Raymond As editor of the Jargon File and author of a few other well-known documents of similar nature, I often get email requests from enthusiastic network newbies asking (in effect) "how can I learn to be a wizardly hacker? ". Hack proofing your network. Truth about HTML Guardian. To hack this de facto world standard of protection I need 5-7 minutes.
The Document Which Was Formerly Called The MIT Guide to Lockpicking. An interesting new lockpicking technique has been making its way around the internet.
This technique uses 'bump keys' to open locks in a similar fashion to lockpicking guns but without requiring specialized hardware. You can read about bump keys in this document, and see a news report about them here. --- Presenting ---(drumroll please) I am told that the university which has its' name associated with this document would prefer not to. Fine. I will now no longer refer to it as The MIT Guide To Lockpicking or The MIT Lockpicking Guide. Which is too bad in a way. My original copy of this file was a text file zipped up with several GIF's. If you prefer, the entire thing is available as a PDF file or the original zipped postscript that the PDF was generated from.
Nearly half of all the illustrations appear in chapter nine, so if that one takes a little while for your browser to fetch try to be patient. Otherwise, enjoy the file. . - Akira - Dave Ferret Ted the Tool February 14, 1992 Distribution.
Google Hacks 2.0. Google Hacks 2.0. SQL Injection Attacks by Example. A customer asked that we check out his intranet site, which was used by the company's employees and customers.
This was part of a larger security review, and though we'd not actually used SQL injection to penetrate a network before, we were pretty familiar with the general concepts. We were completely successful in this engagement, and wanted to recount the steps taken as an illustration. "SQL Injection" is subset of the an unverified/unsanitized user input vulnerability ("buffer overflows" are a different subset), and the idea is to convince the application to run SQL code that was not intended. If the application is creating SQL strings naively on the fly and then running them, it's straightforward to create some real surprises. Another Hacker’s Laptop, Cellphones Searched at Border. A well-known and respected computer-security researcher was detained for several hours Wednesday night by border agents who searched his laptop and cellphones before returning them to him.
The researcher, who goes by the hacker handle Moxie Marlinspike, was met by two U.S. Customs and Border Protection agents at the door of his plane when he arrived at JFK airport on a Jet Blue flight from the Dominican Republic. The agents escorted him to a detention room where they held him for 4 1/2 hours, he says. During that time, a forensic investigator arrived and seized Marlinspike’s laptop and two cellphones, and asked for his passwords to access his devices. Marlinspike refused, and the devices were later returned to him. PDFUnlock! - Unlock secured PDF files online for free. Completely Free Ebooks.
Hint: It Ain't Twitter. (aka: An Open Letter to the Next Big Social Network. I've held off writing this post for a long time, because I couldn't quite get my head around all the issues.
It wouldn't be accurate to say there's something "wrong" with Facebook, and it's not like I don't spend a shitload of time ego-whoring around on Twitter too. Let's face it: I'm completely & utterly addicted to social networks & tha Interwebs. but: Something is Still Missing. Something is Wrong on the Internet and it's keeping me awake at night. however, i think i finally figured out what "IT" is... Assertion #1: Facebook doesn't get Intimacy. Facebook is full of my "friends", but it's not a great place to hang with my BEST friends (aka "BFF"). Now before you lose your shit, i know many of you are saying: a) Dave, you're full of crap -- intimacy doesn't come from a computer, orb) Dave, you're full of crap -- Facebook has *plenty* of intimacy, orc) Dave, you're full of crap -- the only thing that might kill Facebook is Twitter, which is the exact opposite of intimacy (true) Holy.
Googles dark side - google conspiracy.