background preloader

Hacking

Facebook Twitter

Index of /article/book. Anonymous OS version 0.1 released and detailed. This week its been quietly announced that members of the hacker group known as Anonymous are releasing their very own desktop operating system.

Anonymous OS version 0.1 released and detailed

This system is known at the moment as Anonymous-OS and is currently in as infant a stage as it possibly could be at version 0.1. Hacker Attack Tools. Create The Ultimate USB Rescue Drive « Not Just A Random BlogNot Just A Random Blog. Ever been at a friends house and needed to edit a photo, but all they have is MS Paint?

Create The Ultimate USB Rescue Drive « Not Just A Random BlogNot Just A Random Blog

Or have you ever been at grandmas and she asks you to remove the hundreds of viruses and spywares (she got from clicking the “You’ve won! Download this for your prize” banners), but she has no anti-spyware software and still on dial-up? Well that’s where a rescue USB drive comes in handy. There are many programs that can be installed and run from a USB drive. You can even run entire operating systems from one, which makes it easier to remove viruses buried in current OS files. These make it much easier to find and run the programs off of your USB drive, but do not work with every program.

Use these programs to edit images and view them. Microsoft Word does not come installed on most computers and WordPad just doesn’t cut it so here are some document based portable programs. Googlehacks and how to view blocked sites. Recover Data Like a Forensics Expert Using an Ubuntu Live CD. There are lots of utilities to recover deleted files, but what if you can’t boot up your computer, or the whole drive has been formatted?

Recover Data Like a Forensics Expert Using an Ubuntu Live CD

We’ll show you some tools that will dig deep and recover the most elusive deleted files, or even whole hard drive partitions. We’ve shown you simple ways to recover accidentally deleted files, even a simple method that can be done from an Ubuntu Live CD, but for hard disks that have been heavily corrupted, those methods aren’t going to cut it. In this article, we’ll examine four tools that can recover data from the most messed up hard drives, regardless of whether they were formatted for a Windows, Linux, or Mac computer, or even if the partition table is wiped out entirely.

Turn an Old Computer into a Networked Backup, Streaming, or Torrenting Machine with FreeNAS. How do I access blocked website? Top 5 cloud apps for Testing Cloud computing is changing how we use computers today.

How do I access blocked website?

It has found applications in several industries from technology, IT, automotive, and retail. Companies are reinventing themselves through cloud technologies. In this article, let’s find out how mobile app testing programs are using cloud technology. Cloud computing has three distinct incarnations, Software as a Service (SaaS), ... Phantom – Mammoth in the sky Phantom eye – a mammoth unmanned aerial vehicle developed by Boeing phantom works is a liquid hydrogen powered spy plane which will be used by US Army for their combat operations. Microsoft Surface Pro 2 to be launched After Google and Apple, Microsoft has made its ‘big’ announcement for the month. LIFE .. has a bigger meaning to it ..than we know !!!!!

Today in this modern world, Science and technology have really made our lives easy and simple. What IBM, Google & Amazon thinks about Big Data. 70 Things Every Computer Geek Should Know. The term ‘geek’, once used to label a circus freak, has morphed in meaning over the years. What was once an unusual profession transferred into a word indicating social awkwardness. As time has gone on, the word has yet again morphed to indicate a new type of individual: someone who is obsessive over one (or more) particular subjects, whether it be science, photography, electronics, computers, media, or any other field. Cracking_wpa. Version: 1.20 March 07, 2010 By: darkAudax Introduction This tutorial walks you through cracking WPA/WPA2 networks which use pre-shared keys.

cracking_wpa

I recommend you do some background reading to better understand what WPA/WPA2 is. The Wiki links page has a WPA/WPA2 section. The best document describing WPA is Wi-Fi Security - WEP, WPA and WPA2. WPA/WPA2 supports many types of authentication beyond pre-shared keys. aircrack-ng can ONLY crack pre-shared keys. Top 5 Websites To Learn How To Hack Like A Pro.

You might be surprised to learn just how many people want to learn how to hack.

Top 5 Websites To Learn How To Hack Like A Pro

The stereotype is that of the young college guy – a computer science major for sure – who spends his evenings and weekends writing up intricate hacking scripts to break into whatever computer system he can get his hands on. The truth is that what was once a male-dominated community is fast changing into one that includes folks – men and women – from many walks of life, from many countries and with many backgrounds. A recent CNET article about DEFCON makes note of the fact that claims of sexual harassment and unwanted advances are increasing. This isn’t because hackers are getting more obnoxious or offensive, but because more female hackers are entering into the community and trying to find a home there, only to find insulting behavior, and other actions unbecoming of a gentleman.