background preloader

Tech Loading Bay

Facebook Twitter

AutoHotKey

Dark Net. IRC. Video: Schedule your work. GitHub For Beginners: Don't Get Scared, Get Started. It's 2013, and there's no way around it: you need to learn how to use GitHub. Why? Because it's a social network that has completely changed the way we work. Having started as a developer's collaborative platform, GitHub is now the largest online storage space of collaborative works that exists in the world. Whether you're interested in participating in this global mind meld or in researching this massive file dump of human knowledge, you need to be here. See also: GitHub For Beginners: Commit, Push And Go. Meernotes Puts the Look and Feel of a Moleskine on your iPhone. Minilogs Turns Your Media Links Into Playlists. What Would You Do For Bitcoin? - For Bitcoin. Hacker Fundamentals: The Everyman's Guide to How Network Packets Are Routed Across the Web. Hacker Fundamentals: The Everyman's Guide to How Network Packets Are Routed Across the Web In general, hacking and information security is not just one discipline, but a number of them, and today we will look into some of the networking concepts.

Hacker Fundamentals: The Everyman's Guide to How Network Packets Are Routed Across the Web

How Secure Are You Online: The Checklist. Computer and Network Security Tutorials and Classes. GOOGLE HACKING TO HACK INTO A LIVE SECURITY CAMERA « FREE EDUCATION. Google serves almost 80 percent of all search queries on the Internet, proving itself as the most popular search engine.

GOOGLE HACKING TO HACK INTO A LIVE SECURITY CAMERA « FREE EDUCATION

However Google makes it possible to reach not only the publicly available information resources, but also gives access to some of the most confidential information. In this post I will show how to use Google Hacking to Hack into a Live Security Camera. There exists many security cameras used for monitoring places like parking lots, college campus, road traffic etc. which can be hacked using Google so that you can view the images captured by those cameras in real time. So how do you find such cameras.

Just google these following strings and select any result(Top 5 recommended) and you will gain access to the live camera which has full controls. How To Use Google Search Engine for Hacking. How to Watch Security Camera Streams on the Internet: 6 steps. Favorite This Article Edit Article Search Queries.

How to Watch Security Camera Streams on the Internet: 6 steps

How to use Google for Hacking, how to hack security cameras, Hacking Personal and Confidential Documents ~ Dunya Infocom blog. Google serves almost 80 percent of all search queries on the Internet, proving itself as the most popular search engine.

How to use Google for Hacking, how to hack security cameras, Hacking Personal and Confidential Documents ~ Dunya Infocom blog

However Google makes it possible to reach not only the publicly available information resources, but also gives access to some of the most confidential information that should never have been revealed. In this post I will show how to use Google for exploiting security vulnerabilities within websites. The following are some of the hacks that can be accomplished using Google 1. Hacking Security Cameras There exists many security cameras used for monitoring places like parking lots, college campus, road traffic etc. which can be hacked using Google so that you can view the images captured by those cameras in real time.

Popular Surveillance Cameras Open to Hackers, Researcher Says. In a world where security cameras are nearly as ubiquitous as light fixtures, someone is always watching you.

Popular Surveillance Cameras Open to Hackers, Researcher Says

But the watcher might not always be who you think it is. Three of the most popular brands of closed-circuit surveillance cameras are sold with remote internet access enabled by default, and with weak password security — a classic recipe for security failure that could allow hackers to remotely tap into the video feeds, according to new research. The cameras, used by banks, retailers, hotels, hospitals and corporations, are often configured insecurely — thanks to these manufacturer default settings, according to researcher Justin Cacak, senior security engineer at Gotham Digital Science. As a result, he says, attackers can seize control of the systems to view live footage, archived footage or control the direction and zoom of cameras that are adjustable. “All the ones we found have remote access enabled by default,” Cacak says. Internet protocol suite.

The Internet protocol suite is the computer networking model and set of communications protocols used on the Internet and similar computer networks.

Internet protocol suite

It is commonly known as TCP/IP, because its most important protocols, the Transmission Control Protocol (TCP) and the Internet Protocol (IP), were the first networking protocols defined in this standard. Often also called the Internet model, it was originally also known as the DoD model, because the development of the networking model was funded by DARPA, an agency of the United States Department of Defense. TCP/IP provides end-to-end connectivity specifying how data should be packetized, addressed, transmitted, routed and received at the destination. The TCP/IP model and related protocol models are maintained by the Internet Engineering Task Force (IETF). History[edit] Early research[edit] Diagram of the first internetworked connection Specification[edit] How to Spy on Your "Buddy's" Network Traffic: An Intro to Wireshark and the OSI Model.

How to Spy on Your "Buddy's" Network Traffic: An Intro to Wireshark and the OSI Model Wouldn't it be nice to just sit at your buddy's house, plug into his network, and see exactly what he's doing?

How to Spy on Your "Buddy's" Network Traffic: An Intro to Wireshark and the OSI Model

What if it was as easy as that? What makes packet sniffers like Wireshark such potent tools is that a majority of local area networks (LANs) are based on the shared Ethernet notion. In a shared Ethernet, you can think of all of the computers in a LAN as being plugged into the same wire, and all of the traffic that travels through it can be captured. Packet sniffers are more formally known as network analyzers and protocol analyzers. Everything. For example, assume that your network card picks up a packet from someone else's network. Hacker Fundamentals: A Tale of Two Standards. Hacker Fundamentals: A Tale of Two Standards If you read my article on the OSI model, you got a good overview on communications from that model's perspective, but how does that relate to TCP/IP?

Hacker Fundamentals: A Tale of Two Standards

We're going to take it a step further, getting into the idea behind the two address concept. How does an IP address and a MAC address work together? What is the TCP Split-Handshake Attack and Does It Affect Me? If you’ve followed security news over the past few days, you’ve probably seen a lot of hoopla about a TCP split-handshake vulnerability that can affect firewalls and other networking and security devices.

What is the TCP Split-Handshake Attack and Does It Affect Me?

Many of the Media’s articles characterize this complicated TCP connection attack as, “a hacker exploit that lets an attacker trick a firewall and get into an internal network as a trusted IP connection” or as a “hole” in firewalls. I’m not sure that these descriptions properly characterize this vulnerability, and I suspect many administrators may not really understand how this attack works (let alone what it does and doesn’t allow an attacker to accomplish). I hope to try and rectify that in this post. Before I jump into a description of this attack, WatchGuard XTM owners probably want to know if they are vulnerable to this attack. The answers is, No. Bitcoin - P2P digital currency. 8 Wireshark Filters Every Wiretapper Uses to Spy on Web Conversations and Surfing Habits. 8 Wireshark Filters Every Wiretapper Uses to Spy on Web Conversations and Surfing Habits In my Wireshark article, we talked a little bit about packet sniffing, but we focused more on the underlying protocols and models.

8 Wireshark Filters Every Wiretapper Uses to Spy on Web Conversations and Surfing Habits

Our Favorite Keyboard Shortcuts. A Hitchhiker's Guide to the Internet: Today and Now, How It All Connects. A Hitchhiker's Guide to the Internet: Today and Now, How It All Connects In the first part of this series, we took a factual and technical look at the history of the Internet. I explained how all of these wires and servers got here in the first place. Obviously, a firm did not just create and build the Internet around 1995! Now that we know how the Internet came to be, we can get into the really fun stuff—what the Internet looks like now!

Well, that's not quite the network design I was talking about, but it does show what the Internet looked like back in 2007 before the great Facebook/MySpace War of '09. Sending an email to your friend is simple enough. A Hitchhiker's Guide to the Internet: A Brief History of How the Net Came to Be. A Hitchhiker's Guide to the Internet: A Brief History of How the Net Came to Be You walk over to your laptop, wiggle your mouse to wake up the screen, then fire up your browser to come visit Null Byte. Catching the article about Anonymous and how they presumably will not take down the Internet, you find yourself wondering... how would someone take down the Internet? Could they even do it? The Internet is definitely a cool place, but a lot of people don't understand how it is all connected together. Technorati. The Lifehacker Tech Dictionary.

32-bit vs. 64-bit. Chrome tells me that's why it can't run Java 7 and I don't know why. Bluetooth could be included and maybe how it differs from wireless (802.11). You included NAS, might as well include SAN and explain the difference. You mention Cloud Storage, what about Cloud Computing? MHz/GHz. Never Miss A Word. 75 useful Keyboard Shortcuts for Evernote . Top 10 Pervasive Tech Myths That Are Only Wasting Your Time. Lifehacker: The Guide to Working Smarter, Faster, and Better - Chapter 6, Streamline Common Jobs. No doubt you perform dozens of repetitive actions every day, such as typing www.google.com into your browser's address bar, or clicking the Start button and navigating to the Programs menu, or typing "Let me know if you have any questions" at the end of an e-mail.

These are opportunities for shortcuts that can add up to large savings over time. Every movement, every task, every action is a candidate for optimization and streamlining. The Main Tap › PatternTap. A Guide to Torrent Acronyms: How to Choose the Right Download for Your Damaged or Missing Media. A Guide to Torrent Acronyms: How to Choose the Right Download for Your Damaged or Missing Media. Automate Just About Anything on Your Windows PC, No Coding Required. The Stupid Things You Do Online (and How to Fix Them) Tiny Satellite To Scrawl Morse Code Messages Across the Night Sky. Automate Everyday Tasks at Home, at Your Computer, and on Your Phone. Processing.org. BODYBUGG. Top 10 Ways to Get the Most Out of Your Gear (Without Spending Extra Money) That answer comes down to opinion, needs, individual skills, budget and time constraints:

How We Predict Each Other's Choices. Destress Your Tech with a Delete Binge. Top 10 Warranty-Voiding Hacks. Feel, Act, Make sense. Computerspielemuseum. Cool Websites, Software and Internet Tips. Alchemy - Open Source AI. Nerd Nearby - Aggregating social media near you.

Discover, Evaluate, and Shop with the Gadget Experts at Retrevo. A Blog on Web 2.0 Apps and Softwares. MYO - The Gesture Control Armband. Atooma Automates Almost Anything In a Few Taps, Is Like IFTTT for Your Android Phone. How to Break Your Media Addiction and Clean Up Your Digital Clutter.

Top 10 Simple Things Every Computer User Should Know How to Do. How to Run Mac OS X Inside Windows Using VirtualBox.