background preloader

The Hacker Crackdown

The Hacker Crackdown

http://www.mit.edu/hacker/hacker.html

Related:  shaundonnelly

“Password” Remains Top Password, “Jesus” Cracks the Top 25 People: What are you doing? This is just getting sad now. Remember all of those password leak stories you’ve seen in the last few months? How many? One? 3 Hacks for Firefox That Will Double Your Internet Browsing Speed - Gnoted.com There are many people out there complaining about the Firefox RAM Memory Bug. Lets get it straight. It’s not a bug. It’s part of the cache feature. This ‘feature’ is how the pages are cached in a tabbed environment. LDraw All-In-One-Installer Quick installation Download the following file Mirror: Peeron.comLDraw_AIOI_2013-02_setup_32bit_v2.zipNOTE: The file is protected by a Captcha image. Please type in the letters you see in the picture.Mirror: 1000Steine.comLDraw_AIOI_2013-02_setup_32bit_v2.zip Mirror: Lugnet.bizLDraw_AIOI_2013-02_setup_32bit_v2.zip Unzip the content NOTE: Use 7-Zip (recommended), Winzip or Winrar if the explorer of your Windows OS has no inbuild decompression of .zip files.

100 Websites You Should Know and Use Entertainment Meet David Peterson, who developed Dothraki for Game of Thrones There are seven different words in Dothraki for striking another person with a sword. Among them: “hlizifikh,” a wild but powerful strike; “hrakkarikh,”a quick and accurate strike; and “gezrikh,” a fake-out or decoy strike. Top 5 Websites To Learn How To Hack Like A Pro You might be surprised to learn just how many people want to learn how to hack. The stereotype is that of the young college guy – a computer science major for sure – who spends his evenings and weekends writing up intricate hacking scripts to break into whatever computer system he can get his hands on. The truth is that what was once a male-dominated community is fast changing into one that includes folks – men and women – from many walks of life, from many countries and with many backgrounds. A recent CNET article about DEFCON makes note of the fact that claims of sexual harassment and unwanted advances are increasing. This isn’t because hackers are getting more obnoxious or offensive, but because more female hackers are entering into the community and trying to find a home there, only to find insulting behavior, and other actions unbecoming of a gentleman.

free tutorials Have you ever read through a chapter in one of those Learn Such and Such in 21 Seconds books and realized that somewhere along the way you had started daydreaming about how you would spend a trillion dollars if you were Bill Gates? Well, it happens to me all the time. Computer books are boring. In fact, most technical writing out there bites the big one and there's no sign that the situation is going to get any better in the near future. The really unfortunate thing about this predicament is that now, more than any other period in the history of computing, is when we really need good, clear writing out there. Whether the established priesthood of computer science likes it or not, the web has opened the flood gates and computer science is being secularized post haste.

Cheap GPUs are rendering strong passwords useless Think that your eight-character password consisting of lowercase characters, uppercase characters and a sprinkling of numbers is strong enough to protect you from a brute force attack? Think again! Jon Honeyball writing for PC Pro has a sobering piece on how the modern GPU can be leveraged as a powerful tool against passwords once considered safe from bruteforce attack. Web World Wide » 50 Free Internet Tools for Tin-Foil Hat Wearers If your wardrobe includes a shiny tin-foil hat, then you will love these free Ma Internet tools. Whether you want to protect yourself from Internet snoopers, want to spy on those out to get you, or want to be able to track trends that you know will lead to something big, then these tools will help you get the job done. Without a Trace If you want to use the Internet without anyone knowing who you are or leave an untraceable phone number, then these tools are for you. Big String. Big String offers self-destructing IMs and emails for those who don’t want any evidence of their online communications.

Pack for Mac: Our List of the Best Free Mac Apps Finding excellent free software for your Mac is increasingly tough. In our fourth annual Lifehacker Pack for Mac, we're highlighting the best free downloads for better productivity, communication, media management, and more. The Lifehacker Pack is a yearly snapshot of our favorite, must-have applications for each of our favorite platforms. If you're curious to see how things have changed this year, here's last year's Lifehacker Pack for Mac. For our always-updating directory of all the best apps, be sure to bookmark our Mac App Directory.

Table of keyboard shortcuts In computing, a keyboard shortcut is a sequence or combination of keystrokes on a computer keyboard which invokes commands in software. Some keyboard shortcuts require the user to press a single key or a sequence of keys one after the other. Other keyboard shortcuts require pressing and holding several keys simultaneously (indicated in the tables below by this sign: +). How to use Google for Hacking. Google serves almost 80 percent of all search queries on the Internet, proving itself as the most popular search engine. However Google makes it possible to reach not only the publicly available information resources, but also gives access to some of the most confidential information that should never have been revealed. In this post I will show how to use Google for exploiting security vulnerabilities within websites. The following are some of the hacks that can be accomplished using Google. 1. Hacking Security Cameras

Related: