منابع مشابه
Hacker Cartography: Crowdsourced Geography, OpenStreetMap, and the Hacker Political Imaginary
In this paper I trace the origins of “neogeography” (a constellation of new mapping practices and populations on the geospatial web) to its roots in computer hacker culture, notably through early mapping mashups, known originally as “map hacks”. I argue that a return to the figure of the hacker—via the proposed concept of hacker cartography—offers a productive lens for understanding the afforda...
متن کاملUser Hacker Routing
The use of multiple transmission paths is known to enhance communication security. By using a suitable split function and with the help of an additional encryption layer this approach provides an interesting method for securing client server communication on the Internet.
متن کاملAre computer hacker break-ins ethical?
Recent incidents of unauthorized computer intrusion have brought about discussion of the ethics of breaking into computers. Some individuals have argued that as long as no significant damage results, break-ins may serve a useful purpose. Others counter with the expression that the break-ins are almost always harmful and wrong. This article lists and refutes many of the reasons given to justify ...
متن کاملThe Lazy Kernel Hacker and Application Programmer
Over time, programming languages have become more abstract, adding features such type safety, garbage collection, and improved modularization. These improvements contribute to program quality and have allowed application programmers to write increasingly complicated programs. There are thousands of programming languages in existence, and features are routinely drawn from the existing set and re...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Nature
سال: 2018
ISSN: 0028-0836,1476-4687
DOI: 10.1038/d41586-018-05897-1