background preloader

About Hackers & Hacks

Facebook Twitter

Computer Hacking: Facebook Virus Prank - Making fun to your friend. Fake Facebook Virus | Freak Out Your Friends.

Computer Hacking: Facebook Virus Prank - Making fun to your friend

Hackers publish 20,000 FBI employees' contact information. The hackers, tweeting from the account @DotGovs, claim they obtained the details by hacking into a Department of Justice database.

Hackers publish 20,000 FBI employees' contact information

The hackers boasted on Twitter, "FBI and DHS info is dropped and that's all we came to do, so now its time to go, bye folks! #FreePalestine. " The information contained names, titles, phone numbers and email addresses. After the hackers published the data on the DHS employees on Sunday, they tweeted, "Well folks, it looks like @TheJusticeDept has finally realized their computer has been breached after 1 week. " The Justice Department is investigating the hack. How to View Passwords Hidden Under Asterisks [Video]

Google Chrome, Firefox and other browsers hide passwords behind asterisks but you can easily view the saved passwords using the built-in developer tools.

How to View Passwords Hidden Under Asterisks [Video]

Web browser hide passwords under asterisk characters for improved security. Say you are on the Gmail login page and the web browser, as always, has auto-filled the username and passwords fields for you. Sony Hackers Guardians of Peace Troll FBI, Anonymous Convinced Hack Didn't Come From North Korea. Paramedics strove valiantly to revive grievously wounded Officers Liu and Ramos—and were left shattered when their efforts failed.

Sony Hackers Guardians of Peace Troll FBI, Anonymous Convinced Hack Didn't Come From North Korea

The medic was gazing down into the grievously wounded cop’s eyes, praying for a sign of life even so tiny as a single blink. “He was just looking at me and I’m looking at him and I’m hoping he would blink at least one time,” recalls the medic, 27-year-old Baron Johnson of the Bedford-Stuyvesant Volunteer Ambulance Corps. “It wasn’t like his eyes rolled back. He was aware of what was going on. It was a constant stare dead into my face and I just looked back at him, hoping.” Resist Surveillance. Google Guide Cheatsheet. Data Recovery. D0CS_Forensic_Computing. EPIC - Electronic Privacy Information Center. How to Break Into a Windows PC (and Prevent It from Happening to You)

How to use Google for Hacking. Google serves almost 80 percent of all the search queries on the Internet, proving itself as the most popular search engine.

How to use Google for Hacking

Articles: Man-in-the-Middle. 4 Options to Bypass the NYTimes.com 20 Article Limit « WTI NewsBlog. Cozy, a personal cloud you can hack, host and delete. AdBlock for iOS - Must Have App for iOS 7 - for iPhone, iPad and iPod Touch pour iPhone, iPod touch et iPad dans l’App Store sur iTunes.

Hacking tutorials sites & tools

About Hacking. How To Hack Google Plus For SEO Value. People tend to think of Google Plus as just another social network, built as Google’s challenge to Facebook’s incredible growth over the past decade.

How To Hack Google Plus For SEO Value

What most people don’t realize, however, is the SEO value that makes Google+ so much more than just a social networking platform. How to use Google for Hacking. Google serves almost 80 percent of all search queries on the Internet, proving itself as the most popular search engine.

How to use Google for Hacking.

InterN0T - Underground Security Training. Create a temporary phone number with inumbr. Learn How to Trace an Email Address Trace an email address in the most popular programs like Microsoft Outlook, Hotmail, Yahoo, Gmail, AOL, by finding the header.

What Is an Email Header Each email you receive comes with headers. The headers contain information about the routing of the message and the originating Internet Protocol address of the message. - Knowledge Should be Shareable Software Tricks, Tips and Hacking. Hacker News 150 (newsyc150) How Hackers Protect Themselves From Getting Hacked. When Adrian Lamo goes online, he leaves nothing to chance.

How Hackers Protect Themselves From Getting Hacked

To log in to personal accounts, he uses a digital password generator -- a plastic key chain-like device that displays a new string of digits every 60 seconds. He adds an extra layer of security to some accounts by entering a special code that he receives via text message. Is not available. Cool Websites, Software and Internet Tips.

Jeremy Hammond Reacts to Hector Monsegur’s “Sentencing”: Reject the NSA White Hat Sabu Ideology. Jeremy Hammond Reacts to Hector Monsegur’s “Sentencing”: Reject the NSA White Hat Sabu Ideology In many ways, the disgusting spectacle of Sabu’s hearing was similar to mine: we were both sentenced in the same courtroom under the same judge, the outcome already predetermined with all parties reading from well-rehearsed scripts.

Jeremy Hammond Reacts to Hector Monsegur’s “Sentencing”: Reject the NSA White Hat Sabu Ideology

I was condemned to the maximum prison term for having committed “mass mayhem,” while Sabu received the most lenient of all Anonymous-related sentences for embracing “good, not evil”. Sabu bless America. Video Anonymous “Fuck Sabu”.Sabu was arrested in June 2011 and identified as Hector Xavier Monsegur. Sabu helped FBI stop over 300 cyber attacks. Hector Xavier Monsegur, known as “Sabu”, helped the FBI send his friends to prison and stop some 300 cyber attacks over the past three years, according to court documents filed by prosecutors. The Anarchist Library. Schan. The Pirate Bay documentaire français. Documentaire Xenius : NSA et Hackers peuvent tout savoir de nous. Hackers, les nouveaux maîtres du monde [documentaire entier] Nom de code Linux.

Les Hackers - Piratage Informatique National Geographic [Documentaire complet] Une contre-histoire de l'internet. La guerre des moteurs de recherche, la véritable histoire d'internet. WikiLeaks secrets et mensonges. Documentaire: Quand l'Internet Fait des Bulles.

Anomymous par Vengeant