background preloader

Hackers by National Geographic

Hackers by National Geographic
Related:  Hacking

7 Most Notorious Computer Hacker Groups of All Time With the recent attack on PlayStation Network and a bunch of high-profile websites, computer hackers are back in the limelight again. Hackers and hacker groups were quite famous in the 80’s and 90’s but their popularity started fading since the Y2K days. Today, we are once again witnessing hackers threatening to take on giant corporations sending chills down everyone's spine. We have already featured here some of the most infamous black hat hackers of all time. This time, we will take a quick look at some of the most notorious computer hacker groups that ever existed: Masters of Deception This New York-based group was responsible for notorious acts such as downloading confidential credit card histories of stars like Julia Roberts, breaking into AT&T’s computer system and stealing credit card numbers. Legion of Doom MOD’s biggest enemy Legion of Doom was a famous hacker group founded by a hacker called Lex Luthor (real name: Vincent Louis Gelormine). Chaos Computer Club Milw0rm Anonymous

WikiScanner On December 21, 2012, a research group from Fondazione Bruno Kessler (it) released an open-source clone of WikiScanner called WikiWatchdog.[5] Design[edit] The tool's database contained 34,417,493 entries on anonymous edits (those by users who were not logged into Wikipedia) between February 7, 2002 and August 4, 2007.[3] Griffith stated that the database was constructed by compiling the anonymous edits included amongst the monthly public database dumps of Wikipedia. He claimed to have connected the organizations to their IP address with the assistance of the IP2Location, and through comparison had found "187,529 different organizations with at least one anonymous Wikipedia edit."[3] WikiScanner only worked on anonymous edits that provided an IP address, not edits by anyone logged-in under a username. The WikiScanner FAQ notes that edits cannot be positively attributed to representatives of a company, only to a computer logged in to a company's network. Media coverage and reaction[edit]

How To Become A Hacker Copyright © 2001 Eric S. Raymond As editor of the Jargon File and author of a few other well-known documents of similar nature, I often get email requests from enthusiastic network newbies asking (in effect) "how can I learn to be a wizardly hacker?". Back in 1996 I noticed that there didn't seem to be any other FAQs or web documents that addressed this vital question, so I started this one. A lot of hackers now consider it definitive, and I suppose that means it is. Still, I don't claim to be the exclusive authority on this topic; if you don't like what you read here, write your own. If you are reading a snapshot of this document offline, the current version lives at Note: there is a list of Frequently Asked Questions at the end of this document. The five-dots-in-nine-squares diagram that decorates this document is called a glider. If you find this document valuable, please leave me a tip on Gittip. If you want to be a hacker, keep reading.

Apprendre le hacking - Les bases du hack et la sécurité informatique, le site du vrai hacking Hacker News | Skype protocol reverse engineered, source available I wouldn't venture to say this doesn't belong on HN since it really is interesting (if it was actually done correctly), but the files available for download are most likely illegal, were most likely created with pirated tools (IDA Pro/Hex-Rays, and yes, as a customer of theirs for over a dozen years I've reported it), and of course, the usual vilification of reverse engineering. If you're reading this on a desktop or laptop system (rather than a phone), then you are most likely using an "IBM PC Compatible" even if you're using an Intel based Apple, and hence, you're using the fruits of completely legal reverse engineering. The way to do reverse engineering legally is to have one team reverse engineer the target and completely document how it works. Once it's documented, another disconnected team writes a new implementation from the documentation. This process is how you're using an IBM PC Compatible today, so yes, reverse engineering for compatibility is perfectly legal. 1.) 2.) 3.)

What is a Hacker Copyright © 2001 Eric S. Raymond As editor of the Jargon File and author of a few other well-known documents of similar nature, I often get email requests from enthusiastic network newbies asking (in effect) "how can I learn to be a wizardly hacker?". If you are reading a snapshot of this document offline, the current version lives at Note: there is a list of Frequently Asked Questions at the end of this document. Numerous translations of this document are available: ArabicBelorussianChinese (Simplified), Czech, Danish, Dutch, Estonian, German, GreekItalianHebrew, Norwegian, PersianPortuguese (Brazilian), RomanianSpanish, Turkish, and Swedish. The five-dots-in-nine-squares diagram that decorates this document is called a glider. If you find this document valuable, please leave me a tip on Gittip. The hacker mind-set is not confined to this software-hacker culture. The basic difference is this: hackers build things, crackers break them. 1. 2.

HellBound Hackers skype-open-source

Related: