The Company Behind The Hacking Of A Hacker

The following site is produced by the company called Binary. What this cooperation strives to achieve is the successful implementation of counter active hacking. The website will include three pages that consist of the Home page, which provides an overview of the company it self and where it was derived form. The foundation, that is […]

Read more "The Company Behind The Hacking Of A Hacker"

Is The Problem The Problem?

        Logically viewing the progression of computer hacking from its origination to the current standing at which it resides, presents us with a modern day dilemma yet to be solved. Depending on the selected variety of hackers that could be used as a static test in which, computer hackers counter attack computer […]

Read more "Is The Problem The Problem?"

The Fault In Our Arguments

        In the Article “Why Computer Talents Become Computer Hackers” The Author’s focus on the the differentiating qualities of White, Black, and Grey Hat hackers and the psychological evidence that could have brought them to act in the manner in which they do. Enlightening as it may be, they focused on the […]

Read more "The Fault In Our Arguments"

Money Made By Hackers

              Finding information on how many hackers exist globally is impossible, as the primary set of skills a hacker first determines to learn is how not to be identified and not be caught in the first place to find himself numbered.  The only way to even begin to estimate […]

Read more "Money Made By Hackers"

Realizing Technology Can Suck

It goes without saying that society as a whole has benefited from technology in numerous ways but, with pros there are always cons. Unfortunately with technology ever changing, a current and reliable scholarly article involving graphed data is hard if not impossible to locate. Luckily however, information regarding current computer related information is still available. […]

Read more "Realizing Technology Can Suck"

Cyber Development Turned Sour

          Why do people do the things they do? More towards the topic, Why do hackers breach networks and what is there objective? there are many differentiations between computer hackers but, as stated in a previously read scholarly article, there are three main personas. The white hats who consist are no […]

Read more "Cyber Development Turned Sour"

An Annotated Bibliography

Oklahoma State University As Technology Advances and cyber terrorism increases, is cyber security or counteractive Hacking the Solution to A Safer Internet? Conor Martin Dr. Mulliken ENGL 1213 February 22, 2016 Research Proposal Past meanings of the term ‘hacking’ do not correlate with its meaning it today. The practice of hacking started as a means […]

Read more "An Annotated Bibliography"

Close, But No Heat Transport

  Conor Martin Dr. Mulliken Comp 2 February 14th, 2016 Close, But No Heat Transport         Why not transport heat a meter away from the source of origin? Scientist and authors Matti Partanen, Kuan Yen Tan, Joonas Govenius, Russell E. Lake, Miika K. Mäkelä, Tuomo Tanttu, and Mikko Möttönen published their new research […]

Read more "Close, But No Heat Transport"