background preloader


Facebook Twitter

Hacker News Network on HNNCast.2011.06.10 HNNCast for the second week of June, 2011 Top Stories Welcome Aboard it's Lulz, Why You Hack My Shitty Bank, RSA Recall, Latest Sony Pwnage News Cupcakes, b107 Not Over Yet, Anonymous v.

Hacker News Network on

Quickies CC-Compromise Down Under, Disgr-Acer, Cisco Counterfeiters Case Update, UK Jobs, Facebook Not an Open One, chroot(Nsplitter), Peep eTom of BelleAir, Harper Hoax ConFu 44con Talks, Rootcon Schedule, Zacon CFP, HacKid Locations, RSA CFP Stack of Shame count: 137 (-19) Top Offender: Adobe (36) Breaking into command prompts using Microsoft Paint! The Best Hacking Tutorial Sites - Learn Legal Hacking. Written by: Daniel Robson•edited by: Aaron R.

The Best Hacking Tutorial Sites - Learn Legal Hacking

•updated: 2/13/2011 Whether it's to understand potential attack vectors or simply for the fun of it, learning the basics of hacking is something that a lot of people aspire to. Here's our list of the top tutorial based hacking sites. Introduction Films like Swordfish and Hackers have made hacking seem cool, a lifestyle choice almost. However most techies know that in reality it's often a difficult and time consuming process.

Internet security Tools. If you want to protect yourself from Internet snoopers, want to spy on those out to get you, or want to be able to track trends that you know will lead to something big, then these tools will help you get the job done. Without a Trace If you want to use the Internet without anyone knowing who you are or leave an untraceable phone number, then these tools are for you. Big String. Big String offers self-destructing IMs and emails for those who don’t want any evidence of their online communications. Use with many popular IM clients.Mozilla Firefox, Portable Edition. Browsing Security If you want to browse the Internet in privacy, these tools will help you do just that.

Hide My Ass!. Computer Security Using the Internet is a huge open door for people to stick their nose in your business. Avast!. Laptop Tracking If someone makes off with your laptop, know how to stop them with these tools. Adeona. Spying on Those Out to Get You. web application security lab. Here we are, my friends. web application security lab

The 1000th post. Whew! It’s quite a load off to have finally made it. Hopefully this doesn’t come as a surprise to anyone since I’ve been announcing it for months, and if you have questions, hopefully the FAQ can answer them. I wrote and re-wrote this post several times. For internet marketing information, excl... TechTV – Hacking: Applied Engineering to Urban Environments. Watch Hacker News Network episodes on Un méta moteur d’exploits et vulnérabilités. Un méta moteur d’exploits et vulnérabilités Si vous êtes un passionné de sécurité informatique, vous êtes probablement toujours à la recherche de vulnérabilités ou d'exploits sur vos applications (afin bien sûr de sécuriser tout ça).

Un méta moteur d’exploits et vulnérabilités

Et bien sachez qu'il existe un méta moteur plutôt sympa, qui vous permet de chercher les vulns/exploits de vos rêves sur des sites comme NVD, OSVDB, SecurityFocus, Exploit-DB, Metasploit, Nessus, OpenVAS, ou encore PacketStorm. A découvrir ici. Vous avez aimé cet article ? Alors partagez-le avec vos amis en cliquant sur les boutons ci-dessous : Forum BACKTRACK-FR. Les challenges de hacking. Qu'est-ce que c'est ?

Les challenges de hacking

A travers la toile internet, on trouve un certain nombre de sites web qui proposent des défis intrusifs. La plupart sont multi-niveaux, et sont tellement diversifiés qu'ils touchent à une large palette de notions de sécurité. Leur but est unique : Se placer dans la peau d'un hacker et essayer d'atteindre un but. C'est souvent didactique :)Une remarque importante : Ces défis sont gratuits. Néanmoins, décline toute responsabilité en ce qui concerne ces challenges. TheBlacksheep at Internet Security Challenges, Network security, Computer security - Community. HackBBS.