Tutorials
 
How to hack
 
A menacing hand'€™s shadow on a computer keyboard in front of printed computer data. Dramatic light, high contrast.
 
Hacker hands
 
password typist
 
virtual private network (VPN)
Hacked’s Wiki
CCN.LA
Trending Topics
Posts Tagged ‘iFixit’
Most Recent
 
Read More
November 25, 2015

You Don’t Really Own Your Hardware: The War on Electronics Repair

The ways that companies like Apple try to extract more cash from their customer base are many. The notion of planned obsolescence is defined by the Oxford dictionary like so:

A policy of producing consumer goods that rapidly become obsolete and so require replacing, achieved by frequent changes in design, termination of the supply of spare parts, and the use of nondurable materials.

The dictionary definition obviously doesn’t cover it all, but suffice it to say that releasing a new model every year with improvements only sufficient to make older models not capable of running updates is one good example. But getting customers to buy new hardware is not the only way [...]

19980
Tutorials
 
How to Hack
 
How Cybercriminals Target Victims: Report Cites Top Information Resources
Knowledge Base
 
Freeware
 
Malware
Press Releases
 
eSentire Partners with Carbon Black to Provide Endpoint Detection Capabilities to the Midmarket
 
SecurityScorecard Announces Data Science Partnership with Columbia University