FAA: Boeing?s New 787 May Be Vulnerable to Hacker Attack
by Kim Zetter, WIRED Boeing’s new 787 Dreamliner passenger jet may have a serious security vulnerability in its onboard computer networks that could allow passengers to access the plane’s control systems, according to the U.S. Federal Aviation Administration. The computer network in the Dreamliner’s passenger compartment, designed to give passengers in-flight internet access, is connected to the [...]
I got this while I tried to upgrade my server and have been unable to find any explanations for what I could do while I have searched after an solution. I were an bit uncertain about how to search for an answer and have tried with some searches that I think should have been good enough as well with... (2 Replies)
HI,
i want to be a white hacker(those who use their skills in ethical hacking)
for that what all languages do i need to know
i am working in an IT company and its paying me well, i just want to learn it because it has always attracted me..i know c,c++,shell,little bit html what else do... (13 Replies)
NEWS:
Flaw leaves Linux computers vulnerable
http://news.com.com/2100-1001-857265.html
A flaw in a software-compression library used in all versions of Linux could leave the lion's share of systems based on the open-source operating system open to attack, said sources in the security... (3 Replies)
CRACK-ATTACK(6) [FIXME: manual] CRACK-ATTACK(6)NAME
crack-attack - multiplayer OpenGL puzzle game like "Tetris Attack"
SYNOPSIS
crack-attack {{[--server PORT] | [-X] | [--wait]} {[SERVER] | [-X]} {[--solo] | [-X]}} [--name NAME]
DESCRIPTION
Crack Attack is roughly based on the Super Nintendo game "Tetris Attack". Slowly, your stack of colored blocks grows from the bottom, and
you've got to make sure it never reaches the top. If it does, you lose. To eliminate blocks from the stack, line up at least three of one
color, horizontally or vertically. Once you do, those blocks disappear, and put off slightly your inevitable demise.
Crack Attack essentially requires hardware acceleration. For Xorg users, this means you want DRI.
COPYRIGHT
Copyright (C) 2000 Daniel Nelson
This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by
the Free Software Foundation; either version 2 of the License, or (at your option) any later version.
This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details.
The GNU General Public License can be found online at http://www.gnu.org/copyleft/gpl.html. Additionally, a copy can be obtained by writing
to the Free Software Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
DISCLAIMER
It is important to realize that the name of Crack Attack! X-treme play mode is meant to be humorous, and thus should not itself be the
subject of derision. Thank you.
AUTHOR
Direct comments, questions, praise, flames, and job offers to nelson@aluminumangel.org. Visit my homepage at aluminumangel.org.
This manual page was written by Colin Walters walters@debian.org for the Debian GNU/Linux system (but may be used by others). Permission is
granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.1 or any later
version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts and no Back-Cover Texts.
A copy of Version 1.2 of the Free Documentation License is included in the file debian/copyright in the crack-attack source package. This
file is also available in the Debian package as /usr/share/doc/crack-attack/copyright.
[FIXME: source] 11/17/2011 CRACK-ATTACK(6)