles similar articles
Salon.com
December 15, 2000
Andrew Leonard
The Linux jihad Or, what do alien crypto, poststructuralism and virtual private networks all have in common? mark for My Articles similar articles
Salon.com
February 6, 2001
Andrew Leonard
Hunting the wild hacker Work should be play, says a new book that sets forth the emerging ethical code of free-software programmers... mark for My Articles similar articles
Bank Systems & Technology
September 15, 2007
Sharon Gaudin
Number Of Hackers Attacking Banks Jumps 81% Hackers no longer need to be technical wizards to set up an operation to steal people's banking information and then rob their accounts. mark for My Articles similar articles
Salon.com
September 22, 2000
Andrew Leonard
License to be good In the free-software world, people obey the rules because they believe in them. In the music industry, the rip-off is a way of life. mark for My Articles similar articles
Salon.com
June 5, 2002
Andrew Leonard
A new teenage wasteland? Script kiddies, Web site defacers, chat-room gangsters: Today's digital troublemakers get a bad rap. But in "The Hacker Diaries" we learn that they're really all right. mark for My Articles similar articles
Salon.com
March 6, 2001
Ed Frauenheim
Crafting the free-software future At VA Linux's SourceForge, thousands of programmers are collaborating for both love and money... mark for My Articles similar articles
Fast Company
Neal Ungerleider
China Allegedly Arrested Hackers To Comply With The U.S. Government's Demands Whether China will actually prosecute the hackers is a whole other issue; it's possible the country only made the arrests to skirt the economic sanctions that President Obama was lording over China. mark for My Articles similar articles
BusinessWeek
August 22, 2005
Grow & Hamm
From Black Market To Free Market Frustrated computer-security firms are offering to buy tips from the very hackers who bedevil them. mark for My Articles similar articles
eCFO
December 2000
Karen J. Bannan
Fear of the Black Hats Increasingly, companies are hiring hackers to test their network firewalls. This may not be such a good idea. mark for My Articles similar articles
PC World
April 2, 2001
Kim Zetter & Andrew Brandt
How Hackers Hack The tricks hackers use, and what you can do to foil them... mark for My Articles similar articles
Bank Technology News
April 2001
Maria Bruno
Hackers Steal 1 Million Card Numbers Teams of Russian and Ukrainian hackers stole more than 1 million credit card numbers from 40 American e-businesses in recent months, according to the Federal Bureau of Investigation... mark for My Articles similar articles
Bank Technology News
April 2007
Rebecca Sausner
The New Red Menace Russian and eastern European hackers get all the glory these days, but their efforts to disrupt American financial services are a nuisance when compared to the nation-state threat that China's cyber army, and its rogue hackers, may pose. mark for My Articles similar articles