-
Thieves are still prepared to put themselves at serious risk of injury, or even death through electrocution, to hack through cables for a few pounds of wiring.
BBC: Police target ?770m worth of metal cable thefts
-
Guides lead trekkers up precipitous verges and across rivers, and rusty machetes are used to hack paths through the thick, thorny rainforest.
BBC: Gorillas in the mix in Uganda
-
Depending on the time of year, you may need to hack your way through high grass and brush for part of the climb, but the remoteness and the stillness are wonderful.
BBC: Search the
-
Should the urge to liberate the Droid DNA overwhelm a sense of caution (or a wait for the Deluxe), you'll find both the hack and unofficial help through the source links.
ENGADGET: Hack gives HTC Droid DNA the bootloader unlock that Verizon took away
-
Microsoft survived the Red Ring, Sony has pulled through the hack and Nintendo is combating a far greater foe, irrelevancy, but all in all it looks like the video game union is fairly strong.
FORBES: Sony Brings PSN Online At Last
-
In the case of Diablo III, the point is to hack and burn your way through teeming hordes of monsters while scooping up bright, shiny loot on the way.
FORBES: Why Cheating In Video Games Is Lame - Thoughts On 'Diablo 3' Exploits And The RMAH
-
G33k3r, Rohan32 and others at XDA-Developers may just save us from camping at the Google Play storefront through a new software hack.
ENGADGET: Rough hack converts an Optimus G to a Nexus 4, minus the constant sellouts
-
While it took just five supporters to hack HBGary, hundreds more poured through the e-mails to identify incriminating evidence, leading to more press reports on the incident.
FORBES: Is Anonymous The New WikiLeaks?
-
Then I imagine cheating my way through with something like an invincibility hack and I weigh out how much fun it would have been.
FORBES: Why Cheating In Video Games Is Lame - Thoughts On 'Diablo 3' Exploits And The RMAH
-
One expert said that the Twitter hack probably happened after an employee's home or work computer was compromised through vulnerabilities in Java, a commonly used computing language whose weaknesses have been well publicized.
NPR: Twitter Says Hackers Compromise 250K Accounts