2011-5-11
 
Account:
 
Password:
     
Home | E-Business | Technology | Software Engineering | Security | Education | Outsourcing
Technology
Internet of Things/EPC 
Audio Mining & Voice Portal
Pen Computing
Creativity & Innovation
Creativity Techniques 
Semantic Web
Web Intelligence
Adaptive Web
Data Warehouse ...
P2P Computing
Interspace
Digital Game ...
Real-Time Computing
Data Synchronization
Component Framework
Middleware
Multimedia
Product Line ...
Software Mass ...
Embedded Apps ...
Embedded Testing
Real-Time OS
Embedded DB
Programmable DSP
Electronic Design ...
Codesign
Security Technology
DRM
Trends in IT
Artificial Intelligence
Open Source
OLAP/Data Mining
e-Business
AOP
GP
CSCW
Workflow Management
Bioinformatics
DNA Computing
Quantum Computing
HPC
Parallel Computing
Internet
New Tech Resources
Blog
RSS
Wi-Fi
LMDS
Wireless Application
Pervasive Computing
Flexible Transistor
Document Clustering
Document English 
 
 Content
Experts  
Industry Report
Shanghai SPIN  
Services
 Column
Tom Gilb
Q & A
Advanced Inspections
Inspection Economics
Evo Project Management
 
Hacking
 
Automatic, network-wide security analysis of event logs
http://www.gfisoftware.com/lanselm/index.html
White Papers On Anti-Hacking
http://www.itpapers.com/category/intrusion.html
Hackers Home Page
http://www.hackershomepage.com/
Internet Security: SecureWorks
http://www.jamestowntechnologies.com/is.html
Keep Hackers Out Of Your Computers
http://www.memoryoptimizer.com/Antivirus/mcafee_deal_hacker.htm?rc=hacker
How To Become A Hacker
http://www.tuxedo.org/~esr/faqs/hacker-howto.html
Security & Privacy
http://www.extremetech.com/category2/0,3971,9110,00.asp
Desktop Security Software
http://www.cleanslate.us/
Hackers Site
http://www.mgmua.com/hackers/index.html
Security News Network
http://www.atstake.com/security_news/index.html?
Acker History - The Real Programmers
http://netsecurity.about.com/library/weekly/aa042699.htm?iam=excite_1&terms;=hacker
Hacking Mozilla
http://www.mozilla.org/hacking/
Hacking Exposed: Network Security Secrets and Solutions 3/e (Book) 2001
http://search.barnesandnoble.com/bookSearch/isbnInquiry.asp?sourceid=00398880815294468427&ISBN;=0072193816&bfdate;=09-02-2002+00:55:28&bfinfo;=0072193816
http://www.hackingexposed.com/
The Dark Side Of Hacking Bill
http://www.wired.com/news/politics/0,1283,54153,00.html
Hacking In Progress
http://www.hip97.nl/
Instant Hacking
http://www.hetland.org/python/instant-hacking.php
Hacking Lexicon
http://www.robertgraham.com/pubs/hacking-dict.html
Archive Of Hacking Related Materials
http://www.antionline.com/index.php
Yahoo Directory: Hacking
http://dir.yahoo.com/Computers_and_Internet/Security_and_Encryption/Hacking/
Internet News On Hacking
http://www.internetnews.com/index.php/4381
Hacking Files, Links
http://www.cleo-and-nacho.com/mainpages/hacking.htm
Open Directory: Hacking
http://dmoz.org/Computers/Hacking/
A History Of Hacking
http://www.sptimes.com/Hackers/history.hacking.html
Hacking History
http://netsecurity.about.com/cs/hackinghistory/index_2.htm?iam=excite_1&terms;=hacking
Hacking Linux Exposed
http://www.hackinglinuxexposed.com/
The World Of Game Hacking
http://www.gamehacking.com/
Higher Learning For Real Hackers
http://www.xs4all.nl/~l0rd/
Hacking Reference
http://netsecurity.about.com/cs/hackingreference/index.htm?iam=excite_1&terms;=hacking
Hacking and Security Text
http://netsecurity.about.com/library/bltext.htm?iam=excite_1&terms;=hacking
Hacking Windows How Crackers Get In, and How To Keep Them Out
http://netsecurity.about.com/library/weekly/aa082701a.htm?iam=excite_1&terms;=hacking
Hacking Boot Camp
http://www.mytrainingbroker.com/security/hacking.html
Computer Hacking and Ethics
http://www.cs.berkeley.edu/~bh/hackers.html
Hacking Truth: What They Don't Teach In Computer Security Manuals
http://www.ankitfadia.com/
Computer Monitoring Software Anti-Spy Software
http://www.internet-monitoring-spy-software.com/antispy.htm
Remote PC Monitoring Software
http://www.original-programs.com/
Cyber Hacking Security
http://www.cyber-hacking.com/
UK Hacking & Phreaking Resources
http://www.crossbar.demon.co.uk/
Rent-A-Hacker IT Security Services
http://www.rent-a-hacker.com/
Hacking Furby
http://www.thebee.com/bweb/iinfo138.htm
Netware Hack FAQs
http://www.nmrc.org/faqs/netware/
Hacking The DoS Attacks
http://www.pc-radio.com/otr/hacking.html
Apocalypse Online Security
http://www.apocalypseonline.com/security/
Hacking Frontier: First Encounters
http://www.fyi.net/~babak/
Paragon Hacking
http://www.paragonhacking.net/
Know Vulnerabilities
http://www.foundstone.com/
Hacking The Audrey
http://www.audreyhacking.com/
Astalavista Security Group Hackers Handbook
http://www.astalavista.com/
Information Warfare & Security Portal
http://www.infowar.com/
Virus Bulletin Independent Anti-Virus Advice
http://www.virusbtn.com/
USSR Underground Security Systems Research USSR Is Back
http://www.ussrback.com/
Computer Security Resource
http://www.secureroot.com/
The Wildlist Organization International Information On Virus
http://www.wildlist.org/
International Association For Cryptologic Research (IACR)
http://www.iacr.org/
Handbook Of Applied Cryptography 5/e (Book) 2001
http://www.cacr.math.uwaterloo.ca/hac/
Hacking Resources
http://users.110.net/~pq1801/
Hacking Tools
http://www.hackcity.de/
Updated Security Tools
http://home.earthlink.net/%7Ehumbz/ust1.htm
Hackers Catalog Software & Books
http://66.40.78.100/
Anti-Privacy
http://www.bsa.org/usa/antipiracy/
Hacking 101
http://www.tricksandtrinkets.com/hacking.htm
FAST Federation Against Software Theft
http://www.fast.org.uk/
Password Recovery Software
http://www.crackpassword.com/
The Hacker's Choice (THC)
http://www.thehackerschoice.com/
Novell Netware Hacking Tools
http://www.zejn.si/~natan/stuff2.html
SETH System Exploration Tools/Hacking
http://www.fh-augsburg.de/~rip/seth.html
ICQ Power Tools
http://www.icqgreetings.com/icqpower.htm
Unix Host and Network Security Tools
http://csrc.nist.gov/tools/tools.htm
DDoS Attacks/Tools
http://staff.washington.edu/dittrich/misc/ddos/
Anti-Hacking
http://www.esoftstudy.com/
Software Security Solutions
http://www.softwaresecuritysolutions.com/
Two Views of Hacking
http://www.cnn.com/TECH/specials/hackers/qandas/
XML Hacking Is Fun !
http://www.w3.org/XML/9705/hacking
Hacking Conferences
http://www.allconferences.net/Computers/Hacking/
The NTLDR Hacking Guide
http://www.tburke.net/info/ntldr/ntldr_hacking_guide.htm
Most Comprehensive Computer and Network Security Resources
http://www.prognosisx.com/infosyssec/
Anatomy Of A Hacking
http://news.com.com/2009-1017-893228.html
To Protect and Secure (Links)
http://www.hideaway.net/home/public_html/index.php
Untold Windows Tips and Secrets
http://onlinesecurity.virtualave.net/windows/
Commodore Hacking Magazine
http://www.canberra.edu.au/~scott/C=Hacking/Index.html
Today's Hot Topic: Hacking
http://www.zdnet.com.au/newstech/topic?tag=Hacking
How To Hack Messy URLs For Fun and Profit
http://www.robotwisdom.com/weblogs/urlhacking.html
MetalHead Hacking Group
http://www.emucamp.com/mhhg/
Hacking - How Its Done & Tutorial
http://www.infosyssec.org/infosyssec/hackhow1.htm
Hackers Home Page
http://www.hackershomepage.com/
Hacking Information and Statistics
http://www.btinternet.com/~shawweb/george/hacks/
Newest IT Job Title: Chief Hacking Officer
http://www.newsfactor.com/perl/story/17940.html
Web Hacking
http://www.foundstone.com/services/web_hacking.html
Hacking The Web A Security Guide
http://www.webdeveloper.com/security/security_hacking_the_web.html
The Guides To Harmless Hacking
http://www.happyhacker.org/gtmhh/index.shtml
What Is Hacking ?
http://web.demigod.org/~zak/geek/hack.shtml
 
 

 Links: ACM || CiteSeer || CMU SEI || Construx || Cutter || IEEE-CS || itmWEB
Shanghai IT || Shanghai Economic Commission || SSIA || Shanghai Component Repository
LJYW || SPRT || PKSPIN || CCW Shanghai || China IT Outsourcing Summit more 
contribution guide | FAQ | about | copyright | contact
last update on 2005-04-08
better use IE 5.0 or above (800*600 or above)
© 2000-2005 Software Export and IT Transfer Center, ASTI Shanghai
All Rights Reserved.