background preloader

Hack

Facebook Twitter

L’éthique du hacker. Les révolutions commencent souvent par des histoires, des colères ou des frustrations a priori insignifiantes, anecdotiques. C’est le cas de la culture dite libre qui est probablement un des développements démocratiques les plus importants du numérique et dont l’origine n’a tenu qu’à un problème d’impression ! Un bourrage papier aux origines de la licence libre Nous sommes au début des années 80 quand Richard Stallman, informaticien au MIT, se met en rage contre le bourrage papier de son imprimante. Or, le programme qui gère la machine ne permet ni d’ouvrir le capot, ni de réparer ou améliorer le moteur. Les créateurs de programmes informatiques ont désormais le choix : soit ils revendiquent un droit d’auteur pour en empêcher toute copie et manipulation, soit ils mettent le logiciel sous licence libre et open source.

Du copyright au “copyleft” Des œuvres libres, mais pas libres de droits De fait, ces libertés ne s’opposent pas à la propriété. L’éthique du hacker En savoir plus.

Wikileaks

Jacob Appelbaum. Literally words — Graphing when your Facebook friends are awake. Learn the Wget Command with 20 Practical Examples. Wget lets you download Internet files or even mirror entire websites for offline viewing. Here are 20 practical examples for using the wget command. How do I download an entire website for offline viewing? How do I save all the MP3s from a website to a folder on my computer?

How do I download files that are behind a login page? Wget is a free utility – available for Mac, Windows and Linux (included) – that can help you accomplish all this and more. Mirror an entire website with wget Wget is extremely powerful, but like with most other command line programs, the plethora of options it supports can be intimidating to new users. 1. 2. 3. 4. 5. 6. 7. 8. Mirror websites with Wget 9. 10. 11. 12. 13. Wget for Downloading Restricted Content Wget can be used for downloading content from sites that are behind a login screen or ones that check for the HTTP referer and the User Agent strings of the bot to prevent screen scraping. 14. 15. 16.

Retrieve File Details with wget 17. 18. 19. 20. GEEKtyper.com.

#31c3

#30C3 30th Chaos Communication Congress - dec 2013. Download Sony Pictures Entertainment Hacked Files torrent. Kali Linux "NetHunter" — Turn Your Android Device into Hacking Weapons. The developers of one of the most advance open source operating system for penetration testing, 'KALI Linux' have announced yesterday the release of a new Kali project, known as NetHunter, that runs on a Google Nexus device.

Kali Linux is an open source Debian-based operating system for penetration testing and forensics, which is maintained and funded by Offensive Security, a provider of world-class information security training and penetration testing services. It comes wrapped with a collection of penetration testing and network monitoring tools used for testing of software privacy and security. After making its influence in hacker and security circles, Kali Linux has now been published with Kali Nethunter, a version of the security suite for Android devices. The tool is a mobile distribution designed to compromise systems via USB when installed and run on an Android phone.

Chaos Computer Club. Meet the Hackers Who Want to Jailbreak the Internet | Wired Enterprise. As part of the Indie Web movement, Harlan Wood wants to rebuild the internet — one block at a time. Photo: Klint Finley/WIRED PORTLAND, OREGON — One guy is wearing his Google Glass. Another showed up in an HTML5 t-shirt. And then there’s the dude who looks like the Mad Hatter, decked out in a top hat with an enormous white flower tucked into the brim.

At first, they look like any other gaggle of tech geeks. Packed into a small conference room, this rag-tag band of software developers has an outsized digital pedigree, and they have a mission to match. They call it the Indie Web movement, an effort to create a web that’s not so dependent on tech giants like Facebook, Twitter, and, yes, Google — a web that belongs not to one individual or one company, but to everyone. On any given day, you’ll find about 30 or 40 of them on an IRC chat channel, and each summer, they come together in the flesh for this two-day mini-conference, known as IndieWebCamp. A Web You Can Call Your Own — Tantek Çelik. Pourquoi je veux que ma fille soit un hacker. Voici la traduction d'un texte écrit par un papa. Il a suscité de nombreux commentaires dont celui-ci : « je ne vous connais pas, mais vous devez être le meilleur père qui soit. » On vous laisse juge :) Commençons par définir ce que j’entends par le terme « hacker ».

Il y a tellement de peurs, d’incertitudes et de doutes autour de ce terme. De grandes institutions de contrôle veulent que vous ayez peur des hackers, veulent que vous pensiez que l’état d’esprit des hackers est dangereux. Cette vision ne peut pas être plus éloignée de la réalité. Les hackers sont simplement des individus capables qui veulent comprendre les choses pour eux-même. Les hackers ne sont pas des consommateurs bêtes et disciplinés – alors que les grandes institutions continuent de laver le cerveau des citoyens pour en faire des esclaves du système qu’elles ont créé ; les hackers savent qu’une vie est possible en dehors de ces systèmes fondés sur la dépendance des utilisateurs, une vie meilleure.

Image Flickr CC. Geeks are the New Guardians of Our Civil Liberties. A decade-plus of anthropological fieldwork among hackers and like-minded geeks has led me to the firm conviction that these people are building one of the most vibrant civil liberties movements we’ve ever seen. It is a culture committed to freeing information, insisting on privacy, and fighting censorship, which in turn propels wide-ranging political activity. In the last year alone, hackers have been behind some of the most powerful political currents out there. Before I elaborate, a brief word on the term “hacker” is probably in order. Even among hackers, it provokes debate. Despite their differences, there are certain websites and conferences that bring the various hacker clans together. Take, for instance, the reaction to the Stop Online Piracy Act (SOPA), a far-reaching copyright bill meant to curtail piracy online.

The linchpin was a “Blackout Day”—a Web-based protest of unprecedented scale. The victory hinged on its broad base of support cultivated by hackers and geeks. Les geeks sont les nouveaux défenseurs des libertés publiques, par G. Coleman. Hacktivisme : les voies du pouvoir ne sont plus impénétrables. Le vrombissement incessant des ordinateurs dissipe les nuées âpres des gaz lacrymogènes, le clapotis furieux des claviers atténue le fracas des cocktails Molotov, et la révolte larvée d’esprits embrumés par l’opacité du pouvoir se présente à nouveau, l’œil résolu, le poing fermé, la transparence à la boutonnière. L’envie d’en découdre ne cache plus rien d’autre que le besoin de conquérir un savoir trop longtemps dissimulé. Internet a fait d’une révolte une révolution, et la liberté est à portée de clavier. L'un des premiers serveurs de l'infrastructure de Telecomix. Un processeur SPARC tournant sous Debian Lenny. source: Wikimedia commons Le hacker répond à cette question par un savoir technique avancé de la programmation informatique qu’il tâche de mettre en pratique sans suivre les règles établies.

Les liens entre savoir et pouvoir Le philosophe Francis Bacon, dans ses Meditationes Sacrae, considéra le lien entre le savoir et le pouvoir en indiquant que « le savoir est pouvoir ». Hijacking airplanes with an Android phone. Posted on 10 April 2013. An extremely well attended talk by Hugo Teso, a security consultant at n.runs AG in Germany, about the completely realistic scenario of plane hijacking via a simple Android app has galvanized the crowd attending the Hack In The Box Conference in Amsterdam today.

Teso, who has been working in IT for the last eleven years and has been a trained commercial pilot for a year longer than that, has combined his two interests in order to bring to light the sorry state of security of aviation computer systems and communication protocols. By taking advantage of two new technologies for the discovery, information gathering and exploitation phases of the attack, and by creating an exploit framework (SIMON) and an Android app (PlaneSploit) that delivers attack messages to the airplanes' Flight Management Systems (computer unit + control display unit), he demonstrated the terrifying ability to take complete control of aircraft by making virtual planes "dance to his tune.

" Kids can't use computers... and this is why it should worry you - Coding 2 Learn. TL;DR? Why not just go watch another five second video of a kitten with its head in a toilet roll, or a 140 character description of a meal your friend just stuffed in their mouth. “nom nom”. This blog post is not for you. The phone rang through to my workroom. It was one of the school receptionists explaining that there was a visitor downstairs that needed to get on the school’s WiFi network. iPad in hand I trotted on down to the reception to see a young twenty-something sitting on a chair with a MacBook on her knee. I smiled and introduced myself as I sat down beside her. She handed me her MacBook silently and the look on her face said it all. ‘I’ll need to be quick. She reevaluated her categorisation of me.

I looked at the MacBook. I handed back the MacBook and the woman opened up Safari. I’ve heard this sentence so many times now from students and staff, that I have a stock reaction. ‘Do you know where the proxy settings are?’ I don’t get a response. ‘So what do you teach?’ Parents. Manifestos for the Internet Age | Greyscale Press. By various authors March 2015 Manifestos for the Internet Age is a reader that collects manifestos of computer culture, starting with Ted Nelson (Computer Lib), through the GNU Manifesto and the Hacker Manifesto (1986), up to current influential positions such as The Cult of Done, the Cryptoparty Manifesto, the Critical Engineering Manifesto (Oliver, Savičić, Vasiliev), the 3D Additivist Manifesto (Morehshin Allahyari & Daniel Rourke), the Xenofeminist Manifesto (Laboria Cuboniks), and many other writings from both artists and activists. Some of the included writings: Work in progress This book is currently in beta status. Development is ongoing in the Git repository (participation is welcome).

The initial release was created over a week-end, during a Greyscale Press “BookLab” workshop held at the Fahrenheit39 Art Book Fair in Ravenna (read more about it here). Release History Gallery.