I'm in pre-production revolving around the idea of an operator - the one you see in movies and TV who relays information back to the units on the ground or hacks into systems and opens/unlocks doors, codes etc (examples such as The Matrix and Ocean's 11). I know there are hundreds of shows/movies that features them but can you give suggest specific movies and if a series, the specific episode? I'm trying to find and analyse a collection of cool sequences or representations. Bonus points for linking the specific scenes in Youtube! Many thanks!
I'm a woman (mostly), and I'm the chairperson for our local hackerspace, we have female participants but it's a small minority... and we would really love to be more diverse. [more inside]
For the last two days feedly has been down for significant chunks of time because of DDoS attacks (article). They say hackers are trying to extort them for money. Is this common online? [more inside]
After the probably eighth hacking attack (and success) on my site in less than a year, I'm sick to death of using a platform that has to be updated on an hourly basis or get totally nuked by Moldavians. What platforms are relatively user-friendly for people who want to blog? [more inside]
So, we sometimes hear about hackers who break into XFamousCompany and cause untold gazbillionty dollars in damage. How accurate is that? How do they get these numbers? [more inside]
Can "hackers" use the power of the internet to control anything that has a computer in it? [more inside]
I found several "favourited" videos in my YouTube account that were definitely not my or my partner's doing. What could have happened? Was I hacked? [more inside]
Does including a "welcome to my website" statement on your homepage invite or legitimize hackers? [more inside]
So...I'm thinking my Mac has a virus. I have a Mac OS X 10.5.8. I keep running out of hard drive space and deleting files constantly, so I got Disk Inventory X to see where my space is. Turns out there is 20 GB of 130,000 text files on my computer in a hidden file marked "private". I can't see this "private" folder from the file manager...only from Disk Inventory X. What do I do? [more inside]
Anonymous hackers are planning to post my information on the web. What should I do to avoid getting my identity messed up?
My information got hacked by Anonymous. They got an expired debit card number, my name, address, and password, and are about to publish the whole mess on the internet. What should I do? [more inside]
What exactly is occurring in my Outlook Account. And what should I do about it? [more inside]
When did hacking acquire the patina of illegality? [more inside]
Having a minor freak out about identity theft, and looking for advice on making sure all my online information is as secure as possible. [more inside]
Looking for books/essays/authorities on the history of hacking and hacker culture. [more inside]
Two separate online email accounts (Hotmail then Gmail) of my wife's have been broken into within six months. Each time the hijacker changes the password, sends a message to the contact list asking for some emergency money, then deletes the contact list. Any idea why my wife would be targeted? And what should she do to protect herself from now on?
Do hackers go into people's Skype accounts and break up with the account owner's SO? Also, if there's anyone in Melbourne, Australia, preferably Carnegie, who could give me some help, I could definitely use it. [more inside]
What are the cool technologies that kids on the fringes are playing with these days? [more inside]
Apparently I am one of the freelancers whose profiles Outsourcingroom.com (allegedly) stole from elance. Unfortunately, the Outsourcingroom.com profile appears very high in Google searching for my name. How can I get Google to remove this badness from their index? [more inside]
Do you know of any more essays like Hackers, In the Beginning Was the Command Line, or the DadHacker Atari Articles?
I need resources / links information to convince a friend that his small computer network might be of interest to hackers?
I need resources / links information to convince a friend that his small computer network might be of interest to hackers? [more inside]
PugetSoundFilter: We're relocating to Kitsap County, from Philadelphia, in a month. I need to find the other hackers and tinkerers. Help me build a new network. [more inside]
I received a letter last December from UCLA stating that "a restricted campus database containing personal information has been illegally accessed by a sophisticated computer hacker" (gotta love the assumption of "sophisticated there"). And that they regret to inform me my name is in the database. My question is, can I sue for damages? Is there already a class action lawsuit for damages against UCLA? What are my options? What traditionally happens to victims in these cases in terms of compensation?
Where would I look for a couple of experienced game designers in the Baltimore Washington area who aren't so experienced that they avoid startups? [more inside]
Cyberpunk, hacker culture, BBSs and alt.2600 newsgroups... have they really all gone? Is it really all virus breeders and script kiddies now? What has happened to the cyberpunk movement - I keep reading it has died and post-cyberpunk doesn't seem to be doing much. What is the current counterculture on the net? Please don't tell me it's goths weeping on their keyboards? [more inside]
How do you deal with your Internet identity being compromised? What do you do if someone has changed the passwords to every account you own? [more inside]