Siga este enlace para ver otros tipos de publicaciones sobre el tema: Hacking hack.

Artículos de revistas sobre el tema "Hacking hack"

Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros

Elija tipo de fuente:

Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Hacking hack".

Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.

También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.

Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.

1

Cekerevac, Zoran, Zdenek Dvorak, Ludmila Prigoda y Petar Cekerevac. "Hacking, Protection and the Consequences of Hacking Hacking, Protection and the Consequences of Hacking". Communications - Scientific letters of the University of Zilina 20, n.º 2 (30 de junio de 2018): 83–87. http://dx.doi.org/10.26552/com.c.2018.2.83-87.

Texto completo
Resumen
Understanding the term hacking as any unconventional way of interacting with some system it is easy to conclude that there are enormous number of people who hacked or tried to hack someone or something. The article, as result of author research, analyses hacking from different points of view, including hacker’s point of view as well as the defender’s point of view. Here are discussed questions like: Who are the hackers? Why do people hack? Law aspects of hacking, as well as some economic issues connected with hacking. At the end, some questions about victim protection are discussed together with the weakness that hackers can use for their own protection. The aim of the article is to make readers familiar with the possible risks of hacker's attacks on the mobile phones and on possible attacks in the announced flood of the internet of things (next IoT) devices.
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Pratt, Mike. "Raptor Hacking". Wildlife Rehabilitation Bulletin 29, n.º 1 (30 de junio de 2011): 34–38. http://dx.doi.org/10.53607/wrb.v29.78.

Texto completo
Resumen
In the raptor rehabilitation field, hacking is a special procedure for raising juvenile raptors that simulates natural fledging and allows young raptors—those that cannot yet fly and either are still restricted to or just leaving the nest—a gradual acclimation to independence. Hacking also is known as a ‘soft release.’ This paper focuses on hacking raptors and discusses advantages, disadvantages, hacking age, procedures, hack box design and construction, site selection, fledging age of raptor species, and hack release.
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Adzhakhunov, E. A. y O. V. Nikolaev. "UAV control hack system". Journal of «Almaz – Antey» Air and Space Defence Corporation, n.º 2 (23 de junio de 2021): 35–41. http://dx.doi.org/10.38013/2542-0542-2021-2-35-41.

Texto completo
Resumen
The paper presents an alternative solution to the problem of drone hacking over a radio channel and uses signal spoofing of a global positioning system (GPS, GLONASS). Within the framework of the study, block diagram and operation algorithm of the system were developed and experimental data were obtained.
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Aiken, Mary P., Julia C. Davidson, Michel Walrave, Koen S. Ponnet, Kirsty Phillips y Ruby R. Farr. "Intention to Hack? Applying the Theory of Planned Behaviour to Youth Criminal Hacking". Forensic Sciences 4, n.º 1 (30 de enero de 2024): 24–41. http://dx.doi.org/10.3390/forensicsci4010003.

Texto completo
Resumen
Adolescents are currently the most digitally connected generation in history. There is an ever-growing need to understand how typical adolescent risk-taking intersects with the vastly criminogenic potential of digital technology. Criminal hacking in older adolescents (16–19-year-olds) was assessed using an adapted Theory of Planned Behaviour (TPB) model, a cohesive theoretical framework that incorporates cognitive processes and human drivers (informed by psychology, cyberpsychology, and criminology theory). In 2021, a large-scale anonymous online survey was conducted across nine European countries. Criminal hacking was assessed using data from 3985 participants (M = 1895, 47.55%; F = 1968, 49.39%). This study formulated a powerful predictive model of youth hacking intention (accounting for 38.8% of the variance) and behaviour (accounting for 33.6% of the variance). A significant minority, approximately one in six (16.34%), were found to have engaged in hacking, and approximately 2% reported engaging in hacking often or very often. Increased age, being male, and offline deviant behaviour were significant predictors of hacking behaviour. In line with the TPB, intention was the strongest individual predictor of hacking behaviour, which in turn was significantly predicted by cognitive processes accounted for by TPB constructs: subjective norms of family and peers, attitudes towards hacking, and perceived behavioural control. These TPB constructs were found to be significantly associated with human factors of risk-taking, toxic online disinhibition, offline deviant behaviour, and demographic variables of age and gender. Implications for future research, interventions, policy, and practice are discussed.
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Pisarić, Milana. "The use of policeware to hack electronic evidence in Germany and the Netherlands". Nauka, bezbednost, policija 28, n.º 1 (2023): 16–26. http://dx.doi.org/10.5937/nabepo28-43759.

Texto completo
Resumen
Hacking as manipulation of software, data, computer system or network without the knowledge and permission of the user constitutes an act of criminal offence. However, given that certain technological tendencies make it difficult/impossible to collect electronic evidence, the question arises as to whether the authorities responsible for detecting and proving criminal offenses should be authorized to hack, i.e. to conduct investigations in the digital environment in such a way that they would be authorized to exploit technical, systemic and human vulnerabilities within the IT system, without knowledge and permission of the user, in order to gain a remote access to protected system and conduct further actions. Although a state authorities' hacking with the aim of collecting electronic evidence carries immense risks for information security and human rights and freedoms with it, one cannot dispute that the deployment of such techniques might be useful in criminal investigations. However, the application of hacking technique would not per se violate the right to privacy and other guaranteed rights and freedoms, only as far as such interference is properly regulated. Hence, the legal framework should explicitly regulate the lawful hacking as a special investigative measure, especially the conditions that should be met and mechanisms that should be applied. As hacking for the purposes of criminal investigation may be performed through various techniques, this paper focuses on a hacking technique based on a malware, and its regulations in two countries with explicit provisions - Germany and the Netherlands.
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Fidler, David P. "The U.S. Election Hacks, Cybersecurity, and International Law". AJIL Unbound 110 (2016): 337–42. http://dx.doi.org/10.1017/aju.2017.5.

Texto completo
Resumen
In October 2016, the United States accused Russia of hacking political organizations involved in the U.S. elections and leaking pilfered information to influence the outcome. In December, President Obama imposed sanctions for the hacking. This incident damaged President Obama's cybersecurity legacy. The “hack and leak” campaign targeted American self-government—a challenge to his administration's promotion of democracy in cyberspace. It created problems for the president's emphasis on international law and norms as “rules of the road” for cybersecurity. The episode exposed failures in his attempts to make deterrence an important instrument of U.S. cybersecurity.
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Ul Haq, Hafiz Burhan, Muhammad Zulkifl Hassan, Muhammad Zunnurain Hussain, Rabia Aslam Khan, Sabreena Nawaz, Hassan Raza Khokhar y Mahnoor Arshad. "The Impacts of Ethical Hacking and its Security Mechanisms". Pakistan Journal of Engineering and Technology 5, n.º 4 (29 de diciembre de 2022): 29–35. http://dx.doi.org/10.51846/vol5iss4pp29-35.

Texto completo
Resumen
Hacking is a typical method for breaching personal and confidential information. As a result, hacking is also known as infiltration. Intrusions, on the other hand, were not always recognized as theft and were employed for productive purposes. A person or corporation that does ethical hacking and receives incentives from a network or system owner for testing can enter an apparatus (system or network) to locate, repair, and expose network flaws. Most ethical hackers, also known as black hat hackers, test systems using different approaches, methodologies, and tools. Because today's life is lived in a digital world, we need to protect our privacy from cyber-attacks. The proposed paper discussed ethical hacking and its ramifications, in which black hackers "hack" networks. The proposed research emphasizes ethical hacking tactics. This research also examines the impact of ethical hacking on business, education, health, society, the workplace, technology, sensitive information, and human life. Finally, a brief survey based on certain questions is better to grasp the public's understanding of ethical hacking. In summary, this research offers the user fascinating and helpful information when working on ethical hacking.
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Hussain, Syed Muzaffar. "AN INSIGHT INTO THE DIFFERENCES OF PSYCHOLOGICAL DISPARATE MOTIVATIONS BETWEEN HACKERS AND CRACKERS". Journal of Correctional Issues 5, n.º 1 (16 de agosto de 2022): 27–32. http://dx.doi.org/10.52472/jci.v5i1.94.

Texto completo
Resumen
This paper considers two different classes of computer hackers, with a special emphasis on disparate motivations of hacking. Hackers’ psychology widely discussed in the media is almost entirely unexplored by psychologists. In this study, hackers’ and crackers’ motivation is investigated, using the study of values scale. One hundred and fourteen participants completed our online research instrument. The study of values and demographic data were questioned. Participants were categorized as hackers and crackers through their responses on two items questioned in the demographic datasheet. Results indicated that hackers were found higher on the motivations of seeking knowledge, aesthetic sense, social interactions, and mysticism while crackers were found more motivated due to their economical and political interests. Findings suggested that hackers hack for the thrill of learning and gathering information to gain intelligence. Hackers hack to make society a better place to live. Compared to hackers, crackers are incapable of normal social interactions, and their hacking is based on the motivations of getting money and power.
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Bohnsack, René y Meike Malena Liesner. "What the hack? A growth hacking taxonomy and practical applications for firms". Business Horizons 62, n.º 6 (noviembre de 2019): 799–818. http://dx.doi.org/10.1016/j.bushor.2019.09.001.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Jordan, Tim. "A genealogy of hacking". Convergence: The International Journal of Research into New Media Technologies 23, n.º 5 (6 de abril de 2016): 528–44. http://dx.doi.org/10.1177/1354856516640710.

Texto completo
Resumen
Hacking is now a widely discussed and known phenomenon, but remains difficult to define and empirically identify because it has come to refer to many different, sometimes incompatible, material practices. This article proposes genealogy as a framework for understanding hacking by briefly revisiting Foucault’s concept of genealogy and interpreting its perspectival stance through the feminist materialist concept of the situated observer. Using genealogy as a theoretical frame, a history of hacking will be proposed in four phases. The first phase is the ‘prehistory’ of hacking in which four core practices were developed. The second phase is the ‘golden age of cracking’ in which hacking becomes a self-conscious identity and community and is for many identified with breaking into computers, even while non-cracking practices such as free software mature. The third phase sees hacking divide into a number of new practices even while old practices continue, including the rise of serious cybercrime, hacktivism, the division of Open Source and Free Software and hacking as an ethic of business and work. The final phase sees broad consciousness of state-sponsored hacking, the re-rise of hardware hacking in maker labs and hack spaces and the diffusion of hacking into a broad ‘clever’ practice. In conclusion, it will be argued that hacking consists across all the practices surveyed of an interrogation of the rationality of information technocultures enacted by each hacker practice situating itself within a particular technoculture and then using that technoculture to change itself, both in changing potential actions that can be taken and changing the nature of the technoculture itself.
Los estilos APA, Harvard, Vancouver, ISO, etc.
11

Goel, Shubham, Kunal Gupta, Mayank Garg y A. K. Madan. "Ethical Hacking and Its Countermeasures". International Journal of Advance Research and Innovation 2, n.º 3 (2014): 41–49. http://dx.doi.org/10.51976/ijari.231408.

Texto completo
Resumen
In today‘s world the explosive growth of the Internet has brought many good things such as E-commerce-banking, E-mail, Cloud Computing. Most organizations, governments are linked to the internet in some way or the other, but the question arises ‗how safe are they‘. There is also a Dark side to all the progress such as Hack-ing, creation of Backdoors, phishing etc.This paper elucidates in brief about what hacking is, discusses its scope, types of hackers and the techniques employed by them. Itarticulates on the growing trend of smart mailers, which can send mails from any possible email,working with Kali which is an offensive software penetration tool and a provides a demonstration of SQL injection and various vulnerabilities still existing in today‘s sites. The paper also lays out the example of various gaping vulnerabilities found by the authors of this paper in govern-ment websites. Hacking is the first big problem faced by Governments, companies, and private citizens alike around the world. Hackers today are invading privacy like reading e-mail, stealing credit card number shopping sites, and putting it out on the web for everyone to see. The paper and other discussions help the common people and organizations to understand the loopholes, and even if the people can‘t rectify it least they can pre-vent themselves.
Los estilos APA, Harvard, Vancouver, ISO, etc.
12

Karlgren, Kasper, Barry Brown y Donald McMillan. "From Self-Tracking to Sleep-Hacking". Proceedings of the ACM on Human-Computer Interaction 6, CSCW2 (7 de noviembre de 2022): 1–26. http://dx.doi.org/10.1145/3555630.

Texto completo
Resumen
With growing interest in how technology can make sense of our body and bodily experiences, this work looks at how these experiences are communicated through and with the help of technology. We present the ways in which knowledge about sleep, and how to manipulate it, is collectively shared online. This paper documents the sleep-change practices of four groups of 'Sleep Hackers' including Nurses, Polyphasic Sleeper, Over-sleepers, and Biohackers. Our thematic analysis uses 1002 posts taken from public forums discussing sleep change. This work reveals the different ways individuals share their experiences and build communal knowledge on how to 'hack' their sleep -- from using drugs, external stimulation, isolation, and polyphasic sleeping practices where segmented sleep schedules are shared between peers. We describe how communal discussions around the body and sleep can inform the development of body sensing technology. We discuss the opportunities and implications for designing for bodily agency over sleep changes both in relation to collaboratively developed understandings of the body and social context of the user. We also discuss notions of slowly changing bodily processes and sensory manipulation in relation to how they can build on the exploration of soma-technology.
Los estilos APA, Harvard, Vancouver, ISO, etc.
13

Sati, Vrinda y Raja Muthalagu. "Analysis on Hacking the Secured Air-Gapped Computer and Possible Solution". Cybernetics and Information Technologies 23, n.º 2 (1 de junio de 2023): 124–36. http://dx.doi.org/10.2478/cait-2023-0017.

Texto completo
Resumen
Abstract The world today runs on data, every minuscule task to the large one requires data. All the data is stored in the various technologies that we use. And to keep data safe, air gaps are introduced. Air gaps are a network security measure where secure computer networks are physically isolated from unsecured networks. Yet, different methods to hack the air gap have come forth. The paper analyzes the problem of hacking an air gap via screen brightness modulations. The proposed solution is a software program used to alert the user of a change in the brightness level of the screen. The concept of Windows Management Instrumentation (WMI) has been used to put forth the software. Applied to an air-gapped computer, the program displays an alert box immediately, as the screen brightness changes. The solution is an easy and efficient way to counter the attack. The program can be further implemented in different testing environments and the WMI concept can be applied to various other cyber hacks.
Los estilos APA, Harvard, Vancouver, ISO, etc.
14

Brown, Barry, Minna Vigren, Asreen Rostami y Mareike Glöss. "Why Users Hack: Conflicting Interests and the Political Economy of Software". Proceedings of the ACM on Human-Computer Interaction 6, CSCW2 (7 de noviembre de 2022): 1–26. http://dx.doi.org/10.1145/3555774.

Texto completo
Resumen
It is often assumed that the interests of users and developers coincide, sharing a common goal of good design. Yet users often desire functionality that goes beyond what designers, and the organisations they work in, are willing to supply. Analysing online forums, complemented with interviews, we document how users, hackers and software developers worked together to discover and apply system exploits in hardware and software. We cover four cases: users of CPAP breathing assistance machines getting access to their own sleep data, 'hacking' the Nintendo switch game console to run non-authorised software, end-users building their own insulin supply system, and farmers repairing their own agriculture equipment against suppliers terms and conditions. We propose the concept of the 'gulf of interests' to understand how differing interests can create conflicts between end-users, designers, and the organisations they work in. This points us in the direction of researching further the political and economic situations of technology development and use.
Los estilos APA, Harvard, Vancouver, ISO, etc.
15

Sendi Novianto, Setyo Budi, Farrikh Al Zami, Sasono Wibowo, Achmad Wahid Kurniawan y Budi Widjajanto. "PELATIHAN & SIMULASI CRACK VS HACK 1.0 DI SMA NEGERI 3 SEMARANG". Jurnal Layanan Masyarakat (Journal of Public Services) 6, n.º 2 (9 de septiembre de 2022): 385–94. http://dx.doi.org/10.20473/jlm.v6i2.2022.385-394.

Texto completo
Resumen
Dari seluruh SMA yang ada di Kota Semarang, ada salah satu SMA yang merupakan SMA terbaik di kota ini, yaitu SMA Negeri 3 Semarang. Namun demikian SMA ini tetap berusaha memajukan keterampilan dan pengetahuan siswa dan guru, yaitu dengan cara berkolaborasi dengan instansi lain dengan mengadakan pelatihan dibidang teknologi informasi yang isi materinya meliputi crack, hack, sosial media, industri inovatif, data mining, dan yang lainnya. Kolaborasi ini diadakan dengan tujuan agar SMA tersebut dapat sejajar dengan SMA terbaik lainnya dalam menyongsong perkembangan teknologi informasi dunia yang semakin pesat perkembangannya. Salah satu cara untuk menghadapi perkembangan teknologi global adalah diperlukan pelatihan, penyuluhan, dan simulasi. Pada pelatihan ini, crack vs hack merupakan pengetahuan yang perlu diajarkan kepada siswa agar terjadi peningkatan kompetensi secara signifikan. Cracking adalah perusakan yang dilakukan dan merugikan orang lain. Sedangkan hacking, meski juga bisa merusak dan memanipulasi data, tapi dilakukan tanpa merugikan orang lain. Kegiatan pengabdian diawali dengan wawancara dan survei di SMA Negeri 3 Semarang, kemudian menentukan materi yang akan disampaikan, dilanjutkan kegiatan pelatihan dan simulasi serta evaluasi kegiatan. Hasil dari pengabdian masyarakat ini adalah guru dan siswa akan memahami crack vs hack dan materi-materi yang dihadirkan sudah dipilih sedemikan rupa sehingga sesuai dengan kebutuhan dari SMA Negeri 3 Semarang.
Los estilos APA, Harvard, Vancouver, ISO, etc.
16

Akhtar, Naveed. "Latest trends in the Cybersecurity after the solar wind hacking attack". Foundation University Journal of Engineering and Applied Sciences <br><i style="color:yellow;">(HEC Recognized Y Category , ISSN 2706-7351)</i> 1, n.º 2 (24 de marzo de 2021): 14–24. http://dx.doi.org/10.33897/fujeas.v1i2.347.

Texto completo
Resumen
That dominance, in any case, has gotten to be a risk. On Sunday, Solar Winds alarmed thousands of its clients that an “outside country state” had found a back entryway into its most well-known item, an instrument called Orion that makes a difference organizations screen blackouts on their computer systems and servers. The company uncovered that programmers snuck a malevolent code that gave them inaccessible get to customers’ systems into an upgrade of Orion. The hack started as early as Walk, Solar Winds conceded, giving the programmers bounty of time to get to the customers’ inside workings. The breach was not found until the unmistakable cybersecurity company FireEye, which itself employments Solar Winds, decided it had experienced a breach through the program. FireEye has not freely faulted that breach on the Solar Winds hack, but it allegedly affirmed that was the case to the tech location Krebs On Security on Tuesday. FireEye depicted the malware’s bewildering capabilities, from at first lying torpid up to two weeks, to stowed away. That was December 13, 2020. FireEye gauges programmers to begin with picked up get to in Walk 2020. For about eight months, malevolent on-screen characters carted absent untold sums of touchy information from contaminated organizations — and the total scope of the breach is still unfolding. Despite Microsoft seizing the code’s command and control server (a common component in botnet assaults as well), a few security specialists think the assailants may still have get to the Solar Winds Orion program system. Others are conjecturing that these programmers cleared out behind extra, yet-to-be-seen malevolent code.
Los estilos APA, Harvard, Vancouver, ISO, etc.
17

Natho, Parinya, Suwit Somsuphaprungyos, Salinun Boonmee y Sangtong Boonying. "Comparative study of password storing using hash function with MD5, SHA1, SHA2, and SHA3 algorithm". International Journal of Reconfigurable and Embedded Systems (IJRES) 13, n.º 3 (1 de noviembre de 2024): 502. http://dx.doi.org/10.11591/ijres.v13.i3.pp502-511.

Texto completo
Resumen
<span>The main purpose of passwords is to prevent unauthorized people from accessing the system. The rise in internet users has led to an increase in password hacking, which has resulted in a variety of problems. These issues include opponents stealing a company's or nation's private information and harming the economy or the organization's security. Password hacking is a common tool used by hackers for illegal purposes. Password security against hackers is essential. There are several ways to hack passwords, including traffic interception, social engineering, credential stuffing, and password spraying. In an attempt to prevent hacking, hashing algorithms are therefore mostly employed to hash passwords, making password cracking more difficult. In the suggested work, several hashing techniques, including message digest (MD5), secure hash algorithms (SHA1, SHA2, and SHA3) have been used. They have become vulnerable as a result of being used to store passwords. A rainbow table attack is conceivable. Passwords produced with different hash algorithms can have their hash values attacked with the help of the Hashcat program. It is proven that the SHA3 algorithm can help with more secure password storage when compared to other algorithms.</span>
Los estilos APA, Harvard, Vancouver, ISO, etc.
18

Bradbury, Victoria y Suzy O'Hara. "Reframing Innovation". Media-N 15, n.º 2 (29 de julio de 2019): 5–19. http://dx.doi.org/10.21900/j.median.v15i2.76.

Texto completo
Resumen
This paper outlines five presentations delivered by invited panelists during Reframing Innovation: Art, the Maker Movement and Critique, our New Media Caucus affiliated panel at the CAA Conference, February 2019, New York City. The panel developed from our co-edited volume, Art Hack Practice(forthcoming, Routledge) which investigates global art hacking practices employed by individuals and groups who are working within, around or against the phenomenon known as ‘maker culture’ as artists, designers, curators and historians. Each presentation offers a distinct account of contemporary art practices that reveal the many manifestations, characteristics and dialogs around current art hacking practices. By publishing these talks here, we aim to provide readers with new insights into projects that challenge perceived distinctions between sites of artistic and economic production by brokering new, direct ways of working between them, thereby challenging traditional understandings of the role and place of the art in society.
Los estilos APA, Harvard, Vancouver, ISO, etc.
19

Bellaby, Ross W. "An Ethical Framework for Hacking Operations". Ethical Theory and Moral Practice 24, n.º 1 (12 de febrero de 2021): 231–55. http://dx.doi.org/10.1007/s10677-021-10166-8.

Texto completo
Resumen
AbstractIn recent years the power and reach of prominent hacker groups such as Anonymous and LulzSec has been clearly demonstrated. However, in a world where hackers are able to wield significant online power, can they do so ethically as legitimate agents? To answer this question this paper will develop an ethical framework based on the premise that hackers have exhibited instances where they have acted to protect people from harm at a time when there was no one else to do so. At its core this paper will argue that political hacking can be justified when it is done to protect the vital interests of oneself or others. Moreover, it will also argue that just because hackers are outside the state does not automatically discount them as ethical actors and that when the state fails to protect people – whether it is due to a lack of ability, political will or because the state is the source of the threat – hackers can fill the void. In order to achieve this, first it is necessary to highlight the space for hackers to operate; second, guide hacker activity by creating an ethical framework detailing what actions are justified towards what end; third, to offer mechanisms that can aid in reaching these ethically justified decisions; and as a result, inform further ethical debates on how to react to these political hackers. This means that the framework can be used to both justify and condemn hacking depending on the circumstances, allowing those on the outside to distil and evaluate a political hack, both past and present, while guiding hacker collectives by providing clearer ethical tools for determining the appropriate agendas and methods.
Los estilos APA, Harvard, Vancouver, ISO, etc.
20

Charnley, P. M. C. "Hack-gate: examining the phone-hacking scandal and its repercussions for press regulation in the UK". Journal of Intellectual Property Law & Practice 7, n.º 3 (16 de febrero de 2012): 211–19. http://dx.doi.org/10.1093/jiplp/jpr218.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
21

Thavarajah, Nathan y Miriam Fenkes. "Hacked kestrels (<em>Falco tinnunculus</em>) show similar patterns of post-fledging food dependency as wild reared birds: implications for best practice in release management of orphaned raptors". Wildlife Rehabilitation Bulletin 40, n.º 1 (7 de octubre de 2022): 1–7. http://dx.doi.org/10.53607/wrb.v40.243.

Texto completo
Resumen
One of the challenges of wildlife rehabilitation is ensuring that rehabilitated animals have the required characteristics for survival after release. This is especially the case for orphaned animals that normally develop survival skills during a prolonged period of parental care. For raptors, this is called the post-fledging dependency period (PDP), where parents provide nutritional support to juveniles whilst they develop the physiological and behavioural characteristics required to successfully hunt prey. Orphaned raptors can be rehabilitated and released using a method termed “hacking,” a type of “soft-release” where fledglings are released from a nest box, which they learn to associate with food. This method gives the birds an opportunity to develop prey capture skills, whilst continued nutritional support is provided by rehabilitators at the box. Here, we used a hacking method to rehabilitate and release 15 orphaned kestrels (Falco tinnunculus) and observed the pattern of return to the hacking box. Of the released birds, 80% returned to the hack site for food at least once. The average number of days birds returned to the box was 12.67 ± 8.76, and there was a clear trend towards a gradual decrease in return rate (number of visits to the box per day) over time. Our observations are comparable to patterns of PDP in wild-reared kestrels and we therefore suggest that orphaned kestrels can be successfully rehabilitated in this way.
Los estilos APA, Harvard, Vancouver, ISO, etc.
22

Ferretti, Silva. "Hacking by the prompt: Innovative ways to utilize ChatGPT for evaluators". New Directions for Evaluation 2023, n.º 178-179 (junio de 2023): 73–84. http://dx.doi.org/10.1002/ev.20557.

Texto completo
Resumen
Abstract“Hacking by the prompt”—writing simple yet creative conversational instructions in ChatGPT's message window—revealed many valuable additions to the evaluator's toolbox for all stages of the evaluation process. This includes the production of terms of reference and proposals for the dissemination of final reports. ChatGPT does not come with an instruction book, so evaluators must experiment creatively to understand its potential. The surprising performance of ChatGPT leads to the question: will it eventually substitute for evaluators? By describing ChatGPT through four personality characteristics (pedantic, “I know it all,” meek, and “speech virtuoso”), this article provides case examples of the potential and pitfall of ChatGPT in transforming evaluation practice. Anthropomorphizing ChatGPT is debatable, but the result is clear: tongue‐in‐cheek personality characteristics helped hack ChatGPT more creatively while remaining aware of its challenges. This article combines practical ideas with deeper reflection on evaluation. It concludes that ChatGPT can substitute for evaluators when evaluations mostly focus on paperwork and conventional approaches “by the book” (an unfortunate trend in the sector). ChatGPT cannot substitute engagement with reality and critical thinking. Will ChatGPT then be a stimulus to rediscover the humanity and the reality we lost in processes?
Los estilos APA, Harvard, Vancouver, ISO, etc.
23

Thackray, Helen. "Research spotlight – Hackers gonna hack: Investigating the effect of group processes and social identities within online hacking communities". Social Psychological Review 21, n.º 1 (2019): 8–9. http://dx.doi.org/10.53841/bpsspr.2019.21.1.8.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
24

Ash, Rachel. "Untextbooking for the CI Latin class: why and how to begin". Journal of Classics Teaching 20, n.º 39 (2019): 65–70. http://dx.doi.org/10.1017/s2058631019000114.

Texto completo
Resumen
When I first dreamed about leaving my textbook behind in any serious manner, the thought was spurred by a post authored by Audrey Watters in her blog Hack Education, ‘Hacking the Textbook (Open).’ In her post, Watters describes an event in which teachers are trained to create, cultivate, and collectively share their own curriculum content. I had already spent years modifying my textbook to make it work with the way I teach, and while I still believe that it is the best textbook for a Comprehensible Input-based class, I found myself struggling more and more against the book the further students progressed just to maintain a semblance of comprehensibility. Whether or not the text was compelling—another pillar of Comprehensible Input—was not even a concern at that point.
Los estilos APA, Harvard, Vancouver, ISO, etc.
25

Tan, Edna y Angela Calabrese Barton. "Hacking a Path into and through STEM: Exploring how Youth Build Connecting Pathways between STEM-Related Landscapes". Teachers College Record: The Voice of Scholarship in Education 122, n.º 2 (febrero de 2020): 1–44. http://dx.doi.org/10.1177/016146812012200211.

Texto completo
Resumen
Background/Context Minoritized youth from historically marginalized backgrounds continue to face systemic inequities in STEM. Existing strategies aimed at increasing diversity in STEM, which are guided by the STEM “pipeline” metaphor and are deficit-oriented, have yielded lackluster results. Purpose/Objective/Research Questions/Focus of Study This paper investigates how mi-noritized youth attempted to build connecting pathways between STEM-related worlds, how such attempts unfolded, and the resultant outcomes pertaining to their developing STEM expertise and subsequent STEM engagement. We introduce the idea of pathhacking, where youth had to create their own pathways into STEM, often with improvised tools and in treacherous territory, because there were no pre-laid paths. Research Design/Data Collection and Analysis Data were drawn from longitudinal critical ethnography of 48 youths across STEM-engagement spaces, in both community and formal school spaces. Attention is paid to the particular resources, both relational and material, and the barriers that affect youths’ efforts to hack pathways toward deeper and more connected engagement in STEM. Spaces included school classrooms, school settings, after-school STEM programs held in community clubs, other spaces in communities such as residential neighborhoods, and local universities. Findings/Results Three broad claims are presented: (a) Pathhacking involves youth engaging in practices that challenge and expand ways of being in STEM-related spaces; (b) Pathhacking practices, when coordinated through social activity, reorganize social worlds for both individuals and collectives, expanding future pathhacking possibilities; (c) To aid in pathhacking, youth utilize tools including critical STEM-mobility artifacts and allies as brokers across scales of activity. Conclusions The current U.S. education-policy climate focuses attention on student achievement in individual subject areas, highlighting the achievement gap. We illustrate the challenges minoritized youth face as they seek more consequential STEM engagement through hacking connecting pathways. Institutions, people, tools, and practices—all imbued with and embedded in histories—have structured these youths’ opportunities to hack connecting pathways and have also provided points of access and resistance for the youth to resist mar-ginalization during the process.
Los estilos APA, Harvard, Vancouver, ISO, etc.
26

Shanmuga Priya, S., Dr A.Valarmathi, M. Rizwana y Dr L.Mary Gladence. "Enhanced Mutual Authentication System in Mobile Cloud Environments". International Journal of Engineering & Technology 7, n.º 3.34 (1 de septiembre de 2018): 192. http://dx.doi.org/10.14419/ijet.v7i3.34.18962.

Texto completo
Resumen
Security is one of the significant worries of all associations which utilizes online methods for interchanges particularly banks. Of this, customer side is most defenseless against hacking, as the framework can't be totally shut when use over web by a typical customer is to be permitted. Most frameworks utilize a static password– based verification strategy which is anything but difficult to hack. There are different other validation strategies existing like cards, biometric recognizable proof, and so on. These strategies give better security, however are not material to online customer correspondence as these techniques require extraordinary gadgets for their usage. One conceivable technique for applying an upgraded factor of verification for online access to the framework is a dynamic secret word. In this venture we can plan the validation framework in light of key age, confirmation age and OTP based framework. The keys are created progressively utilizing Mobile IMEI number and SIM card number. The OTP age utilizes the components that are novel to the client and is introduced on a PDA in Android stage and furthermore cloud server claimed by PHP server. An OTP is legitimate for a minutes time, after which, is pointless. The framework in this way gives better customer level security – a straightforward minimal effort strategy which shields framework from hacking strategies, for example, speculating assault, answer assault, stolen and verifier assault and adjustment assault.
Los estilos APA, Harvard, Vancouver, ISO, etc.
27

K Prabu, Et al. "Security Privacy Process Involvement in Cloud Security for Data Preservation against Data Malicious Activity". International Journal on Recent and Innovation Trends in Computing and Communication 11, n.º 10 (2 de noviembre de 2023): 1572–83. http://dx.doi.org/10.17762/ijritcc.v11i10.8709.

Texto completo
Resumen
Cloud data sent from the person is attacked, leading to data hacking. Data classification can be made by malware detection, leading to the data warehouse technique and data storage. The cloud data from a particular internet protocol address cannot be hacked. Only random cloud data is hacked. Even though this leads to some illegal issues. The method of managing the cloud data and maintaining the factor to hack illegal cloud data has been proposed. The method of malware detection and ML-based end-to-end malware detection are used in calculating the time efficiency. The malware detection and defence method has been introduced for managing the data tracking and the system's formation to hack unwanted data. The time efficiency calculation for the data transmitted in the network has been enabled for the cloud data sent and received. The data from each router makes the data store 12% of the unwanted compared to the original messages. The factor for managing the individual aspect to produce the data is 30% of the database. This will contain 20% of the data in formulating the cloud storage system, which makes the data classifications. 4% of redundant data from the database has been enveloped for the data classifications. Meanwhile, the data attack can be evaluated using the malware detector and also manages classification method for evaluation of data and formation of the system to produce data from the appearance of Secure data clouds.
Los estilos APA, Harvard, Vancouver, ISO, etc.
28

Dreessen, Katrien, Selina Schepers y Danny Leen. "From Hacking Things to Making Things. Rethinking making by supporting non-expert users in a FabLab". Interaction Design and Architecture(s), n.º 30 (20 de septiembre de 2016): 47–64. http://dx.doi.org/10.55612/s-5002-030-003.

Texto completo
Resumen
When discussing maker culture, much attention is dedicated to how making can be beneficial for specific fields (e.g. healthcare, education) or various communities of makers (e.g. educators, crafters). The democratic ideal of personal fabrication and the maker culture movement – represented by the growth of open makerspaces (e.g. FabLabs, makerspaces) and online communities (e.g. ‘Instructables’, ‘Thingiverse’) worldwide – provides everyone with the opportunity to make (almost) anything. However, structurally engaging non-expert users still remains an important challenge for most open makerspaces. Therefore, this article focuses on the potential of open makerspaces for communities and – more specifically – how to involve non-expert users in these open makerspaces. Framed within the fields of Participatory Design and infrastructuring, this article presents two case studies – ‘Hack-a-thing’ and ‘Making Things’ – that are part of a long-term participation process of engaging local non-expert users in FabLab [anonymized]. In these cases, the involved non-expert users entailed teenagers, children and their supervisors (for instance, supervisors involved in participating youth organisations). The case studies show that building relations with existing communities of non-expert users and creating conditions for them to self-organise their activities within open makerspaces are essential starting points for processes of long-term engagement.
Los estilos APA, Harvard, Vancouver, ISO, etc.
29

Bilgin, Adem. "Elhik’s Metamathematics and the robot Philia: Internet Communication Protocol Modelling of Observeds according to Observers". European Journal of Artificial Intelligence and Machine Learning 1, n.º 2 (22 de marzo de 2022): 1–10. http://dx.doi.org/10.24018/ejai.2022.1.2.3.

Texto completo
Resumen
Like all robot and IoT oriented mathematical studies this study is also transdisciplinary however most of the study remains in the field of mathematics and philosophy of mathematics due to the aim of mathematical modelling of the observations: a) protein synthesis by the information encoded in DNA and b) communication protocols of hacking software with encryption of IP of computers c) the process of DNA duplication to offspring formation in asexual and sexual reproduction. The ultimate mathematical aim of this study is providing a metamathematical approach for different types of mathematics to be utilized in information sciences by forced or free choice of artificial intelligence driven technological beings and computational systems. This study is biomathematically inspired from protein synthesis, cellular reproduction, DNA duplication, bacterial simple cell division, bacterial sex and zygote formation in human and mammalian fertilization; and all are modelled as moving pieces of quantized information. The ultimate robotic aim is finding an algorithm for data off-springs, thus the formation of the data-offspring in the form of living being off-springs’ DNA is chosen to be mathematically described. For this purpose, a new mathematics with new mathematical operations and a definition to mathematics are postulated, together with twelve postulations about the real-life observations. The introduced Aydan operation is synthesizing fuzzy logic based mathematical existence possibilities into abstract formal logic based abstract mathematical categories to be analyzed with additional color codes for each object, whereas deAydan operation is doing the opposite by analyzing a given synthesis. There is a coexistence of mathematical objects and operators in the biological cells. The co-existence of objects and mathematical operations in a given mathematics M, are axiomatically chosen to be a satisfiability rule for M to be accepted as mathematics in the form of a universal set isolated from other universal sets. Aydan function can be used for hacking other AI by deviating its results by merging them with forced formal logic based analytic input by another hacking software, and deAydan function can be used as anti-hack in the opposite direction. The metamathematical existence degree of a given mathematics is shown to be between zero and infinite dimensions. ELHIK is an abbreviation of the words El Harizmi and Immanuel Kant.
Los estilos APA, Harvard, Vancouver, ISO, etc.
30

Reflinaldi, Reflinaldi, Bobbi Aidi Rahman, Awliya Rahmi y Melisa Rezi. "Hacking Threat in Arab Cyberspace: How al-Hākirz al-Muslimūn Construct Narratives against Zionists and Anti-Islamists". Arabiyatuna: Jurnal Bahasa Arab 7, n.º 2 November (17 de noviembre de 2023): 457. http://dx.doi.org/10.29240/jba.v7i2.8156.

Texto completo
Resumen
The attack on the al-Aqsa mosque on April 6, 2023, and the burning of the Qur'an on January 21, 2023, have sparked a reaction from hacker group who call themselvesالهاكرز المسلمون (al-hākirz al-muslimūn) 'Muslim Hackers' (MH). Through the “Hacker News” YouTube channel, they threaten to hack several strategic and vital facilities of the Israeli and Swedish governments. About this phenomenon, this study aims to explain the construction of their threat narratives to those whom they call Zionists and anti-Islamists. Explanative qualitative research was conducted to answer research questions consisting of the formulation of themes, sequence of the scheme, and micro linguistic elements. Research data in the form of 2 videos of MH hacking threats were collected through manual transcription, reading and observation, printing, selection, and classification. Meanwhile, data analysis through the stages of reduction, presentation, analysis, interpretation, and conclusion was carried out by referring to Teun van Dijk's discourse structure model as an analytical framework. The results of the thematic structure analysis show that the theme highlights the actions as a response to attacks on Muslims and Islamic sacred symbols. MH asserts their identity as Muslims explicitly on the theme to attract the audience's attention. In line with these findings, the results of the schematic structure analysis show that the MH threat narrative scheme consists of the cause of threat, form of threat, detail of threat, and impact of threat. Microstructure analysis shows that MH uses clause structures, meaning intentions, and speech acts to launch psychological warfare against Zionists and anti-Islamists. Through this narrative, MH spreads fear with the target of putting political pressure on the Israeli and Swedish governments. Observing the increasingly massive and dynamic phenomenon of cyber warfare, it is predicted that MH's hacking threat narratives will often be found in conflicts and political dynamics in various countries.
Los estilos APA, Harvard, Vancouver, ISO, etc.
31

Guterres, Lilia Ervina Jeronimo y Ahmad Ashari. "THE ANALYSIS OF WEB SERVER SECURITY FOR MULTIPLE ATTACKS IN THE TIC TIMOR IP NETWORK". IJCCS (Indonesian Journal of Computing and Cybernetics Systems) 14, n.º 1 (31 de enero de 2020): 103. http://dx.doi.org/10.22146/ijccs.53265.

Texto completo
Resumen
The current technology is changing rapidly, with the significant growth of the internet technology, cyber threats are becoming challenging for IT professionals in the companies and organisations to guard their system. Especially when all the hacking tools and instructions are freely available on the Internet for beginners to learn how to hack such as stealing data and information. Tic Timor IP is one of the organisations involved and engaged in the data center operation. It often gets attacks from the outside networks. A network traffic monitoring system is fundamental to detect any unknown activities happening within a network. Port scanning is one of the first methods commonly used to attack a network by utilizing several free applications such as Angry IP Scan, Nmap and Low Orbit Ion Cannon (LOIC). On the other hand, the snort-based Intrusion Detection System (IDS) can be used to detect such attacks that occur within the network perimeter including on the web server. Based on the research result, snort has the ability to detect various types of attack including port scanning attacks and multiple snort rules can be accurately set to protect the network from any unknown threats.
Los estilos APA, Harvard, Vancouver, ISO, etc.
32

Banda, Raphael, Jackson Phiri, Mayumbo Nyirenda y Monica M. Kabemba. "Technological Paradox of Hackers Begetting Hackers: A Case of Ethical and Unethical Hackers and their Subtle Tools". Zambia ICT Journal 3, n.º 1 (7 de marzo de 2019): 40–51. http://dx.doi.org/10.33260/zictjournal.v3i1.74.

Texto completo
Resumen
Computer crimes have been in existence for a long time now and hacking is just another way or tool that hackers are now using to perpetrate crime in different form. Hackers Beget Ethical Hackers. A number of people have suffered the consequences of hacker actions. We need to know who these hackers are. We need to know why these hackers exist because hackers have been there and will be there and we can be victims of their existence. In essence hackers seem to beget hackers and the tools that they use are getting more and more advanced by the day. We shall take a quick analysis of selected tools from thousands of tools used by ethical and unethical hackers.We shall systematically review three major types of hackers that we can identify. It is not easy to draw a line between them. Three main hackers and minor hackers have been discussed in this paper. The three main hackers are black hat, grey hat and white hat hackers.We have adopted a systematic review of literature to discuss and analyse some of the common tools the black hat hackers have developed to hack into selected systems and commercial software and why they do it?
Los estilos APA, Harvard, Vancouver, ISO, etc.
33

Hancocks, Stephen. "Hacks, hackers and hacking". British Dental Journal 211, n.º 2 (julio de 2011): 51. http://dx.doi.org/10.1038/sj.bdj.2011.576.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
34

Hasan, Hind Ali Abdul, Safaa Maijd Mohammed y Noor Hayder Abdul Ameer. "ADVANCED ENCRYPTION STANDARD USING FPGA OVERNETWORK". EUREKA: Physics and Engineering, n.º 1 (29 de enero de 2021): 32–39. http://dx.doi.org/10.21303/2461-4262.2021.001613.

Texto completo
Resumen
The increase number of eavesdropping or cracker to attack the information and hack the privacy of people. So, the essential issue is making system capable of ciphering information with rapid speed. Due to the advance in computer eavesdropping and cracker that made them to analysis the way of ciphering in rapid speed way. The development in the computer especially in the rapid processer in the last decade create the breaching of any system is a matter of time. Owing to most of breaching ways are based on analysis of system that requireы to be breached and to try brute force on that system to crack it. However, the lacking of influential processers that are capable of breaching system since earlier processors are limit to number of instructions. It can be done in second, which was not sufficient trying to break the system using brute force. In addition, the time required is far away from getting valuable messages in the time that needed. So, the research gives the focus on performing rapid system for ciphering the information rapidly and changing the ciphering every few milliseconds. The changing of ciphering in every millisecond helps system form preventing the eavesdropping and cracker from imposing brute force on the system and hacking the messages and images. The system that created is based on Advanced Encryption Standard (AES), which is it very best performing algorithm in ciphering and deciphering since it doesn’t need complex mathematical formula. The research is about designing system that capable of performing AES by using high processer designed on Field programmable gate Area (FPGA). The ciphering of AES using FPGA helps minimize the time required to cipher the information. Also, the research will focus on ciphering and deciphering of images by AES using FPGA
Los estilos APA, Harvard, Vancouver, ISO, etc.
35

Herskovitz, Jaylin. "DIY Assistive Software: End-User Programming for Personalized Assistive Technology". ACM SIGACCESS Accessibility and Computing, n.º 137 (enero de 2024): 1. http://dx.doi.org/10.1145/3654768.3654772.

Texto completo
Resumen
Existing assistive technologies often fail to support the unique and personalized needs of blind and visually impaired (BVI) people. Thus, BVI people have become domain experts in customizing and 'hacking' assistive technology in order to creatively suit their needs. However, current assistive technologies are difficult to hack and alter at the individual level due to the skill and resources required. Due to these challenges, new approaches to supporting Do-It-Yourself (DIY) technology creation are needed to make applying the DIY concept to high-tech assistive technologies for BVI people more feasible. Through my dissertation, I aim to better support DIY assistive software design and development, so that BVI people can design, create, and customize assistive software for themselves and their communities. To accomplish this, I plan to address three primary research goals. First, through qualitative interviews, I present an understanding of why and how BVI people engage in assistive technology customization and adaptation, and the challenges and opportunities that arise from this practice. Second, I aim to investigate how end-user programming can be applied as an approach to DIY assistive technology creation, by designing, building, and evaluating a prototype end-user programming tool. Finally, I aim to understand and improve the real-world feasibility of end-user programming in this domain, by designing tools to improve the accessibility of debugging visual technologies. By addressing these primary research questions, my planned dissertation contributes to the HCI and accessibility community's understanding of DIY assistive software, accessible end-user programming, and accessible debugging techniques. By supporting BVI in creating and modifying their assistive software, this research aims to promote the democratization of technology creation and support BVI people in having greater control over AI-based technologies in their lives.
Los estilos APA, Harvard, Vancouver, ISO, etc.
36

Sriman, B. y Venkat Sai Sujan Kandregula. "The Next level of Security Scalable Solution Blockchain (SSSB) in Satellite Communication System". Journal of Physics: Conference Series 2335, n.º 1 (1 de septiembre de 2022): 012063. http://dx.doi.org/10.1088/1742-6596/2335/1/012063.

Texto completo
Resumen
Abstract Data security is one of the topmost priorities for government organisations and multinational companies. In particular, extremely sensitive data is regularly transferred between different branches of the government and the military. Hacking and interruption of data transmission of such high-level data transfers can pose a huge risk to the security of a country and to its integrity as well. The method that the article proposes has been implemented on a smaller scale for cryptocurrency transactions by the organisation “Blockstream”. This study serves the purpose of exploring a new use case of blockchain technology using satellite communication in order to establish an extremely secure and very high-speed data transmission connection between two parties. In this idea, the required sensitive data that is to be transferred to another party, sends the data through blockchain method of data transfer. This data is sent to the satellite where the satellite behaves as a node of data transmission in this blockchain connection and the private key is also encoded into the satellite software making it impossible in attempting to hack the encryption of the private key. When the satellite receives this data, it verifies the authenticity of the sender and analyses the encryption of the data. Then this data will be transmitted to its designated receiver. Once the data is received, it will be converted from blockchain to the regular data packets and the information can be shared within its local network. In this article, we explore further about the technology that’s being used to implement the connection from about the technology that’s being used to implement the connection from the ground station to the satellite via blockchain in the present day. The results produced by this article will help in attaining uncompromising security and speed of data transmission which will put an end to the tensions faced by higher authorities while sharing highly classified data.
Los estilos APA, Harvard, Vancouver, ISO, etc.
37

Tsybulnyk, Serhii, Dmytro Zubarskyi y Diana Pivtorak. "APPLIED SOFTWARE FOR PERSONAL INFORMATION STORAGE". Bulletin of the National Technical University «KhPI» Series: New solutions in modern technologies, n.º 1(15) (5 de mayo de 2023): 53–59. http://dx.doi.org/10.20998/2413-4295.2023.01.07.

Texto completo
Resumen
In today's world, the personal information of any person can be conventionally divided into two large categories: general and special. As you can understand from the name, the first category is responsible for the type of data that can be found in public access, namely: surname, first name, patronymic, signature, place and date of birth, citizenship, marital status, education, bank details, etc. Such a variety of personal data requires different methods and automated means of storage. Today, private and state institutions increasingly refuse to store information in paper form. This is explained by the low level of security of such storage facilities, which can be affected by fire, water, pests, etc. Information that exists in paper form is very easy to lose, for example, misplaced or lost during movement. It is shown that digital storage of information makes it possible to get rid of such problems. Personal data that is stored electronically can often be recovered even if the device from which it was accessed is lost. One of the main types of personal information in modern society is login data: login and password. That is why the algorithmic and software of the automated system for saving the user's personal data was developed. This system should enable the user to generate passwords resistant to standard hacking methods and store them in the database. The development of the automated system took place using the MVC architectural template, which is one of the options for implementing a multi-level architectural model. For detailed design and coding, an object-oriented Java programming language with static strict typing was chosen. It was also decided to develop an automated system in the form of a web application using the Spring framework. During the development process, a local database was designed, which will store personal data in the form of logins and passwords entered by the user or generated by the system itself. An algorithm for generating hack-resistant passwords has been developed. Hash algorithms are also used as an additional protection of the main password of the web application. A graphical interface has been created that allows the user to access the main functions of the automated system.
Los estilos APA, Harvard, Vancouver, ISO, etc.
38

Sarkar, Sanchar y Swarnalatha Rangarajan. "“Do you think it is a Pandemic?” Apocalypse, Anxiety and the Environmental Grotesque in Paolo Bacigalupi’s The Windup Girl". Interlitteraria 27, n.º 1 (1 de septiembre de 2022): 69–83. http://dx.doi.org/10.12697/il.2022.27.1.7.

Texto completo
Resumen
Paolo Bacigalupi’s The Windup Girl (2009), set in the post fossil-fuel, post turbo-capitalist country of Thailand, portrays the shocking after effects of bioengineering and gene-hack modifications in food crops. The narrative depicts a country tottering on the brink of an agricultural apocalypse on account of food production being severely affected by crop driven anomalies and rogue diseases such as “cibiscosis” and “blister rust” transmitted by variants of mutating pests. Natural seed stock becomes completely supplanted by the new genetically engineered seeds which become sterile after a single seasonal cycle of sowing and harvesting. The native population of Thailand is adversely affected by the pandemic scenario, which becomes aggravated by an expedient “scientocracy” that is at the heart of the neocolonial enterprises of American megacorporations and calorie companies like Agrigen, PurCal and Redstar who hail gene hacking as the new future of food resources and market profiteering. The consumption of the gene-hacked produce spreads through crops and affects the human body in unimaginable ways thereby resulting in a considerable rise of health issues including digestive and respiratory failures. This paper intends to articulate the idea of a pandemic, its historical understanding and affective influences in the context of a post techno-fossil fuel economy set in Thailand. It will analyse the idea of epidemiological colonialism; diseases introduced by colonising forces that reshape the natives’ existing environment thereby bringing forth a deep pandemic anxiety that percolates the collective memory of the Thai people. It also highlights how the novel portrays the conflict between traditional ecological knowledge systems and modern extractive enterprises that acts as a catalyst to hasten the destruction of sustainable systems of agriculture and food production that have endured the impact of climate change and ecological fallout. The paper will study the relevance of the pandemic as an agency of ecocatastrophe and its function in an eco-speculative science fictional narrative. Finally, the paper looks into the concept of the posthuman android, genetically modified humans in a “technologiade”, a society reconfigured by technoscience to resist the impact of environmental collapse, and explores how this trope is incorporated in Bacigalupi’s narrative to celebrate human striving for hope and survival in an imagined environmental future marked by a self-created agro-scientific grotesqueness.
Los estilos APA, Harvard, Vancouver, ISO, etc.
39

Pramana, Taufik Agung y Yudi Ramdhani. "Sentiment Analysis Tanggapan Masyarakat Tentang Hacker Bjorka Menggunakan Metode SVM". Jurnal Nasional Komputasi dan Teknologi Informasi (JNKTI) 6, n.º 1 (20 de febrero de 2023): 49–62. http://dx.doi.org/10.32672/jnkti.v6i1.5583.

Texto completo
Resumen
Abstrak— Pada pertengahan tahun 2022, Indonesia dibuat gempar oleh kehadiran hacker dengan nama Bjorka, pasalnya Bjorka berhasil meretas situs Kementrian Komunikasi dan Informatika (KEMKOMINFO). Bjorka tidak melakukan aksinya satu atau dua kali, namun sering kali Bjorka membuat gempar seluruh masyarakat Indoneisa. Bagaimana tidak, selain meretas situs Kementrian Komunikasi dan Informatika, Bjorka juga berhasil mencuri dokumen rahasia milik Badan Intelejen Negara (BIN). Selain berhasil mencuri, Bjorka juga tidak ragu untuk menyebarluaskan dokumen rahasia tersebut dalam berupa kalimat di sosial media Twitter. Salah satu isu dokumen rahasia milik Indonesia yang Bjorka bocorkan adalah mengenai kasus pembunuhan Munir. Sebagai negara yang memiliki 19,5 juta pengguna aktif Twitter, tentunya hashtag Bjorka sering kali menduduki peringkat teratas, ini berarti banyak dari masyarakat di Twitter yang membicarakan Bjorka dalam cuitan Twitternya. Pada cuitan Twitter tersebut kita bisa menemukan banyak komentar positif dan komentar negatif. Penulis menggunakan metode Support Vector Machine untuk mengetahui apakah tanggapan masyarakat di Twitter termasuk positif atau negatif. Berdasarkan hasil analisis, akurasi terbaik didapatkan yaitu metode SVM dalam sentiment analysis tanggapan masyarakat Indonesia tentang Hacker Bjorka dibandingkan metode NBC.Kata Kunci: Analisis sentimen, SVM, Bjorka Abstract— In mid-2022, Indonesia was shocked by the presence of a hacker named Bjorka, because Bjorka managed to hack the Ministry of Communication and Information (KEMKOMINFO) website. Bjorka didn't do it once or twice, but Bjorka often caused an uproar among Indonesian people. How could it not be, besides hacking the Ministry of Communication and Informatics website, Bjorka also managed to steal confidential documents belonging to the State Intelligence Agency (BIN). Apart from being successful in stealing, Bjorka also did not hesitate to disseminate these secret documents in the form of sentences on social media Twitter. One of the issues of secret documents belonging to Indonesia that Bjorka leaked was regarding the Munir murder case. As a country with 19.5 million active Twitter users, of course, the hashtag Bjorka often tops the rankings. This means that many people on Twitter talk about Bjorka in their Twitter tweets. On the Twitter tweet, we can find many positive comments and negative comments. The author uses the Support Vector Machine method to find out whether people's responses on Twitter are positive or negative. Based on the results of the analysis, the best accuracy was obtained, namely the SVM method in sentiment analysis of Indonesian people's responses to the Bjorka Hacker compared to the NBC method..Keyword : Sentiment Analysis, SVM, Bjorka
Los estilos APA, Harvard, Vancouver, ISO, etc.
40

Delgado, Ana y Blanca Callén. "Do-it-yourself biology and electronic waste hacking: A politics of demonstration in precarious times". Public Understanding of Science 26, n.º 2 (2 de agosto de 2016): 179–94. http://dx.doi.org/10.1177/0963662516647348.

Texto completo
Resumen
In recent years, there has been an explosion of do it yourself, maker and hacker spaces in Europe. Through makers and do-it-yourself initiatives, ‘hacking’ is moving into the everyday life of citizens. This article explores the collective and political nature of those hacks by reporting on empirical work on electronic waste and do-it-yourself biology hacking. Using Dewey’s experimental approach to politics, we analyse hacks as ‘inquiry’ to see how they serve to articulate public and political action. We argue that do-it-yourself and makers’ hacks are technical and political demonstrations. What do-it-yourself and makers’ hacks ultimately demonstrate is that things can be done otherwise and that ‘you’ can also do it. In this sense, they have a potential viral effect. The final part of the article explores some potential shortcomings of such politics of demonstration.
Los estilos APA, Harvard, Vancouver, ISO, etc.
41

Jasiński, Maciej. "The Correspondence of Michał Antoni Hacki and Johannes Hevelius". Odrodzenie i Reformacja w Polsce 67 (5 de marzo de 2024): 199–230. http://dx.doi.org/10.12775/oirwp.2023.07.

Texto completo
Resumen
Artykuł przedstawia korespondencję opata oliwskiego Michała Antoniego Hackiego (ok. 1630–1703) z gdańskim astronomem Janem Heweliuszem (1611–1687), prowadzoną nieregularnie w latach 1654–1686. Omawia obecne w niej zagadnienia, które uzupełniają dotychczasowe ustalenia dotyczące biografii obu korespondentów, w tym m.in. zainteresowania Hackiego muzyką czy przekonanie Heweliusza o niesłuszności stosowania pozycyjnych instrumentów astronomicznych zaopatrzonych w lunety. Ponadto przedstawia nieznane dotychczas okoliczności wyznaczenia gwiazdozbioru Tarczy ku czci Jana III i dedykowania mu książki Heweliusza.
Los estilos APA, Harvard, Vancouver, ISO, etc.
42

Lennerfors, Thomas Taro, Per Fors y Jonathan R. Woodward. "Case hacks: Four hacks for promoting critical thinking in case-based management education for sustainable development". Högre utbildning 10, n.º 2 (2020): 1. http://dx.doi.org/10.23865/hu.v10.1960.

Texto completo
Resumen
In management education at engineering and business schools, the case-based method is commonly used. The case-based method has a strong action orientation but is seen to downplay critical thinking, which is an important component in Education for Sustainable Development (ESD). Current literature suggests two ways in which the case-based method can be improved, namely by producing better cases, and by improving classroom practice. This paper contributes to research and practice on case-based ESD within management education by outlining a third way: hacking cases, in other words, making modifications to existing cases to promote critical thinking. The hacks presented in this paper are based on a review of previous empirical and conceptual research about, and, on our own experiences of critical thinking. They are: (1) exploring synergies and conflicts; (2) expanding empirical knowledge; (3) shifting perspective; and (4) creating spaces for dialogue. By employing the hacks, case-based management ESD can be adapted to promote both action and critical thinking and, thereby, become an improved educational method in management ESD. An illustration of these four hacks within the course Managing sustainability in global industrial companies is provided.
Los estilos APA, Harvard, Vancouver, ISO, etc.
43

Gacharná G., Federico Iván. "Hacker ético vs. delincuente informático: Una mirada en el contexto colombiano". INVENTUM 4, n.º 6 (2 de febrero de 2009): 46–49. http://dx.doi.org/10.26620/uniminuto.inventum.4.6.2009.46-49.

Texto completo
Resumen
El presente artículo aborda el singular mundo del Hacking Ético, buscando establecer que un hacker no es un delincuente tal y como se define en el imaginario general, haciendo especifica la disertación para el contexto colombiano. Con este fin se recurre al planteamiento de dos perfiles que son producto de la experiencia y trayectoria del autor, para concluir que en Colombia hay talento humano para formar grandes profesionales en Hacking Ético, pero hace falta una formación clara que evite que los participantes distorsionen el propósito y terminen irrumpiendo en la ilegalidad.
Los estilos APA, Harvard, Vancouver, ISO, etc.
44

Swetha, Pelleti. "Modeling and Predicting Cyber Hacking Breaches". International Journal for Research in Applied Science and Engineering Technology 9, n.º VI (30 de junio de 2021): 5349–55. http://dx.doi.org/10.22214/ijraset.2021.36168.

Texto completo
Resumen
Analyzing cyber incident information units is an essential approach for deepening our expertise in the evolution of the chance situation. This is an especially new study topic, and lots of research continue to be done. In this paper, we record a statistical evaluation of a breach incident records set similar to 12 years (2005–2017) of cyber hacking sports that encompass malware attacks. We display that, an evaluation of the findings stated withinside the literature, each hacking breach incident inter-arrival instances and breach sizes must be modeled through stochastic processes, instead of through distributions due to the fact they show off autocorrelations. Then, we recommend specific stochastic procedure fashions to, respectively, shape the inter-arrival instances and the breach sizes. We additionally display that those fashions can expect the inter-arrival instances and the breach sizes. In order to get deeper insights into the evolution of hacking breach incidents, we behaviour each qualitative and quantitative fashion analysis at the records set. We draw a fixed of cyber safety insights, together with that the chance of cyber hacks is certainly getting worse in phrases in their frequency, however now no longer in phrases of the value in their damage.
Los estilos APA, Harvard, Vancouver, ISO, etc.
45

Kurniawan, Ade, Yuichi Ohsita y Masayuki Murata. "Experiments on Adversarial Examples for Deep Learning Model Using Multimodal Sensors". Sensors 22, n.º 22 (9 de noviembre de 2022): 8642. http://dx.doi.org/10.3390/s22228642.

Texto completo
Resumen
Recently, artificial intelligence (AI) based on IoT sensors has been widely used, which has increased the risk of attacks targeting AI. Adversarial examples are among the most serious types of attacks in which the attacker designs inputs that can cause the machine learning system to generate incorrect outputs. Considering the architecture using multiple sensor devices, hacking even a few sensors can create a significant risk; an attacker can attack the machine learning model through the hacked sensors. Some studies demonstrated the possibility of adversarial examples on the deep neural network (DNN) model based on IoT sensors, but it was assumed that an attacker must access all features. The impact of hacking only a few sensors has not been discussed thus far. Therefore, in this study, we discuss the possibility of attacks on DNN models by hacking only a small number of sensors. In this scenario, the attacker first hacks few sensors in the system, obtains the values of the hacked sensors, and changes them to manipulate the system, but the attacker cannot obtain and change the values of the other sensors. We perform experiments using the human activity recognition model with three sensor devices attached to the chest, wrist, and ankle of a user, and demonstrate that attacks are possible by hacking a small number of sensors.
Los estilos APA, Harvard, Vancouver, ISO, etc.
46

Łukaszewicz-Chantry, Maria. "Poemat Maryjny Michała Antoniego Hackiego". Symbolae Philologorum Posnaniensium Graecae et Latinae 28, n.º 2 (21 de marzo de 2019): 127–37. http://dx.doi.org/10.14746/sppgl.2018.xxviii.2.8.

Texto completo
Resumen
The poem of the Abbot of Oliwa Michał Hacki can be considered as a poetic Mariological treatise which emphasises the privilege of the Immaculate Conception, questioned by the Reformation. Hacki gives numerous metaphors and titles of Mary, systematises them, classifies them into thematic groups and explains their meaning. By doing so, he preserves the hierarchy of theological truths and Christocentrism.
Los estilos APA, Harvard, Vancouver, ISO, etc.
47

Bentolila, Héctor Rodolfo. "Importancia del lenguaje y método filosófico en el segundo Wittgenstein". Revista Colombiana de Filosofía de la Ciencia 18, n.º 36 (11 de junio de 2018): 83–95. http://dx.doi.org/10.18270/rcfc.v18i36.2351.

Texto completo
Resumen
El articulo responde a la pregunta ¿Por qué importa el lenguaje en filosofía?, formulada hace más de cuarenta años por el filósofo canadiense, Ian Hacking. Al hacerlo, parte de la nueva concepción del método filosófico desarrollada por Wittgenstein en sus Investigaciones Filosóficas. El objetivo es mostrar que el lenguaje importa a la filosofía, sobre todo, como el medio natural en que los seres humanos actúan y se mueven habitualmente. De dicha condición, y de comparar los usos filosóficos del lenguaje con las acciones lingüísticas primitivas -de donde derivan aquellos- se desprende un estilo de actuar que disuelve los pseudoproblemas de la filosofía tradicional. El artículo responde a la pregunta ¿Por qué importa el lenguaje en filosofía?, formulada hace más de cuarenta años por el filósofo canadiense, Ian Hacking. Al hacerlo, parte de la nueva concepción del método filosófico desarrollada por Wittgenstein en sus Investigaciones Filosóficas. El objetivo es mostrar que el lenguaje importa a la filosofía, sobre todo, como el medio natural en que los seres humanos actúan y se mueven habitualmente. De dicha condición, y de comparar los usos filosóficos del lenguaje con las acciones lingüísticasprimitivas -de donde derivan aquellos- se desprende un estilo de actuar que disuelve los pseudoproblemas de la filosofía tradicional
Los estilos APA, Harvard, Vancouver, ISO, etc.
48

Giannone, Ariel. "Investigación en Progreso: Método de Inclusión de Hacking Ético en el Proceso de Testing de Software". Revista Latinoamericana de Ingenieria de Software 4, n.º 6 (10 de enero de 2017): 252. http://dx.doi.org/10.18294/relais.2016.252-254.

Texto completo
Resumen
<p>Debido al crecimiento exponencial de Internet y a que las organizaciones poseen cada vez mas información, se hace imprescindible bloquear y eliminar todas las intrusiones posibles. Gracias al hacking ético es posible detectar y corregir algunas de las vulnerabilidades antes que el sistema salga a la luz. Con el fin de mejorar este proceso se intentan incluir estas técnicas y métodos en el proceso tradicional de testing de software dentro de las organizaciones.</p>
Los estilos APA, Harvard, Vancouver, ISO, etc.
49

Vilatta, Emilia y José Giromini. "La injusticia testimonial como fabricación de personas: una lectura ontológica". Griot : Revista de Filosofia 21, n.º 1 (1 de febrero de 2021): 75–93. http://dx.doi.org/10.31977/grirfi.v21i1.2106.

Texto completo
Resumen
El objetivo de este trabajo es desarrollar una lectura ontológica del fenómeno ético-epistémico que Miranda Fricker (2017) caracteriza como injusticia testimonial. Para hacer esto, recurriremos a las ideas desarrolladas por Ian Hacking (2001, 2002, 2006) respecto a las relaciones entre las clasificaciones sociales y las clases o tipos sociales. Por un lado, consideraremos los procesos que Hacking llama “fabricación de personas” (making up people), a saber, aquellos procesos mediante los cuales la articulación de ciertas clasificaciones hace posible la existencia de ciertos tipos de personas. Argumentaremos que los episodios de injusticia testimonial, que expresan los efectos de clasificaciones estereotípicas, pueden entenderse como parte de los procesos sociales de fabricación debido a que contribuyen a fabricar los atributos epistémicos, tales como la credibilidad, de ciertos tipos de personas. Por otro lado, con el fin de conceptualizar la situación ontológica bajo la cual el fenómeno de la injusticia testimonial se vuelve reconocible y reprochable, recurriremos a la idea de “clases interactivas” de Hacking. Sostenemos que el concepto de “clases interactivas” pone de manifiesto la naturaleza fundamentalmente inestable de las clases humanas y que enfatizar este aspecto dinámico permite iluminar las condiciones sociales bajo las cuales la injusticia testimonial aparece como éticamente culpable. En este sentido, argumentaremos que la injusticia testimonial puede devenir el objeto de un punto de vista normativo sólo en la medida en que las clases cuya existencia es posibilitada por las clasificaciones estereotípicas se encuentran ya atravesando un proceso de cambio.
Los estilos APA, Harvard, Vancouver, ISO, etc.
50

Nanda, Sendi Eka y Winda Widyaningsih. "PENGARUH TERPAAN BERITA PERETASAN TOKOPEDIA TERHADAP REPUTASI PERUSAHAAN". Jurnal Broadcasting Communication 3, n.º 1 (1 de abril de 2021): 12–22. http://dx.doi.org/10.53856/bcomm.v3i1.138.

Texto completo
Resumen
Penelitian ini bertujuan untuk menguji dan menganalisis pengaruh terpaan Tokopedia Hacking News terhadap reputasi perusahaan. Metode penelitian menggunakan metode survei, jenis penelitian ini menggunakan kuantitatif melalui penyebaran kuesioner dengan purposive sampling. Unit analisis dalam penelitian ini adalah 350 responden yang menggunakan Tokopedia dari total populasi 2.330.000 penduduk Kota Depok dengan menggunakan rumus Slovin. Alat analisis data menggunakan analisis regresi linier sederhana menggunakan aplikasi IBM Statistics versi 25. Penelitian ini menggunakan teori uses and effect yang menjelaskan hubungan antara komunikasi massa yang disampaikan melalui media massa, sehingga menimbulkan efek bagi pengguna media massa. Konsep kegunaan (use) merupakan bagian yang sangat penting atau pokok dari pemikiran ini karena pengetahuan tentang penggunaan media yang menyebabkan atau memberikan cara untuk memahami dan memperkirakan tentang hasil dari suatu proses komunikasi massa. Begitu juga dalam berita peretasan Tokopedia yang tayang memberikan informasi peretasan data yang dialami Tokopedia kepada publik. Pengetahuan ini akan memungkinkan audiens untuk mengambil pelajaran dan informasi dari berita hacking Tokopedia dan secara otomatis menerima efeknya setelah membaca atau menonton berita. Hasil pengujian model regresi untuk seluruh variabel nilai thitung sebesar -7,365 > - 1,960, hal ini menunjukkan bahwa H0 ditolak dan H1 diterima, artinya paparan Tokopedia Hacking News (X) berpengaruh negatif dan signifikan terhadap Reputasi Perusahaan (Y) Hasil penelitian ini menunjukkan bahwa terdapat pengaruh terpaan berita peretasan Tokopedia terhadap reputasi perusahaan sebesar 13,5%, sedangkan faktor lainnya dipengaruhi oleh faktor lain. Kata kunci: Hacks, Perusahaan, Reputasi, Paparan Berita, Tokopedia
Los estilos APA, Harvard, Vancouver, ISO, etc.
Ofrecemos descuentos en todos los planes premium para autores cuyas obras están incluidas en selecciones literarias temáticas. ¡Contáctenos para obtener un código promocional único!

Pasar a la bibliografía