• Home
  • Blog
  • About
  • Contact
CloudAve
Software in Business. The Business of Software.
  • Business
    • Analysis
    • Entrepreneurship
    • Marketing
    • Strategy
    • Small business
  • Technology
    • Application Software
    • Infrastructure
    • Open Source
    • Mobile
    • Platforms
    • Product reviews
    • Security
  • Misc
    • Design
    • Just for fun
    • Trends & Concepts
  • Your POV
  • Sponsors
Browse: Home / hacker

hacker

In the fall out of Prism some things have really changed

In the fall out of Prism some things have really changed

By Dan Morrill on October 25, 2013

In the fall out of the NSA Government spying row a number of things have become readily apparent from both the business security viewpoint and the personal security viewpoint. From the Business Viewpoint we have landed firmly in the Catch 22 world, on one side we have government regulations that tell companies what they must […]

Posted in Featured Posts, Security | Tagged censorship, computer, Government, hacker, information security, law enforcement, Media and Web 2.0, monitoring, National Security Agency, NSA, prism, scary, spying, tv | 1 Response

Write the Docs, Proper Portland Brew, Hack n’ Bike and Polyglot Conference 2013

Write the Docs, Proper Portland Brew, Hack n’ Bike and Polyglot Conference 2013

By Adron Hall on April 10, 2013

Blog Entry Index: Write the Docs Portland Proper Brew How to Survive the Zombie Apocalypse with Riak @ Polyglot Conference 2013 I just wrapped up a long weekend of staycation. Monday kicked off Write the Docs this week and today, Tuesday, I’m getting back into the saddle. Write the Docs The Write the Docs Conference this […]

Posted in Technology | Tagged Code Stories, coder, Coding Adventures, conference, conferences, consistent hashing, developer, distributed database, distributed systems, docs, documentation, documents, gossipping, hacker, hinted handogg, Meetups n' Such, polyglot, Presentations and Speaking, Programmer, PSA, riak, write the docs, writethedocs, Zombie | 1 Response

Public Honeynet Data - Who are the top 20 hacking countries?

Public Honeynet Data – Who are the top 20 hacking countries?

By Dan Morrill on March 7, 2013

Public Honeynet Data – Who are the top 20 hacking countries? I could watch this site all day. In case you were wondering really wondering who the top hacker countries are, the German Alliance for Cyber Security has a dashboard display as to what is happening on 97 honeypots around the internet. It makes for […]

Posted in Featured Posts, Security | Tagged china, hacker, hacking, honeynet, Honeynet Project, Russia, United States

OSCON: Energy + Awesome + Space Exploration + Hacking

OSCON: Energy + Awesome + Space Exploration + Hacking

By Adron Hall on July 29, 2011

I wanted to post these two keynotes from OSCON 2011. They really bring out the spirit of exploration, adventure, care, and doing things bigger than oneself. This is about doing things that go beyond the cat picture of the day. These presentations, well, I’ll let them speak for themselves. Absolutely great!

Posted in Featured Posts, General, Open Source | Tagged arial waldman, arielwaldman, conferences, google, hack, hacker, hacker news, hacking, opensource, oscon, Science Hack Day, space exploration, space hack day, steve yegge, twitter, video

The Anonymous Press Release and Corporate Responsibility for Data

The Anonymous Press Release and Corporate Responsibility for Data

By Dan Morrill on May 9, 2011

I am not a member of Anonymous, but anyone in the information security field has followed them over the last 18 months as they grew from a general idea to launching DDoS attacks against corporations that did something they did not like, or like in the case of HBGary, did things that were ill advised. […]

Posted in Featured Posts, Infrastructure | Tagged Anonymous, Denial-of-service attack, hacker, information security, sony

Turn your IPod, Iphone or soon the Ipad into a hacker system

Turn your IPod, Iphone or soon the Ipad into a hacker system

By Dan Morrill on February 15, 2010

For all the complaints against apple for making it hard to get an application registered and sold in the Apple store, there are some very cool applications that can be used to set up your Iphone or other apple Iphone OS based system into an excellent scanning and pseudo hacker tool. These are the products […]

Posted in Security | Tagged Apple, applications, hack, hacker, hacking, ipad, iphone, iPod, programs, tools

Security issues with the iPad.com domain

Security issues with the iPad.com domain

By Dan Morrill on January 27, 2010

As Apple prepares to amaze the world with their planned announcement today on whatever it is they are officially going to announce, I decided to take a look at the possible names for the device they are going to announce and see if I could get a sneak peek at the domains that might reflect […]

Posted in Security | Tagged Apple, domain registration, hacker, hacking, internic, ipad.com, malware, qvodsetup3

I totally love Phishing when they are obviously juvenile

By Dan Morrill on October 26, 2009

Well Ok I love it when Phishers are really being idiots, and yet another phising attempt fails to snare its intended victim, namely me, and namely because the phisher is being very stupid. I do a lot of shopping online so I am fairly sensitive to the loss of an account or someone trying to […]

Posted in Security | Tagged Ebay, email, hacker, hacking, humor, phishing, spam

Twitter Hack Exposes Internal Company Documents

Twitter Hack Exposes Internal Company Documents

By Dan Morrill on July 15, 2009

While there are issues with publishing information that someone got via a hacking attack, often at times the information can be useful in many ways. Over the weekend Techcrunch was sent an unsolicited e-mail from a hacker that contained over 300 internal Twitter documents, and an explanation on how the various accounts was hacked. Techcrunch […]

Posted in Security | Tagged biz stone, ethics, hack, hacker, hacking, Security, techcrunch, twitter | 1 Response

feed mail facebook twitter linkedin

Popular Posts

  • Home
  • What Makes an Entrepreneur? Four Letters: JFDI
  • Cloud Computing in Education
  • How to Select Enterprise Collaboration Vendors
  • About
  • 10 Questions about Innovation Management
  • MinuteDock Launches on Intuit’s Partner Platform
  • I wish that Klout allowed for divergent systems

Archives

Authors

  • Adron Hall
  • Chirag Mehta
  • Christian Reilly
  • Dan Morrill
  • Derek Pilling
  • Hutch Carpenter
  • Jarret Pazahanick
  • Jason M. Lemkin
  • Joel York
  • John Taschek
  • Krishnan Subramanian
  • Mark Suster
  • Michael Krigsman
  • Ofir Nachmani
  • Paul Miller
  • Quinton Wall
  • Randy Bias
  • Robert Duffner
  • Sadagopan
  • wprss
  • Zoli Erdos
Sponsored by: