background preloader

H@CK!NG and other

Facebook Twitter

Awesome Tools To Extract Audio From Video. Free software downloads and software reviews. Fighting Hackers: Everything You've Been Told About Passwords Is Wrong | Wired Opinion. Security is not just about strong encryption, good anti-virus software, or techniques like two-factor authentication. It’s also about the “fuzzy” things … involving people. That’s where the security game is often won or lost. Just ask Mat Honan. We – the users – are supposed to be responsible, and are told what to do to stay secure. For example: “Don’t use the same password on different sites.” “Use strong passwords.” “Give good answers to security questions.” More services used = more passwords needed = more user pain … which means it only gets harder and harder to follow such advice. A security researcher, Dr. But they don’t have to be. And it starts with recognizing that a lot of security advice hurts more than it helps.

Security specialists – and many websites – prompt us to use a combination of letters, numbers, and characters when selecting passwords. Obviously, we need something that is both secure and which we can remember. We need new password approaches. Ten Must-Have Gmail Filters Available for Download. How to set up a safe and secure Web server. Fifteen years ago, you weren't a participant in the digital age unless you had your own homepage.

Even in the late 1990s, services abounded to make personal pages easy to build and deploy—the most famous is the now-defunct GeoCities, but there were many others (remember Angelfire and Tripod?). These were the days before the "social" Web, before MySpace and Facebook. Instant messaging was in its infancy and creating an online presence required no small familiarity with HTML (though automated Web design programs did exist). Things are certainly different now, but there's still a tremendous amount of value in controlling an actual honest-to-God website rather than relying solely on the social Web to provide your online presence. The flexibility of being able to set up and run anything at all, be it a wiki or a blog with a tipjar or a photo hosting site, is awesome.

The hardware You'll need some hardware, and fortunately, a personal Web server doesn't require a lot of juice. The Best Hacking Tutorial Sites - Learn Legal Hacking. Cast Thermite. So you made it through the intro? Good. There's something that must be said before we go any further. I'm not liable. For anything. Do your homework and be sure you know what safety precautions to take when handling something like thermite, such as not looking at it during ignition since it gives off harmful ultraviolet light! Be smart, treat this stuff with the respect it deserves. It's not flash powder but it's certainly not sugar either. ;-) Now that that's out of the way, onto the fun part.

The first thing to do is understand what thermite is made up of. What we need: Fine (0000) Steel Wool (not pictured)AluminumSome kind of scalePlaster of ParisHandling materials (spoon, cup, paper, coffee can...)Some kind of mold to cast your thermite inWhile I'm at it, I'll explain the best way to get a hold of the materials. Steel WoolOff to the hardware store! Finally, you say. Masterbreak.jpg (1200×785) Your PasswordCard - 86,069 printed so far! How Anonymous broke its own rules to break free.

Before the summer of 2011, Anonymous was an amorphous collective of hackers and pranksters ready to pour cold water on members' nascent political aspirations. By 2012, a growing antiauthority, anticensorship, anti-surveillance sentiment asserted itself, and everything changed. Your feelings mean nothing to us. … We have no culture, we have no laws, written or otherwise. … We do not sleep, we do not eat and we do not feel remorse. We will tear you apart from outside and in, we have all the time in the world. —Anonymous Before the summer of 2011, Anonymous was an amorphous collective of hackers and pranksters born in a meme pool. Its operations were still largely unexpected and isolated; it was difficult for the media to wrap a narrative around them.

By 2012, all of that had changed. With LulzSec members broadcasting a daily salvo of tweets, growing cockier as their list of victims expanded, the media finally found its foothold. Why? Life Ruiners A dead simple example: "For Great Justice! "