background preloader

Ethical Hacking

Facebook Twitter

Security

Hacking & Hacktivism. Ethical Hacking. How to Hack: Ethical Hacking and Cyber Security | Go Hacking. Ethical hking. Scan IP Addresses for Malicious Activity - IPVoid.com BETA. How To Become A Hacker. Copyright © 2001 Eric S. Raymond As editor of the Jargon File and author of a few other well-known documents of similar nature, I often get email requests from enthusiastic network newbies asking (in effect) "how can I learn to be a wizardly hacker? ". Back in 1996 I noticed that there didn't seem to be any other FAQs or web documents that addressed this vital question, so I started this one. A lot of hackers now consider it definitive, and I suppose that means it is.

Still, I don't claim to be the exclusive authority on this topic; if you don't like what you read here, write your own. If you are reading a snapshot of this document offline, the current version lives at Note: there is a list of Frequently Asked Questions at the end of this document. Numerous translations of this document are available: ArabicBelorussianBulgarianChinese, Czech. The five-dots-in-nine-squares diagram that decorates this document is called a glider. 1. 2. 3. 5. 2. Free Open-Source On-The-Fly Disk Encryption Software for Windows 7/Vista/XP, Mac OS X and Linux - Downloads. Top 100 Network Security Tools. *Magical Recipes Online* Your free online Magazine on Witchcraft, Occultism & Ancient Recipes.

Network Tools by YouGetSignal.com. How to foil the NSA and GCHQ with strong encryption. "Ye are many - they are few. " - Percy Bysshe Shelley THE MOST INTERESTING DEVICE shown at Mobile World Congress (MWC) in Barcelona this week was the secure Blackphone developed by Silent Circle and Geeksphone.

The Blackphone features anonymous search, automatic disabling of non-trusted WiFi hotspots, and private texting, calling and file transfer capabilities. It's available to the general public, and bundles additional security features that apparently go beyond the basic messaging security provided by Blackberry to enterprise customers in its Blackberry Messaging (BBM) service. US-based aerospace and defence firm Boeing also unveiled its own Black phone - not to be confused with the Silent Circle and Geeksphone Blackphone - at MWC this week, but that appears to be restricted for sale only to government security agencies and defence industry customers, and therefore likely won't be available to the public through mobile operators or in retail shops. The Best Hacking Tutorial Sites - Learn Legal Hacking - StumbleUpon.

Bypass The Security: Wireless Hacking Basics.