background preloader

Ethics

Facebook Twitter

Why sleep deprivation can make you unethical - Post Leadership. Posted at 10:21 AM ET, 05/13/2011 May 13, 2011 02:21 PM EDT TheWashingtonPost New research shows that sleep deprivation has worse effects than just the occasional mistake or error—and can cost organizations just as much, if not more.

Why sleep deprivation can make you unethical - Post Leadership

Humanity Healing International. “Until he extends his circle of compassion to include all living things, man will not himself find peace.” ~ Albert Schweitzer 1.

Humanity Healing International

Acceptance and practice of the philosophy of the interconnection and interrelation among all living and sentient beings. “A man is ethical only when life, as such, is sacred to him, that of plants and animals as that of his fellow men, and when he devotes himself helpfully to all life that is in need of help.” (2) Facebook. Applied Ethics Resources on World Wide Web. Ethics. The NSA has its own team of elite hackers. NSA headquarters at Fort Meade, MD where TAO's main team reportedly works (Wikipedia) Our Post colleagues have had a busy day.

The NSA has its own team of elite hackers

First, they released documents revealing the U.S. intelligence budget from National Security Agency (NSA) leaker Edward Snowden. Then they recounted exactly how the hunt for Osama bin Laden went down. In that second report, Craig Whitlock and Barton Gellman shared a few tidbits about the role of the government's hacking unit, Tailored Access Operations (TAO) in the hunt, writing that TAO "enabled the NSA to collect intelligence from mobile phones that were used by al-Qaeda operatives and other 'persons of interest' in the bin Laden hunt. " Where to start in Reverse Engineering? « malwarereversing.

Well given the recent take down of reverse-engineering.net for unknown reasons I’ve decided to mirror some content here.

Where to start in Reverse Engineering? « malwarereversing

I’ve formatted out some of the bits like user posts identities and cleaned up some formatting. Other than that I have NOT link checked so not sure what are good/bad links here. Ethical Hacking. The Ethical Hacker Network. Darknet - The Darkside - Ethical Hacking, Penetration Testing & Computer Security. How To Hide Emails From Government Snooping : How To Become A Hacker. The Best Hacking Tutorial Sites - Learn Legal Hacking. A History of Hacktivism [INFOGRAPHIC] Hacktivism has hit its tipping point.

A History of Hacktivism [INFOGRAPHIC]

The year 2011 had the most hacktivism-related crimes in history. Hacktivists use digital tools to breach security systems to protest or take a stand on political issues. The New Age hacker is motivated by the pursuit of justice, and is often hard to stop. On Tuesday, Shawn Henry, an FBI agent who will soon leave his post, told the Wall Street Journal that cyber criminals are too powerful for the government to stop.

He also said the U.S.' Top 10 Web hacking techniques of 2010 revealed. Network World - A Web hack that can endanger online banking transactions is ranked the No. 1 new Web hacking technique for 2010 in a top 10 list selected by a panel of experts and open voting.

Top 10 Web hacking techniques of 2010 revealed

Called the Padding Oracle Crypto Attack, the hack takes advantage of how Microsoft's Web framework ASP.NET protects AES encryption cookies. Hacktivism/Digital Activism/Online Privacy, Security,Anonymity. Hacking. Hacking & Hacktivism. Hacking World. Hacking Articles and Tools. Today I'm going to show you how to create an encrypted hidden container volume using Truecrypt.

Hacking Articles and Tools

What is a hidden volume? Lets say that you have some very sensitive files that is encrypted on your computer and someone (roommate, government, someone with a gun) wants to look at those files. Hacking, Security Papers. 80+ Best Free Hacking Tutorials. Learning to become hacker is not as easy as learning to become a software developer. I realized this when I started looking for learning resources for simple hacking people do. Even to start doing the simplest hack on own, a hacker requires to have in depth knowledge of multiple topics. Some people recommend minimum knowledge of few programming languages like C, Python, HTML with Unix operating system concepts and networking knowledge is required to start learning hacking techniques.

Free Hacking Tools. Hack Tools. Web security tools. Penetration Testing Tools. Forensics « Null Byte How-Tos. Hack Like a Pro: Digital Forensics for the Aspiring Hacker, Part 16 (Extracting EXIF Data from Image Files)

Forensics « Null Byte How-Tos

Computer Security. Anonym. (36) Hacked, Time To Change Your Password. Anonymous is hacking Israeli Web sites. To protest what they call the "barbaric, brutal and despicable treatment of the Palestinian people," hackers from the collective Anonymous have been attacking a number of Israeli Web sites, including Israel’s Foreign Ministry and the municipal Web site for Tel Aviv.

Anonymous is hacking Israeli Web sites

Israel, all your base are belong to us.— Anonymous (@YourAnonNews) November 16, 2012 The group has also deleted the databases of the Israel Ministry of Foreign Affairs and Bank of Jerusalem, and leaked e-mail addresses and passwords for other sites. The campaign began Thursday night with coordinated attacks on several Israeli sites, including the Israeli Defense Forces blog and a private Israeli surveillance and security company. By Friday, the group took credit for bringing down 600 Israeli sites, using the hashtag #opisrael to boast about their progress on Twitter. TANGO DOWN - president.gov.il | #Anonymous #OpIsrael— Anonymous (@YourAnonNews) November 17, 2012.

Chaos Theory. Superstring theory - chaos math. Greed, Secrecy, Deception & Genocide. Destructive practices... Destructive Practices. Security. Top 15 Open Source/Free Security/Hacking Tools. 1.

Top 15 Open Source/Free Security/Hacking Tools

Nmap Nmap (“Network Mapper”) is a free and open source (license) utility for network discovery and security auditing. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics.

Hacktivism. Hackers & hacking. Top Android Hacking Tools. Android, the best Operation System developed by Google. Now only 1 month to go the launching of Android 4.4 KitKat mobile operating system.It is It is expected that Google will now make the announcement in November, instead of October 28 as planned earlier, according to a report by Phones Review website.But never mind.. - StumbleUpon.  Home of Johnny Long and Hackers for Charity, Inc. [C/C++] Reverse Engineering Tutorial for newbies.