background preloader

Misc

Facebook Twitter

Home - DLNA. A Gentle Introduction. I2P is a project to build, deploy, and maintain a network supporting secure and anonymous communication. People using I2P are in control of the tradeoffs between anonymity, reliability, bandwidth usage, and latency. There is no central point in the network on which pressure can be exerted to compromise the integrity, security, or anonymity of the system.

The network supports dynamic reconfiguration in response to various attacks, and has been designed to make use of additional resources as they become available. Of course, all aspects of the network are open and freely available. Unlike many other anonymizing networks, I2P doesn't try to provide anonymity by hiding the originator of some communication and not the recipient, or the other way around.

I2P is designed to allow peers using I2P to communicate with each other anonymously — both sender and recipient are unidentifiable to each other as well as to third parties. Why? How? The specific use of these algorithms are outlined elsewhere. Hack like the movie stars: a big-screen multi-touch network monitor defcon 17. Bittorrent hacks defcon 17. Asymmetric defense: how to fight off the nsa red team with five people or less defcon 17. 2600: The Hacker Quarterly.

Certified Ethical Hacker, EC Council, CEH, Information Security, Computer Security, Network Security, Internet Security, Security Courses, Hacking. .:: Phrack Magazine ::. DojoCon 2010 - Where Security Masters Lead. Quirky trek support keeps your batteries charged on the go - technabob. September 22nd, 2010 by Shane McGlaun I bet that many geeks have the same issues when they travel that I do. The biggest problem is that I tend to travel with as many gadgets as I do clothing. It’s also really hard to keep the things charged up when I am on the road, and stuff always runs out of juice when I want to use it.

Help has arrived. The notebook sleeve is removable and is held in place with Velcro. As is the case with all Quirky products, it won’t be made until enough people decide to order one. Steve Jobs Gets Busted Rampant View Turns Your iPod Nano 5g Into a Helmet Cam. Cool gadgets, gizmos, games and the latest geek goodies - technabob - page: 2.

Tech Support. Reference - Commands. Hacking by Numbers :: Hack In The Box :: Keeping Knowledge Free. By: Madirish Hacking, How's it Done? I get a lot of questions via email from people that want to know if I can hack into a website for them, or break into someone's Hotmail account. At first I didn't really understand why people would be asking me these sorts of questions (other than the obvious that they couldn't do it but wanted someone else to break the law on their behalf), but as I pondered the cause for these emails I began to realize that most people's understanding of hackers is generated purely by the mass media. I suppose this fact is true for many occupations and hobbies, but with hacking it is particularly disturbing.

I know a lot of systems administrators who don't have a deeper understanding of network security than the evening news' depiction of it. I also get a lot of requests asking me to teach people how to hack, like its some dark magical art that you have to be mentored in. For those of you trying to learn how to break into systems let me pose a question: why? Methods. Not logged in. Sign in - CompTIA IT Pro Community.