 |
|
 Hacking MythTV (ExtremeTech)Want control? Build your own MythTV PC.
You don't do stuff like this to cut corners. You do it because you want what you wantand because it's fun. And a personalized MythTV is so much more than a PVR. You can combine HDTV, DVD, all kinds of music, radio, photos, even a plug-in videophone module. All you need is a little Linux know-how,... |  |  The Oracle Hacker's Handbook: Hacking and Defending Oracle
Knowledge is power, and the power can be yours
While Oracle continues to improve the security features of its product, it still has a long way to go. David Litchfield has devoted years to relentlessly searching out the flaws in this ubiquitous database system and creating defenses against them. Now he offers you... |  |  Hacking Windows Vista: ExtremeTech"Why didn't they ask me before they did that?"
Vista is the most radical revamping of Windows since 1995. But along with all the fantastic improvements, there are a couple of things that drive you up the wall. Maybe you're not seeing the performance you expect. Security is better, but boy, is it annoying. And what's with... |
|
 Excel Hacks: Tips & Tools for Streamlining Your Spreadsheets
Millions of users create and share Excel spreadsheets every day, but few go deeply enough to learn the techniques that will make their work much easier. There are many ways to take advantage of Excel's advanced capabilities without spending hours on advanced study. Excel Hacks provides more than 130 hacks -- clever tools, tips... |  |  Hacking Roomba: ExtremeTechThe jetsons would be proud
A gizmo as cool as Roomba just begs to be hacked. Now, with this book and the official ROI specification furnished by iRobot®, you can become the robotic engineer you dreamed of being when you were 10. Build a Bluetooth interface for your Roomba. Turn it into an artist.... |  |  The Shellcoder's Handbook: Discovering and Exploiting Security HolesThe black hats have kept up with security enhancements. Have you?
In the technological arena, three years is a lifetime. Since the first edition of this book was published in 2004, built-in security measures on compilers and operating systems have become commonplace, but are still far from perfect. Arbitrary-code execution... |
|
|
|
| Result Page: 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 |