background preloader


Facebook Twitter

Hack a Day. Ransom note generator. Decrypted View Source of javascript Encrypted Web Pages. Hack N Mod - Amazingly Cool Hacks, Mods, and DIY Projects. IHTFP Hack Gallery: Welcome to the IHTFP Gallery! Hack I.T.: security through ... Silk. Cryptome. How To Become A Hacker. Copyright © 2001 Eric S.

How To Become A Hacker

Raymond As editor of the Jargon File and author of a few other well-known documents of similar nature, I often get email requests from enthusiastic network newbies asking (in effect) "how can I learn to be a wizardly hacker? ". Hack proofing your network. Truth about HTML Guardian. To hack this de facto world standard of protection I need 5-7 minutes.

Truth about HTML Guardian

Very strong cipher :) I must tell you how you can do it. Maybe I save some money for people, who want to buy this do-nothing software. So, I start. 1. Analyzing document. But we make sure that this is HTML and not something else by finding at the beginning and at the end of the document standard tags: <html>, <head> and others. The small formatting clears the situation - all content of page is placed in a script, being in a logical heading between the descriptors <script> and </script>. The language of script is not indicated, but I know that it is set as default as JavaScript.

PSP Hacks · PSP Go Hacks · PSP Homebrew, PSP Downloads, PSP Custom Firmware.

Y P S 3 W

The Document Which Was Formerly Called The MIT Guide to Lockpicking. An interesting new lockpicking technique has been making its way around the internet.

The Document Which Was Formerly Called The MIT Guide to Lockpicking

This technique uses 'bump keys' to open locks in a similar fashion to lockpicking guns but without requiring specialized hardware. You can read about bump keys in this document, and see a news report about them here. --- Presenting ---(drumroll please) I am told that the university which has its' name associated with this document would prefer not to. Fine. I will now no longer refer to it as The MIT Guide To Lockpicking or The MIT Lockpicking Guide. Which is too bad in a way. My original copy of this file was a text file zipped up with several GIF's. If you prefer, the entire thing is available as a PDF file or the original zipped postscript that the PDF was generated from.

Nearly half of all the illustrations appear in chapter nine, so if that one takes a little while for your browser to fetch try to be patient. Otherwise, enjoy the file. . - Akira - Dave Ferret Ted the Tool February 14, 1992 Distribution.

Web Tutoials

Google Hacks 2.0. Google Hacks 2.0. SQL Injection Attacks by Example. A customer asked that we check out his intranet site, which was used by the company's employees and customers.

SQL Injection Attacks by Example

This was part of a larger security review, and though we'd not actually used SQL injection to penetrate a network before, we were pretty familiar with the general concepts. We were completely successful in this engagement, and wanted to recount the steps taken as an illustration. "SQL Injection" is subset of the an unverified/unsanitized user input vulnerability ("buffer overflows" are a different subset), and the idea is to convince the application to run SQL code that was not intended. If the application is creating SQL strings naively on the fly and then running them, it's straightforward to create some real surprises. Another Hacker’s Laptop, Cellphones Searched at Border. A well-known and respected computer-security researcher was detained for several hours Wednesday night by border agents who searched his laptop and cellphones before returning them to him.

Another Hacker’s Laptop, Cellphones Searched at Border

The researcher, who goes by the hacker handle Moxie Marlinspike, was met by two U.S. Customs and Border Protection agents at the door of his plane when he arrived at JFK airport on a Jet Blue flight from the Dominican Republic. The agents escorted him to a detention room where they held him for 4 1/2 hours, he says. During that time, a forensic investigator arrived and seized Marlinspike’s laptop and two cellphones, and asked for his passwords to access his devices. Marlinspike refused, and the devices were later returned to him. PDFUnlock! - Unlock secured PDF files online for free. Completely Free Ebooks.

Hint: It Ain't Twitter. (aka: An Open Letter to the Next Big Social Network. I've held off writing this post for a long time, because I couldn't quite get my head around all the issues.

Hint: It Ain't Twitter. (aka: An Open Letter to the Next Big Social Network

It wouldn't be accurate to say there's something "wrong" with Facebook, and it's not like I don't spend a shitload of time ego-whoring around on Twitter too. Let's face it: I'm completely & utterly addicted to social networks & tha Interwebs. but: Something is Still Missing. Something is Wrong on the Internet and it's keeping me awake at night. however, i think i finally figured out what "IT" is... Assertion #1: Facebook doesn't get Intimacy. Facebook is full of my "friends", but it's not a great place to hang with my BEST friends (aka "BFF"). Now before you lose your shit, i know many of you are saying: a) Dave, you're full of crap -- intimacy doesn't come from a computer, orb) Dave, you're full of crap -- Facebook has *plenty* of intimacy, orc) Dave, you're full of crap -- the only thing that might kill Facebook is Twitter, which is the exact opposite of intimacy (true) Holy.

Building a WEB

Googles dark side - google conspiracy.