rtl-sdr.com - rtl-sdr (rtl2832u) and software defined radio news and projects. also featuring airspy, hackrf, fcd and more.
rtl-sdr (rtl2832u) is a sdr radio that uses a cheap $20 dvb-t tv tuner dongle with the rtl2832u chipset. using special drivers the dongle can be turned into a wideband sdr radio that is great for electronics hobbyists, hackers/makers, ham radio enthusiasts or for anyone interested in rf.
an invite-only community of growth hackers. new curated growth hacking idea delivered to your email every day. people from companies like microsoft, salesforce, coca-cola, indiegogo, disney, linkedin are among our subscribers.
hackers for charity is a non-profit organization that leverages the skills of technologists. we solve technology challenges for various non-profits and provide food, equipment, job training and computer education to the world's poorest citizens.
where hackers and security experts come to train - enigma group
since 2004, enigma group has provided its members a legal and safe security resource where they can develop their pen-testing skills on various training missions that cover exploits listed in the owasp top 10 project.
professional hackers | biggest it updates platform
professional hackers | biggest it updates platform professional hackers india provides single platform for latest and trending it updates, business updates, trending lifestyle, social media updates, enterprise trends, entertainment, hacking updates, core hacking techniques, and other free stuff.
we hack - the home of hackers - hacks | cheats | generators
we.hack.com - home of the hackers and of the people who needs hacks.young or old, boy or girl, no matter your nationality here you will find the hack you need even if you dont like hacks at we-hack.com you will start liking them.
realprogrammers.com will become a resource for the exchange of ideas, techniques and opinions about the art of programming for real programmers (or otherwise :). currently under construction, please email for more information/participation.
hackers barber shop would like to wish you a very happy experience with us both here online and in the shop, where you will be greeted by our highly trained and courteous staff, who are eager to provide you with the combination of their skills, talent, experience and your desire for the very best professional service that your hard earned money can buy.
icloak - be invisible on the internet icloak hides your tracks intrusive advertisers, surreptitious government surveillance, thieving hackers and malicious viruses and malware. you can plug in and use icloak at home or at work on virtually any computer -pc or mac.
take a look at the first ever growth hacker's conference on oct 26th. growth hacking is disrupting marketing as we know it. at consumer internet companies big and small, the drive to find scalable and repeatable ways to gain customers is blurring the lines between marketing, product management, and engineering. we're seeing a new role emerge across silicon valley: the 'growth hacker' and entire growth teams are combining quantitative direct marketing techniques, data modeling, relentless testing, and the harnessing of distribution existing networks. facebook, twitter, linkedin, and airbnb are just a few companies who've grown to millions of users with this new breed of marketers leading the charge. growth hackers conference is a event for technology entrepreneurs, marketers, developers, and investors to learn from the best growth hackers in silicon valley. join co-hosts erin turner and g
the hackers conference 2014 - international it security conference
the hackers conference is an unique event, where the elite of the hacker world, leaders in the information security industry and the internet community meet face to face to join their efforts to cooperate in addressing the most topical issues of the it world.
w4rri0r - hacking is not a crime - it's an art of awareness
w4rri0r.com are the great resource for information security professionals and researcher. w4rri0r mission to make the information systems more secure, more aware, more reliable and protect against possible security breaches.