background preloader

Learn about Hacking, Cracking, JavaScript, PHP, Cryptology and Password security

Learn about Hacking, Cracking, JavaScript, PHP, Cryptology and Password security
This site offers a unique hack challenge especially for beginners and intermediates. Please feel free to create an account and try your skills with the challenges. If you have problems with challenges please visit our IRC channel: Host: irc.idlemonkeys.net Channel: #hackquest The site is sponsored by Kender and is no longer accepting donations. Partner challenge sites: WeChall - TheBlackSheep - Rankk - - Dare Your Mind

http://hackquest.com/

Related:  Newish Computerish

How To Become A Hacker Copyright © 2001 Eric S. Raymond As editor of the Jargon File and author of a few other well-known documents of similar nature, I often get email requests from enthusiastic network newbies asking (in effect) "how can I learn to be a wizardly hacker?". The Open Organisation Of Lockpickers This is a repository of the most up-to-date versions of Deviant's lock diagrams and animations. Seen in all of the TOOOL educational materials and slide decks, these files are all released under the Creative Commons license. You are free to use any of them for non-commercial purposes, as long as they are properly attributed and the same freedom for others is maintained in all derivative works.

Infinity Exists I Got My Computer Back! June 4th, 2009 by Patchy It’s been several years,… but finally Patchy and his computer are reunited at last Download Here 7 Most Notorious Computer Hacker Groups of All Time With the recent attack on PlayStation Network and a bunch of high-profile websites, computer hackers are back in the limelight again. Hackers and hacker groups were quite famous in the 80’s and 90’s but their popularity started fading since the Y2K days. Today, we are once again witnessing hackers threatening to take on giant corporations sending chills down everyone's spine. We have already featured here some of the most infamous black hat hackers of all time. This time, we will take a quick look at some of the most notorious computer hacker groups that ever existed: Masters of Deception

Vote Now! Top Ten Web Hacking Techniques of 2011 Every year the Web security community produces a stunning amount of new hacking techniques published in various white papers, blog posts, magazine articles, mailing list emails, etc. Within the thousands of pages are the latest ways to attack websites, Web browsers, Web proxies, and so on. Beyond individual vulnerability instances with CVE numbers or system compromises, we’re talking about actual new and creative methods of Web-based attack. The Top Ten Web Hacking Techniques list encourages information sharing, provides a centralized knowledge-base, and recognizes researchers who contribute excellent work. How the winners were selected…

The Past, Present, and Future of Data Storage As we approach the end of 2011 and look forward to another year, we pause to reflect on the long history of data storage. Mankind's ability to create, process, store, and recall information is light years ahead of the days of cave paintings and engravings on stone tablets. Vast amounts of information can be stored on drives smaller than your thumb, and data centers are cropping up at an increasingly high rate. What does the future of data storage hold? Are we really that close to holographic drives? Is 2012 the year SSDs become mainstream? How To Become A Hacker Copyright © 2001 Eric S. Raymond As editor of the Jargon File and author of a few other well-known documents of similar nature, I often get email requests from enthusiastic network newbies asking (in effect) "how can I learn to be a wizardly hacker?". Back in 1996 I noticed that there didn't seem to be any other FAQs or web documents that addressed this vital question, so I started this one. A lot of hackers now consider it definitive, and I suppose that means it is.

Solid-state drive DDR SDRAM based SSD. Max 128 GB and 3072 MB/s. PCIe, DRAM and NAND-based SSD. NEW!!!! Destroy someone's Computer! : OFF Topic vampyre is right.1. LIL DEVIL IS AN A-HOLE2. THAT IS HACKING WHICH IS ILLEGAL3. Credit card-sized Raspberry Pi computer gets a video cam! Just when you thought you can no longer squeeze anything else into the tiny Raspberry Pi computer, think again: the puny device is getting a video camera. A report on PC World said developers expect to make the HD camera available by early spring, though the camera's specifications have yet to be finalized. "The first cameras are expected to come with a 15-centimeter (just under 6 inches) flat cable and sell for around $25. The lens on the camera is similar to those found on many camera phones and is expected to provide 5 megapixels," PC World said. It quoted Raspberry Pi developers as saying the camera board is an alternative to using USB cameras with the Raspberry Pi.

March 2011 Ok, here's a new quick tutorial for everyone who has been having to deal with Facebook blocking your entrance into someone's account due to logging in from a different location. Ever since I had been problems constantly having to deal with Facebook leaving me out off people's accounts I began to think that I should write over my experiences to help others. I will go over specific techniques and ideas to eventually grant you entrance to their accounts without having to deal with that Facebook problem having logging in from different location.

60 Excellent Free 3D Model Websites 3D printers have immensely revolutionized the art and manufacturing industry. With advancements in the 3D printer technology, it is now not very difficult to own one, even in your home or office. Moreover, you don’t have to be an AutoCAD engineer to design a 3D model for your needs, as this job is taken up by numerous 3D model websites. So, either you want to create 3D furniture, a mechanical component, or even human or animal figurines, here are 50 of the best free 3D model websites to cover up all your needs.

Know the Trade – Your IT Security Information Portal CISSP/CEH/CISA/Hacker and Penetration Testing Specialist Google Hacking allintitle:Brains, Corp. camera allintitle:"index of/admin" allintitle:"index of/root" allintitle:restricted filetype:doc site:gov allintitle:restricted filetype :mail allintitle:sensitive filetype:doc allinurl:/bash_history allinurl:winnt/system32/ (get cmd.exe) ext:ini eudora.ini ext:pwd inurl:(service|authors|administrators |users) "# -FrontPage-" filetype:bak inurl:"htaccess|passwd|shadow|htusers" filetype:conf slapd.conf filetype:ctt "msn" filetype:mdb inurl:"account|users|admin|administrators|passwd|password" filetype:mdb inurl:users.mdb filetype:QDF QDF filetype:pdf "Host Vulnerability Summary Report" "Assessment Report" filetype:sql ("passwd values ****" | "password values ****" | "pass values ****" ) filetype:xls inurl:"email.xls" filetype:user eggdrop user

Related: