Tags » Black Hat

How to Spot Poisoned Links

By Todd Brasel and Vince Hannon, NYSTEC Information Security Team Members

You’re looking for information on a particular topic, so you do a web search using your favorite browser.  621 more words

Black Hat

Six Thinking Hats in Requirements elicitation

The Six Thinking Hats principle was developed by Dr. Edward de Bono.

The principle has six metaphorical hats that define a certain type of thinking. 428 more words

I Wear A White Hat

In the marketing world, there are three types of areas that moneymaking methods fall into. These areas are called hats (yeah, kind of weird, but whatever). 375 more words

Black Hat

See my blog!

So we all want our blogs to be seen yeah? So if we want them to be seen, we need to think about some SEO techniques. 398 more words

Digital Marketing

Winchester '73

Director:Anthony Mann

1950

 To say I’m not a fan of the Western genre is a gross understatement. In fact it is the one genre that I struggle to watch – it always feels like a chore to watch a Western. 501 more words

1001 Movies You Must See Before You Die

Did Trump’s Campaign Try to Hire a Latin American Election Hacker?

Juan Jos? Rend?n, a Miami-based political consultant linked to sabotage and manipulation of Latin American elections, claims that Donald Trump’s presidential campaign approached him, but he turned them down. 33 more words

The Dark Arts: Cross Site Scripting

In 2011, a group of hackers known as Lulzsec went on a two month rampage hacking into dozens of websites including those owned by FOX, PBS, the FBI, Sony and many others. 1,088 more words

Hackaday Columns