HACK
In: The Yale review, Band 100, Heft 4, S. 72-72
ISSN: 1467-9736
3820 Ergebnisse
Sortierung:
In: The Yale review, Band 100, Heft 4, S. 72-72
ISSN: 1467-9736
Demonized by governments and the media as criminals, glorified within their own subculture as outlaws, hackers have played a major role in the short history of computers and digital culture-and have continually defied our assumptions about technology and secrecy through both legal and illicit means. In Hacker Culture, Douglas Thomas provides an in-depth history of this important and fascinating subculture, contrasting mainstream images of hackers with a detailed firsthand account of the computer underground. Addressing such issues as the commodification of the hacker ethos by Silicon Valley entrepreneurs, the high-profile arrests of prominent hackers, and conflicting self-images among hackers themselves, Thomas finds that popular hacker stereotypes reflect the public's anxieties about the information age far more than they do the reality of hacking.
In: FP, Heft 203
ISSN: 0015-7228
Welcome to Dharamsala, population 20,000 and one of the most hacked places in the world. This small city in India's lush Himalayan foothills is home to the Dalai Lama, the exiled Tibetan spiritual leader; the Central Tibetan Administration (formerly called the Tibetan government in exile); and a host of Tibetan media outlets and nongovernmental organizations, some of which the Chinese government classifies as terrorist groups. Communication between the city's Tibetan community and Tibet itself is easier than it has ever been. Yet the risk of dialing home has never been greater. The Chinese government is everywhere and nowhere in Dharamsala, planting malware and intercepting messages in ways that are nearly undetectable and difficult to trace. Experts say that the hacks may be part of an elaborate campaign to identify possible protests and preempt them. Few cyberattacks on Dharamsala are strategically tailored to monitor or control the city's network infrastructure, say experts. Adapted from the source document.
In: Information Society Series
How hackers and hacking moved from being a target of the state to a key resource for the expression and deployment of state power. In this book, Luca Follis and Adam Fish examine the entanglements between hackers and the state, showing how hackers and hacking moved from being a target of state law enforcement to a key resource for the expression and deployment of state power. Follis and Fish trace government efforts to control the power of the internet; the prosecution of hackers and leakers (including such well-known cases as Chelsea Manning, Edward Snowden, and Anonymous); and the eventual rehabilitation of hackers who undertake "ethical hacking" for the state. Analyzing the evolution of the state's relationship to hacking, they argue that state-sponsored hacking ultimately corrodes the rule of law and offers unchecked advantage to those in power, clearing the way for more authoritarian rule. Follis and Fish draw on a range of methodologies and disciplines, including ethnographic and digital archive methods from fields as diverse as anthropology, STS, and criminology. They propose a novel "boundary work" theoretical framework to articulate the relational approach to understanding state and hacker interactions advanced by the book. In the context of Russian bot armies, the rise of fake news and algorithmic opacity, they describe the political impact of leaks and hacks, partnerships with journalists in pursuit of transparency and accountability, the increasingly prominent use of extradition in hacking-related cases, and the privatization of hackers for hire.
In: Schriftenreihe der Peter-Hacks-Gesellschaft
Variante(s) de titre : Titre en caractères arabes : "Ḥaqq (Al-)". - Titre franç. : "Vérité (La). Journal politique et littéraire". - Texte franç. - Remplacé par : "Eclair (L'). Journal politique et littéraire" ; Etat de collection : 1893-1894 ; Avec mode texte
BASE
In: The current digest of the post-Soviet press, Band 68, Heft 22, S. 12-12
In: Network Hacks - Intensivkurs; Xpert.press, S. 83-110
In: Versicherungsmagazin, Band 53, Heft 10, S. 72-74
ISSN: 2192-8622