background preloader

Hacking Articles

Facebook Twitter

5 Fun things To Do on School Computers. November 26th, 2010.

5 Fun things To Do on School Computers

Exploiting Unexploitable XSS. U.S. Outgunned in Hacker War. The Freenet Project - /index. U.S. government hankers for hackers. Is Bitcoin the most dangerous open source project ever? Bitcoin "can be really dangerous to social news ecosystem" So you agree with the article, but you don't want people to talk too much about it on HN?

Is Bitcoin the most dangerous open source project ever?

I think it is a very weird position to hold. Imagine there was a very dangerous disease, should it be discussed openly in physician congresses? Yes? 64 Things Every Geek Should Know. Malicious Linux Commands - From (This article was originally published in Ubuntu Forums but was removed there.

Malicious Linux Commands -

Ubuntuguide feels that knowledge about these risks is more important than any misguided attempts to "protect the public" by hiding their potential dangers or protect the (K)Ubuntu/Linux image. The original article has therefore been re-created (and subsequently edited) here.) DOJ Won't Ask Supreme Court to Review Hacking Case. The Justice Department has decided not to ask the Supreme Court to review a controversial federal appeals court decision that said employees may not be prosecuted under a federal anti-hacking statute for simply violating their employer’s computer use policy.

DOJ Won't Ask Supreme Court to Review Hacking Case

The 9-2 decision in April by the 9th U.S. Circuit Court of Appeals dealt a blow to the Obama administration, which is invoking the same theory to prosecute alleged WikiLeaks leaker Bradley Manning. The case concerns the Computer Fraud and Abuse Act, which was passed in 1984 to enhance the government’s ability to prosecute hackers who accessed computers to steal information or to disrupt or destroy computer functionality. Rudy's Delphi Corner - Console unit. Download I write a lot of console programs to test simple concepts, containing a few test routines and a few Writeln commands.

Rudy's Delphi Corner - Console unit

To me, this is much more convenient than having to write a VCL program where the output goes to a ListBox or a Memo. The problem with the console windows in Delphi is, that they close immediately after they are finished. So most of my console programs contain a Readln command as the last instruction in the program. The NSA has its own team of elite hackers. NSA headquarters at Fort Meade, MD where TAO's main team reportedly works (Wikipedia) Our Post colleagues have had a busy day.

The NSA has its own team of elite hackers

First, they released documents revealing the U.S. intelligence budget from National Security Agency (NSA) leaker Edward Snowden. Then they recounted exactly how the hunt for Osama bin Laden went down. In that second report, Craig Whitlock and Barton Gellman shared a few tidbits about the role of the government's hacking unit, Tailored Access Operations (TAO) in the hunt, writing that TAO "enabled the NSA to collect intelligence from mobile phones that were used by al-Qaeda operatives and other 'persons of interest' in the bin Laden hunt.

" So just what is Tailored Access Operations? How to install Eclipse 3.7 on Ubuntu 11.04. The Eclipse packages in Ubuntu are are very out of date.

How to install Eclipse 3.7 on Ubuntu 11.04

The latest version in the Ubuntu repos is 3.5.2 where as the latest version of Eclipse is 3.7. I’m posting this because Ubuntu 11.04 uses the new Unity desktop which uses overlay-scrollbars (scrolls bars that are hidden until you hover over them). For some reason Eclipse 5.3.2 doesn’t like to play nice with the overlay scrollbars, and I’d rather use the newest version anyways. Bit Twiddling Hacks. By Sean Eron Anderson seander@cs.stanford.edu Individually, the code snippets here are in the public domain (unless otherwise noted) — feel free to use them however you please.

Bit Twiddling Hacks

The aggregate collection and descriptions are © 1997-2005 Sean Eron Anderson. The code and descriptions are distributed in the hope that they will be useful, but WITHOUT ANY WARRANTY and without even the implied warranty of merchantability or fitness for a particular purpose. As of May 5, 2005, all the code has been tested thoroughly. Thousands of people have read it. Top 10 Web hacking techniques of 2010 revealed. Network World - A Web hack that can endanger online banking transactions is ranked the No. 1 new Web hacking technique for 2010 in a top 10 list selected by a panel of experts and open voting.

Top 10 Web hacking techniques of 2010 revealed

Called the Padding Oracle Crypto Attack, the hack takes advantage of how Microsoft's Web framework ASP.NET protects AES encryption cookies. FROM THE SECURITY WORLD: Quirky moments at Black Hat DC 2011 If encryption data in the cookie has been changed, the way ASP.NET handles it results in the application leaking some information about how to decrypt the traffic.

With enough repeated changes and leaked information, the hacker can deduce which possible bytes can be eliminated from the encryption key. Hacker Family Tree Charts Hacker Group Origins And Relations. Bypass The Security: Wireless Hacking Basics. MD5 considered harmful today. The bytes 0 - 473 in the real certificate (the fields up to the modulus, and the first 5 bytes of the modulus field which are a predictable header) are pretty much fixed by CA requirements.

MD5 considered harmful today

Those 474 bytes form the "chosen prefix" on the real certificate's side. For this certificate we chose to have a 2048 bit RSA key. The main reason for this size is the fact that we have to hide the collision block in there. Our collision construction method enables us to make collision blocks of 1632 bits, so 2048 seems a reasonable choice. Moreover 2048 bit RSA moduli are quite common, so no suspicion is raised. At the side of the rogue certificate we could not use the public key modulus for hiding the collision block. Unsafe at Any Bitrate News. How Apple and Amazon Security Flaws Led to My Epic Hacking. In the space of one hour, my entire digital life was destroyed. First my Google account was taken over, then deleted. Next my Twitter account was compromised, and used as a platform to broadcast racist and homophobic messages.

And worst of all, my AppleID account was broken into, and my hackers used it to remotely erase all of the data on my iPhone, iPad, and MacBook. In many ways, this was all my fault. Infinity Exists. I Got My Computer Back! June 4th, 2009 by Patchy It’s been several years,… but finally Patchy and his computer are reunited at last Download Here Posted in News, Vblog |

Hacktivism: Civil Disobedience or Cyber Crime? A man attends a demonstration organized by hacker collective Anonymous in Tokyo, July 7, 2012. (YOSHIKAZU TSUNO/AFP/GettyImages) Other online activists have increasingly turned to computer networks and other technology as a means of political protest, deploying a range of tactics — from temporarily shutting down servers to disclosing personal and corporate information. Hackers claim 12 million Apple IDs from FBI. MJM as Personified Evil Says Spyware Saves Lives Not Kills Them. How To Remain Connected If Your Internet Gets Shut Off. - Knowledge Should be Shareable Software Tricks, Tips and Hacking. A Box For Manipulating The News On Other People’s Computer Screens. Aaron Swartz.

How to Hide Data in Image, Audio & Video Files: Steganography. Ever wondered to know how to hide secret data in image, audio and video files? Jeremy Hammond. Running Mantra and Firefox together. 3 Hacks for Firefox That Will Double Your Internet Browsing Speed - Gnoted.com. Jeremy Hammond's Sentencing Statement. On eve of incarceration, Anonymous hacker clears the air. REVEALED: Hundreds of words to avoid using online if you don't want the government spying on you.

Department of Homeland Security forced to release list following freedom of information requestAgency insists it only looks for evidence of genuine threats to the U.S. and not for signs of general dissent. Statement From @ItsKahuna. Top 15 Open Source/Free Security/Hacking Tools. 1. 70 Things Every Computer Geek Should Know. Stuxnet has infected a Russian nuclear plant and the space station [Updated]

Teenage Hacker "Cosmo the God" Sentenced by California Court. Hacker (programmer subculture) iPad Hack Statement Of Responsibility. Hackers by National Geographic. 5 Computer Hacks from Movies You Won't Believe Are Possible. Patients' own heartbeat could work as anti-hacking password for implants. Hacking Secret Ciphers with Python. Google hacks. Meet The Hackers Who Sell Spies The Tools To Crack Your PC (And Get Paid Six-Figure Fees) Use These Secret NSA Google Search Tips to Become Your Own Spy Agency.

Penetration Testing and Vulnerability Analysis. Automotive takeover schemes to be detailed at Defcon hacker conference. A Saudi Arabia Telecom's Surveillance Pitch. BeTheBot. Shopping For Zero-Days: A Price List For Hackers' Secret Software Exploits. Google hacking master list. Free DNS tunneling service. Hacker Demonstrates Android Smartphone App To Hijack A Plane Midair. Hacktivists on Trial. How Antisec Died — Notes from a Strange World. Dorks & hacks Big list.

How To Become A Hacker. Hack Google Chrome Passwords. Hack a Computer. How to use Google for Hacking. Unraveling The Stuxnet Virus. "The Konscience of a Kourier" How to use Google for Hackiing.

Now Anyone Can Hack A Website. The Best Hacking Tutorial Sites - Learn Legal Hacking. Meet Dark Tangent, the hacker behind Black Hat and DEF CON. Fast-Talking Computer Hacker Just Has To Break Through Encryption Shield Before Uploading Nano-Virus. How to Hack a Web Site - Dr. Susan Loveland - Lunchtime Talks in Science and Mathematics. 8 Things You Won't Believe Can Be Hacked. The Best Hacking Tutorial Sites. How to Crack the Account Password on Any Operating System. Password Secrets of Popular Windows Applications. “I’m Going To Prison For Arithmetic” Andrew Auernheimer aka Weev.

7 Most Notorious Computer Hacker Groups of All Time. Hack Attack: Turn your $60 router into a $600 router. An Incredible Way to Reveal Passwords Behind Asterisks. Hackers Said to be Planning to Launch Own Satellites to Combat Censorship. A Brief History of Hackerdom. Without Computer Security, Sources’ Secrets Aren’t Safe With Journalists. "The Conscience of a Hacker" How to Hide Data in Image, Audio & Video Files. How to Unlock a Computer Without a Password Reset Disk. Ghost in the Wires - By Kevin Mitnick - Book Review - NYTimes.com - What is a Hacker. International hacktivists help Syrian citizens circumvent Internet censorship. Software gives visual representation of who’s following you online.