The Travelin' Librarian

"You Two! We're at the end of the universe, eh. Right at the edge of knowledge itself. And you're busy… blogging!" — The Doctor, Utopia

Skip to content
Menu
  • Home
  • Writing
    • Forthcoming
    • Non-Fiction
    • Articles
    • Fiction
    • Misc
  • Presentations
  • Projects
  • Also by…
  • About
  • Contact
  • The Great Library Card Collection

Tag: hacking

Friday Video: Hackers: the Internet’s immune system
Internet

Friday Video: Hackers: the Internet’s immune system

Posted on June 20, 2014June 15, 2014 by Michael Sauers

The beauty of hackers, says cybersecurity expert Keren Elazari, is that they force us to evolve and improve. Yes, some hackers are bad guys, but…

Internet

Was Your Password Set Free in the Recent Adobe Hack?

Posted on November 13, 2013 by Michael Sauers

The folks at LastPass have a simple way to search the database of hacked passwords (and password hints) released by the recent Adobe hack. Please…

Tech

Friday Video: DEFCON: The Documentary

Posted on August 30, 2013 by Michael Sauers

A film about the world’s largest hacking convention and its 20th year running. Filmed over the summer of 2012 and containing hundreds of hours of…

Libraries

Every Library and Museum in America, Mapped

Posted on June 10, 2013 by Michael Sauers

If you have ever felt overwhelmed by the ubiquity of McDonald’s, this stat may make your day: There are more public libraries (about 17,000) in…

1

My first month with a rooted nook color

Posted on April 9, 2011April 9, 2011 by Michael Sauers

Back on March 7th I received the nook color that I’d purchased from Barnes & Noble via eBay. Why eBay? Well, there was this $50-off…

ICIW2008: Characterizing Malware Writers can Computer Attackers in Their Own Words

Posted on April 25, 2008 by Michael Sauers

Dr. Thomas J. Holt, University of North Carolina, Charlotte digital crime markets problem is increasing also becoming more complex criminological research little research has been…

ICIW2008: Establishing the Human Firewall: Improving Resistance to Social Engineering Attacks

Posted on April 25, 2008 by Michael Sauers

Jamison Scheeres, Air Force Institute of Technology what is social engineering techniques to manipulate people also shoulder surfing also dumpster diving trick someone into doing…

The unintended consequences of large-scale storage

Posted on September 10, 2007 by Michael Sauers

Jeff Atwood over at Coding Horror has posted about something called Rainbow Tables. Now, I don’t want to turn this blog into a discussion of…

Lowest SAT score ever.

Posted on May 9, 2007 by Michael Sauers

Dude takes the SAT and answers every question incorrectly, on purpose. What a way to hack the system.

Archives

Also check out…

The Collector's Guide to Dean Koontz

Top Posts

  • How to share an external USB hard drive from Ubuntu to a Windows network
    How to share an external USB hard drive from Ubuntu to a Windows network
  • 2016 The Year in Dunkin'
    2016 The Year in Dunkin'
  • Doctor Who Episode 2.02 Torrent
    Doctor Who Episode 2.02 Torrent
  • Friday Video: John Green on His Religion and His Banned Books
    Friday Video: John Green on His Religion and His Banned Books
  • Trump Administration Responds to ALA's Lawsuit to Save IMLS
    Trump Administration Responds to ALA's Lawsuit to Save IMLS

Archives

Follow Me

  • Flickr
  • X
  • Facebook
  • Google
  • LinkedIn
  • Pinterest
  • Email
  • YouTube
  • Amazon
  • RSS Feed

Visitors

"As an Amazon Associate, I earn from qualifying purchases."

© Copyright 2025 – The Travelin' Librarian
Wisteria Theme by WPFriendship ⋅ Powered by WordPress
 

Loading Comments...