background preloader

Hacking the Xbox

Hacking the Xbox

30 Modern Free Futuristic Fonts Futuristic fonts best for those who have to have something new and ultra-modern. Everybody use serif, sans-serif, grunge and Gothic fonts in projects but futuristic fonts can add innovative sensation to your design. Today we have collected 30 free futuristic fonts for your future projects. 1. Aerolite 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. 26. 27. 28. 29. Related posts: 20 Best Free Cyrillic Fonts for Non-English Typography 15 Modern Bold Slab-Serif Fonts for Graphic Designers 20 High-Quality Free Casual Script Fonts 45 Great Free Fonts Having Commercial Use License 20 Hand Picked Tremendous Modern Gothic Fonts 25 Free Elegant Thin Sans Serif Fonts 24 Superb Free Fresh Fonts for Graphic Designers 30 Hand Picked Free Attractive Serif Fonts

Chat with Your Friends through ms dos Command Prompt -: Chat with Friends through ms dos Command Prompt :- 1) All you need is your friend's IP Address and your Command Prompt. 2) Open Notepad and write this code as it is.....! @echo off :A Cls echo MESSENGER set /p n=User: set /p m=Message: net send %n% %m% Pause Goto A 3) Now save this as "Messenger.Bat". 4) Open Command Prompt. 5) Drag this file (.bat file) over to Command Prompt and press Enter. 6) You would then see something like this: 7) Now, type the IP Address of the computer you want to contact and press enter You will see something like this: 8) Now all you need to do is type your message and press Enter. ShareThis

The glider: an Appropriate Hacker Emblem The Linux folks have their penguin and the BSDers their daemon. Perl's got a camel, FSF fans have their gnu and OSI's got an open-source logo. What we haven't had, historically, is an emblem that represents the entire hacker community of which all these groups are parts. About half the hackers this idea was alpha-tested on instantaneously said "Wow! I first proposed this emblem in October 2003. When you put the glider emblem on your web page, or wear it on clothing, or display it in some other way, you are visibly associating yourself with the hacker culture. Yes, as of a mere four days after this proposal was floated, there are mugs and T-shirts. If you think is about breaking into other peoples' computers, those of us the emblem was invented for do not want you displaying it. I used to have a prohibition against commercial use here. The glider is not copyrighted or trademarked. Here's what it will look like: Feel free to enlarge or shrink the image.

Upside-Down-Ternet My neighbours are stealing my wireless internet access. I could encrypt it or alternately I could have fun. I'm starting here by splitting the network into two parts, the trusted half and the untrusted half. The trusted half has one netblock, the untrusted a different netblock. We use the DHCP server to identify mac addresses to give out the relevant addresses. /etc/dhcpd.conf IPtables is Fun! Suddenly everything is kittens! /sbin/iptables -A PREROUTING -s 192.168.0.0/255.255.255.0 -p tcp -j DNAT --to-destination 64.111.96.38 For the uninitiated, this redirects all traffic to kittenwar. For more fun, we set iptables to forward everything to a transparent squid proxy running on port 80 on the machine. /sbin/iptables -A PREROUTING -s 192.168.0.0/255.255.255.0 -p tcp -m tcp --dport 80 -j DNAT --to-destination 192.168.0.1 That machine runs squid with a trivial redirector that downloads images, uses mogrify to turn them upside down and serves them out of its local webserver. The redirection script

How to use Google for Hacking. | Arrow Webzine Google serves almost 80 percent of all search queries on the Internet, proving itself as the most popular search engine. However Google makes it possible to reach not only the publicly available information resources, but also gives access to some of the most confidential information that should never have been revealed. In this post I will show how to use Google for exploiting security vulnerabilities within websites. The following are some of the hacks that can be accomplished using Google. 1. Hacking Security Cameras There exists many security cameras used for monitoring places like parking lots, college campus, road traffic etc. which can be hacked using Google so that you can view the images captured by those cameras in real time. inurl:”viewerframe? Click on any of the search results (Top 5 recommended) and you will gain access to the live camera which has full controls. you now have access to the Live cameras which work in real-time. intitle:”Live View / – AXIS” 2. 3. “? 4.

How To Become A Hacker (German Translation) Direkt zur deutschen Übersetzung. Numerous translations of this document are available: Arabic, Bulgarian, Catalan, Chinese (Simplified), Danish, Dutch, Estonia, Farsi, Finnish, German, Greek, Hebrew, Italian, Japanese, Norwegian, Polish, Portuguese (Brazilian), Romanian, Russian, Spanish, Turkish, and Swedish. Note that since this document changes occasionally, they may be out of date to varying degrees. Anmerkungen zur Deutschen Übersetzung Diese Seite enthält die deutsche Übersetzung von Eric Steven Raymonds How To Become A Hacker Copyright © 2001 Eric S. Fehlerkorrekturen, bessere Formulierungen oder Übersetzungen bitte per Mail mitteilen. Vor dem Einsenden sollte aber das Korrektur-Howto gelesen werden. Vielen Dank an die folgenden Personen für ihre Korrekturvorschläge : (in chronologischer Reihenfolge der Korrektureinsendungen) Felix Linsenmeier Frank Cotting Peter Hüwe Mario (mariooriginal) Patrick-Oliver Scheinert Andreas K. Warum dieses Dokument? Was ist ein Hacker? 1. 2. 3. 4.

70 Professional Fonts For All Design Life Situations Choosing the right fonts for your design is very important. This gives your viewers an impression on what you promote or convey. Choosing of fonts can also be an art, and fonts can also be in style. In this article, I will give you the best fonts you can download and use to make your designs look clean, professional but stylish. The fonts you will see below are the fonts we can consider as clean, professional but stylish. 1. by: Shawn Griswold To download Gris font, click here. 2. by: Lauren Thompson To download Champagne & Limousines font, click here. 3. by: haef To download Capsuula font, click here. 4. by: Gabriel Mark Perida To download Gabriel Serif font, click here. 5. by: eM-Vii aka Manuel Viergutz To download Hand Times font, click here. 6. by: The League of Moveable Type To download League Gothic font, click here. 7. by: Fresko Design To download Fresko font, click here. 8. by: arro To download Vegur font, click here. 9. by: Tension Type To download Leander font, click here. 10. 11. by: Jan Paul

Know the Trade – Your IT Security Information Portal CISSP/CEH/CISA/Hacker and Penetration Testing Specialist Google Hacking allintitle:Brains, Corp. camera allintitle:"index of/admin" allintitle:"index of/root" allintitle:restricted filetype:doc site:gov allintitle:restricted filetype :mail allintitle:sensitive filetype:doc allinurl:/bash_history allinurl:winnt/system32/ (get cmd.exe) ext:ini eudora.ini ext:pwd inurl:(service|authors|administrators |users) "# -FrontPage-" filetype:bak inurl:"htaccess|passwd|shadow|htusers" filetype:conf slapd.conf filetype:ctt "msn" filetype:mdb inurl:"account|users|admin|administrators|passwd|password" filetype:mdb inurl:users.mdb filetype:QDF QDF filetype:pdf "Host Vulnerability Summary Report" "Assessment Report" filetype:sql ("passwd values ****" | "password values ****" | "pass values ****" ) filetype:xls inurl:"email.xls" filetype:user eggdrop user intitle:"Apache::Status" (inurl:server-status | inurl:status.html | inurl:apache.html) intitle:"Welcome to IIS 4.0!" These log files record info about the SSH client PUTTY.

Related: