background preloader

Informatique

Facebook Twitter

How To Become A Hacker. Copyright © 2001 Eric S.

How To Become A Hacker

Raymond As editor of the Jargon File and author of a few other well-known documents of similar nature, I often get email requests from enthusiastic network newbies asking (in effect) "how can I learn to be a wizardly hacker? ". Back in 1996 I noticed that there didn't seem to be any other FAQs or web documents that addressed this vital question, so I started this one. A lot of hackers now consider it definitive, and I suppose that means it is. Still, I don't claim to be the exclusive authority on this topic; if you don't like what you read here, write your own.

Securite debutant. 70 Things Every Computer Geek Should Know. The term ‘geek’, once used to label a circus freak, has morphed in meaning over the years. What was once an unusual profession transferred into a word indicating social awkwardness. As time has gone on, the word has yet again morphed to indicate a new type of individual: someone who is obsessive over one (or more) particular subjects, whether it be science, photography, electronics, computers, media, or any other field.

Simple Steps to Hack a Smartphone. What kind of information do you have on your business card?

Simple Steps to Hack a Smartphone

Company name? Check. He can hack into your smartphone with 1 SMS. SINGAPORE - Rik Ferguson looks like someone not to be messed with.

He can hack into your smartphone with 1 SMS

The humorous IT security expert, who sports numerous tattoos and has a penchant for heavy metal music, can hack into your mobile phone with a single SMS. He can then remotely listen to your calls, read text messages and even access the password to your online bank account. "It's creepy, isn't it? " said Mr Ferguson, who is global vice-president for security research for IT firm Trend Micro, as he demonstrated the hack. Yet, many users still refuse to believe how vulnerable they are when they use mobile devices, he added. Technology experts are warning that mobile devices have become the next lock to pick for cyber criminals. One in three mobile users globally has been exposed to some form of mobile cyber crime, according to a 2012 report by anti-virus firm Norton by Symantec. This smartphone hack is cool... literally. [PentesterLab] Learn Penetration Testing: The Right Way.

Exploit Exercises. Des exercices pour vous former au pentest. Des exercices pour vous former au pentest.

Des exercices pour vous former au pentest

Partage photos facile - la mère Zaclys. Responsive design: comment faire? Une infographie très complète par Splio sur le responsive design et la façon de l’implémenter.

Responsive design: comment faire?

Malgré la complexité du sujet le propos est clair concernant la mise en place des media queries selon la taille d’écran. Quelques éléments d’information avant de découvrir l’infographie. Pourquoi faire du responsive design? Avec le développement des smartphone et des consultations depuis un mobile le responsive design n’est plus une option. C’est la seule technique qui permet de développer un seul site adapté à tous les environnements: mobile, tablette, fixe. Comment faire du responsive design? 10 conseils issus de l’infographie:

Achat matériel /vente liée

Logithèques, drivers, plugs. Cracker. Linux. Aide informatique. Apprendre à coder. Astuces PC. Formal Models and Techniques for Analyzing Security Protocols. Publication Parution du livre "Formal Models and Techniques for Analyzing Security Protocols / Cryptology and Information Security Series (Vol.5)", co-écrit par Steve Kremer (équipe-projet Secsi) et Véronique Cortier (équipe-projet Cassis).

Formal Models and Techniques for Analyzing Security Protocols

Les protocoles de sécurité sont des programmes distribués, omniprésents dans notre quotidien : banque en ligne, commerce électronique, ou encore téléphonie mobile. Leur but est de garder nos transactions et données personnelles confidentielles. Comme ces protocoles s'exécutent sur des réseaux publics et non sûrs, tels qu'Internet, leur conception est particulièrement délicate.Cet ouvrage dresse un état de l'art du domaine de l'analyse formelle des protocoles de sécurité à travers dix chapitres, écrits par des experts internationaux. Concepteur de shields pour Arduino, distributeur officiel Arduino en France - Snootlab.

Serveur FTP. User account. 20 Arduino projects of 2012. While looking for ideas for new some new project I noticed there aren’t many lists of Arduino projects online so I decided to make one and in the last few days I’ve been carefully digging Reddit (r/Arduino) and the Arduino forum until I ended up with a list of 20 Arduino projects.

20 Arduino projects of 2012

All the projects in this list follow two simple criteria: They’ve been published/released in 2012.They provide quite detailed info (the more the better). The second criteria forced me to discard some amazing projects, but I didn’t want this post to be a simple showcase of cool Arduino projects, I wanted it to be an useful reference for Arduino users. 20. arduino-l3dgecomm This project aims to integrate a 3D world with real sensors and motors, more a proof of concept than a proper project, but still an interesting idea. 19.

A custom PCB designed in the shape of a Christmas tree, an Atmel ATTiny45 microcontroller, 5 IO pins, and 20 LEDs make a perfect Christmas ornament. 18. 17. 16. 15. 14. 13. 12. 11. 10. Kernel Panic - Spring. Overview: For the latest news and/or assistance, try the KP forum or go to #kp when you log onto the lobby.

Kernel Panic - Spring

Kernel Panic is a game about computers. Systems, Hackers and Networks wage war in a matrix of DOOM! The only constraints are time and space; unlike other real time strategy games, no resource economy exists in KP. All units are free in this game, every factory built will be spamming units at all times. Boundless - Textbooks. Transformez vos tablettes et ordinateurs en cartables numériques. UMR5505. Pourquoi taper à 10 doigts. Geek.