Tagged Questions

The tag has no wiki summary.

learn more… | top users | synonyms

52
votes
19answers
2k views

How To Deliberately Hide Bugs In Code (for use in a Novel I'm writing)

I'm writing a novel in which an evil programmer wants to include subtle errors in his code that are likely to go unnoticed by his supervisor during a code review and unlikely to be caught by a ...
11
votes
10answers
2k views

If competition is using 'lingua obscura' for development (why) should I be worried?

I was reading Paul Graham's essay - Beating The Averages (2003) and here's what he had to say: The more of an IT flavor the job descriptions had, the less dangerous the company was. The safest ...
8
votes
2answers
232 views

Contributing to open source software (how to hack) [closed]

Possible Duplicate: How do you dive into large code bases? I am currently a student and started programming a few years ago. I am able to write complete working software in many languages. ...
7
votes
15answers
590 views

What is the common definition of a Hacker?

I'm wondering if the term Hacker means different things to different people. When most people hear the word hacker what are the first things that come to mind?
7
votes
11answers
653 views

What objections do you have to the term “hacker”?

I've been of the mind that hacker is just another name for programmer. Not one that you'd use when someone asks you what you do but one that could be used between a brother/sisterhood of programmers. ...
6
votes
3answers
218 views

Possible hack aftermath

After being hacked companies often give numbers and details on how much of their data was compromised e.g "13K user and passwords". After a possible intrusion how do you know what the hacker did in ...
6
votes
6answers
432 views

How do I convince my boss that it's OK to use an application to access an outside website?

That is, if you agree that it's OK. We have a need to maintain an accurate internal record of bank routing numbers, and my boss wants me to set up a process where once a week someone goes to the ...
5
votes
5answers
291 views

How to shift development culture from tech fetish to focusing on simplicity and getting things done? [closed]

Looking for ways to switch team/individual culture from chasing latest fads, patterns, and all kinds of best practices to focusing on finding quickest and simplest solutions and shipping features. My ...
5
votes
4answers
1k views

Any resources to learn how to create virus, worm, trojan and hack software? (For learning purposes)

It seems that creating viruses, worms ... etc and hacking/cracking software is another realm of programming. It's like the Black Magic of programming. The lack of knowledge about this realm creates ...
4
votes
7answers
562 views

How does a website become hackable?

I know websites are hacked because of loose ends but how are they hacked via a form? Is it because the website owners didn't validate the form and the way they structured?
4
votes
4answers
201 views

What is the best way to learn how to develop secure applications

I would like to get into computer security in my career. What are the best ways to learn how to program securely? It seems to me that besides textbooks and taking classes in the subject that perhaps ...
4
votes
4answers
381 views

What kind of things can you learn from a guy who only hacks existing code?

At my previous job I was the lead programmer and I worked with this guy who was a self-admitted hacker. We respected each other and had a great relationship. The company was much better off because we ...
3
votes
6answers
245 views

Do you find yourself less sociable after a day of hacking? [closed]

I read a hypothesis somewhere, suggesting that maybe the parts of our brain which are exercised when hacking are the same ones which are required for handling basic social interaction, and politics. ...
3
votes
4answers
277 views

Are there laws to protect us from hackers who disclose vulnerabilities prior to alerting the vendor?

Take the example of the recent ASP.NET (and Java Server Faces) vulnerability disclosure at a Hacker conference in Brazil. It's my understanding that the poet tool was demonstrated before Microsoft ...
2
votes
2answers
176 views

Resources for C/C++ security (whitehat) hacking

I'm currently working as a C++ developer in a software security department, but not as a researcher or whitehat hacker. Security is an interest of mine, mainly in the areas where I can exploit code or ...

1 2
15 30 50 per page