Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- Hacker



  Two things I don’t like about Hacker News

Hacker News is a very famous IT information hub. We can find many useful links about the latest IT news and fantastic technology demos. But there are two things I don’t like about Hacker News. Maybe some of you also have the same feelings.1.  About the more link. Every time we click the more link to go to next page, there will be a unique key generated to produce the new page. It is a good security mechanism. Also it may increase pages views as we need to read page by page bu...

   Hacker news,More link,Submission,Security     2012-02-28 11:55:37

  Comex, the Hacker Behind JailbreakMe.com, Hired as Apple Intern

Comex, the hacker behind JailbreakMe.com, is joining Apple as an intern. JailbreakMe.com made it extremely easy for iOS users to jailbreak their devices simply by visiting a website. He announced the hiring on Twitter: It's been really, really fun, but it's also been a while and I've been getting bored. So, the week after next I will be starting an internship with Apple. Forbes unmasked Comex as Nicholas Allegra, a 19-year old Brown University student from Chappaqua, NY, by Forbes. In that arti...

   Apple,Comex,Jailbrealme,Intern,Leak,Hack     2011-08-26 02:35:57

  Twitter user database is hacked

According to Sina Tech, One hacker from Islamic Republic of Mauritania claimed today that he had acquired Twitter's entire user database and he shared over 15000 user account information on file sharing website Zippyshare.These information include the name of each account on Twitter, username and access tokens of third-party applications which have access to their Twitter accounts(such as Instagram or HootSuite).Twitter has yet to comment on the matter, but the company sent messages urging ...

   Twitter,Hacker,Access token     2013-08-20 10:49:44

  The Best Hackers In The World All Come From One Country

Facebook, Zynga, and other hot companies use Interview Street to recruit programmers. Interview Street posts programming challenges and invites contenders to solve as many as they can. According to their message board, nine of Interview Street's top ten hackers are all from China. One is from an unknown country. A hacker called ralekseenkov, who is ranked number 11, is from the United States. What does that say about the talent crunch here? Read more: http://www.businessinsider.com/hackers-...

   Hacker,Country,China,Microsoft     2012-04-11 13:17:55

  Mark Zuckerbeg's hacker way

According to TechCrunch, Facebook CEO Mark Zuckerberg wrote codes for the latest mobile IM application : Poke, the tone played when receiving push notifications is from the mouth of Zuckerberg. This approach reflects the way pursued by Zuckerberg : hacker way.As one of the earliest features of Facebook the "Poking" is invented by Zuckerberg, it is not surprising that Zuckerberg involves in Poke's development.Zuckerberg recorded his own voice on the phone initially just for fun. But he was later ...

   Poke,Facebook,Snapchat, Mark Zuckerberg     2012-12-24 12:01:52

  Some famous article aggregators

Blogs are still very important places for people sharing their thoughts about something although some social media platforms have replaced some of these capabilities. As a blog writer, how can you let others know what you are thinking about? Besides your friends and social media platforms, there are some article aggregators around us which can help us promote our articles. Other than some aggregators like Google News, readers can submit articles to these sites themselves What are some famous art...

   News aggregator,Reddit,Digg,Hacker News     2013-08-12 03:34:37

  3 Most Popular Ways Hackers Steal Your Phone Data – Stay Safe

Our mobile devices store personal information, including passwords, usernames, birthdates, financial information, social security numbers, PIN, etc. Hence, this makes hacking a mobile phone an attractive option for hackers and scammers. There are various techniques that hackers use to spy on a mobile phone for personal information. Also, stalkers can make use of spy apps and malicious software to spy on unsuspecting people. Mobile phones are not secure because these devices connect to other net...

   TECH     2019-11-29 00:29:40

  The Evolution of a Programmer

High School/Jr.High 10 PRINT "HELLO WORLD" 20 END First year in College program Hello(input, output) begin writeln('Hello World') end. Senior year in College (defun hello (print (cons 'Hello (list 'World)))) New professional #include <stdio.h> void main(void) { char *message[] = {"Hello ", "World"}; int i; for(i = 0; i < 2; ++i) printf("%s", message[i]); printf("\n"); } Seasoned professional #include <iostream....

   Humour,Evolution,Programmer     2012-04-23 06:30:33

  Can we believe our eyes?

Several days ago, one of our customers submitted a sample (SHA1: fbe71968d4c5399c2906b56d9feadf19a35beb97, detected as TrojanDropper:Win32/Vundo.L). This trojan hijacks  the hosts “vk.com” and “vkontakte.ru” (both social networking sites in Russia)and redirects them to 92.38.209.252, but achieves this in an unusual way. A common  method used to hijack a website and redirect it to a site of the attacker’s choice is to add an entry in the Windows hosts f...

   Window,Software,Eye,Weired     2011-08-22 12:12:16

  Hackers vs. Coders

Photo Credit: Pranav MistryBeing a good hacker is an invaluable skill. But is being a coder the same as being a hacker? Is it possible that coders are at a creative disadvantage to hackers who don’t know how to code?Here’s a story that helped me see the difference.I was recently invited to mentor at Startup Weekend. On Friday night, we gathered to eat pizza, pitch ideas, create teams and discuss launch plans. At the end of the day, everyone was feeling great about what theyâ...

   Hacker,Coder,Comparison,Innovation     2011-05-11 02:11:09