nealkrawetz.net
Hacker Factor: Gender Guesser
http://www.nealkrawetz.net/GenderGuesser.php
Black Hat Briefings, USA 2006. The words you use can disclose identifying features. This tool attempts to determine an author's gender based on the words used. Type or paste a writing sample for gender analysis. Then click on "Analyze" to see the results. For best performance, use at least 300 words - more words is generally more accurate. A simplified version of this work was implemented as the Gender Genie. No longer available). They showed that fewer words were needed and that writing styles varie...
nealkrawetz.com
Hacker Factor: Gender Guesser
http://www.nealkrawetz.com/GenderGuesser.php
Black Hat Briefings, USA 2006. The words you use can disclose identifying features. This tool attempts to determine an author's gender based on the words used. Type or paste a writing sample for gender analysis. Then click on "Analyze" to see the results. For best performance, use at least 300 words - more words is generally more accurate. A simplified version of this work was implemented as the Gender Genie. No longer available). They showed that fewer words were needed and that writing styles varie...
nealkrawetz.org
Hacker Factor: Gender Guesser
http://www.nealkrawetz.org/GenderGuesser.php
Black Hat Briefings, USA 2006. The words you use can disclose identifying features. This tool attempts to determine an author's gender based on the words used. Type or paste a writing sample for gender analysis. Then click on "Analyze" to see the results. For best performance, use at least 300 words - more words is generally more accurate. A simplified version of this work was implemented as the Gender Genie. No longer available). They showed that fewer words were needed and that writing styles varie...
hitechpi.com
Website Security with a Little Obscurity | Hi-Tech P.I.
https://hitechpi.com/2011/11/13/website-security-with-a-little-obscurity
Helping people see the forest for the trees, online. How the Internet Works. Website Security with a Little Obscurity. While strolling around the Internet the other day, I stumbled upon this solid post on www.hackerfactor.com. And thought I would share. Security by Obscurity is a term that describes security through secrecy. If you don’t tell anyone that you have a million dollars buried in your backyard, then it is “secure” because nobody will find it. Similarly, the popular vBulletin. Web forum softwar...
hackercareer.blogspot.com
Hacker career: October 2016
http://hackercareer.blogspot.com/2016_10_01_archive.html
A Two Way Sword - Used To Protect or Attack. Sunday, October 23, 2016. Https:/ www.coresecurity.com/. Https:/ www.pcisecuritystandards.org/. Http:/ www.beyondsecurity.com/. Https:/ www.offensive-security.com/. Friday, October 7, 2016. Http:/ en.wikipedia.org/wiki/Spyware. Http:/ www.wikihow.com/Remove-Spyware. Http:/ anti-spyware-review.toptenreviews.com/. Http:/ www.youtube.com/results? Https:/ www.hackerfactor.com/. Http:/ hack4hacking.blogspot.in/. Http:/ www.hackerindustries.com/. Computer Law / Links.
hitechpi.com
Hi-Tech P.I. | Hi-Tech P.I.
https://hitechpi.com/author/holmesforhire
Helping people see the forest for the trees, online. How the Internet Works. Author: Hi-Tech P.I. In conducting investigations online the use of social media is an invaluable tool. I doubt that any investigator would disagree with me that these days a suspect’s online profiles are a virtual dumpster. You may be thinking, “A dumpster? What’s so great about a smelly dumpster? I would highly recommend prior to conducting any online investigation that you not only hide your IP address by using a proxy servic...
SOCIAL ENGAGEMENT