background preloader

Hacking

Facebook Twitter

Security/hacking related. 70 Things Every Computer Geek Should Know. | Arrow Webzine. The term ‘geek’, once used to label a circus freak, has morphed in meaning over the years. What was once an unusual profession transferred into a word indicating social awkwardness. As time has gone on, the word has yet again morphed to indicate a new type of individual: someone who is obsessive over one (or more) particular subjects, whether it be science, photography, electronics, computers, media, or any other field. A geek is one who isn’t satisfied knowing only the surface facts, but instead has a visceral desire to learn everything possible about a particular subject. A techie geek is usually one who knows a little about everything, and is thus the person family and friends turn to whenever they have a question. How to become a real computer Geek? Little known to most, there are many benefits to being a computer geek.

You may get the answer here: The Meaning of Technical Acronyms 1. 2. If you rolled your eyes here, that is a good thing. 3. 4. 5. 6. 7. Apple software security hole could allow hackers to 'take over iPads, iPhones and iPods' By Daily Mail Reporter Updated: 12:02 GMT, 7 July 2011 A major security flaw in Apple software could allow hackers to gain remote control over iPads, iPhones and iPod Touch devices, online experts warned today. The bug in the iOS operating system was exposed last night when a hacking website released a 'jail break' code for Apple customers. Some Apple users choose to jail break their devices so they can download and run applications that are not approved by Apple, or use iPhones on networks of carriers that are similarly not approved. Warning: A bug in Apple's iOS software could allow hackers to gain remote control over iPads, iPhones and iPod Touch devices Security experts warned that criminal hackers could download the code issued by website JailBreakMe.com, reverse engineer it to identify a hole in iOS security and build a piece of malicious software within a few days.

Apple has yet to release an update to iOS that protects customers against malicious software that exploits the flaw. News of the World ‘hacked Milly Dowler phone’ An investigator working for the News of the World allegedly hacked into the mobile phone of murdered girl Milly Dowler, a lawyer for the family says.Mark Lewis said police told her parents that Glenn Mulcaire hacked into her voicemail while she was missing.The Guardian has claimed he intercepted messages left by relatives and said the NoW deleted some, which gave her parents false hope she was alive.

How can someone “hack” a mobile phone? There are web sites which claim you can do this if you know a person’s mobile number. A quick google search turned up a web site called which has the following text: Have you ever been curious as to what your children or employees are chatting about on their cell phone? Isn’t this wiretapping?

Track EVERY Move Your Partner, Employee or Child is Making Using Our POWERFUL Cell-Phone Monitoring Technology! Like this: Like Loading... Hack. Downloads. Keygen n waarez. Keygens.

Cracking

Hacking for money. Hacking. What is hacking? Child finds flaws in mobile games. 8 August 2011Last updated at 11:01 The hacker conference now has a series of sessions aimed at a new generation of tinkerers A novel class of security problems have been found lurking in many mobile games by a ten-year old hacker. Going by the handle CyFi, the hacker presented her findings at the DefCon hacker conference held in Las Vegas. She found that advancing the clock on a tablet or phone can, in many games, open a loophole that can be exploited. CyFi discovered the bug after getting bored with the pace of farming games and seeking ways to speed them up. Find and fix Many farm-based games force players to wait hours before they can harvest a crop grown from virtual seeds.

While many games detect and block clock-based cheating, CyFi found ways round these security measures. Details about what this bug opens up have not been revealed but such flaws are often used to let an attacker run their own code and get access to useful or saleable data.