background preloader

Hhbk from textfiles.com

Hhbk from textfiles.com
Related:  phreaking

Know the Trade Your IT Security Information Portal CISSP/CEH/CISA/Hacker... Google Hacking allintitle:Brains, Corp. camera allintitle:"index of/admin" allintitle:"index of/root" allintitle:restricted filetype:doc site:gov allintitle:restricted filetype :mail allintitle:sensitive filetype:doc allinurl:/bash_history allinurl:winnt/system32/ (get cmd.exe) ext:ini eudora.ini ext:pwd inurl:(service|authors|administrators |users) "# -FrontPage-" filetype:bak inurl:"htaccess|passwd|shadow|htusers" filetype:conf slapd.conf filetype:ctt "msn" filetype:mdb inurl:"account|users|admin|administrators|passwd|password" filetype:mdb inurl:users.mdb filetype:QDF QDF filetype:pdf "Host Vulnerability Summary Report" "Assessment Report" filetype:sql ("passwd values ****" | "password values ****" | "pass values ****" ) filetype:xls inurl:"email.xls" filetype:user eggdrop user intitle:"Apache::Status" (inurl:server-status | inurl:status.html | inurl:apache.html) intitle:"Welcome to IIS 4.0!" These log files record info about the SSH client PUTTY.

Thinking Machine 4 Thinking Machine 4 explores the invisible, elusive nature of thought. Play chess against a transparent intelligence, its evolving thought process visible on the board before you. The artwork is an artificial intelligence program, ready to play chess with the viewer. Play the game. Image Gallery View a range of still images taken from Thinking Machine 4. About the work More information about the project and answers to common questions. Credits Created by Martin Wattenberg, with Marek Walczak. About the artists Martin Wattenberg's work centers on the theme of making the invisible visible. Marek Walczak is an artist and architect who is interested in how people participate in physical and virtual spaces.

Phreaking boxes Phreaking boxes are devices used by phone phreaks to perform various functions normally reserved for operators and other telephone company employees. Most phreaking boxes are named after colors, due to folklore surrounding the earliest boxes which suggested that the first ones of each kind were housed in a box or casing of that color. However, very few physical specimens of phreaking boxes are actually the color for which they are named. Today, most phreaking boxes are obsolete due to changes in telephone technology. List of phreaking boxes[edit] This is not a comprehensive list. This list of boxes does not include wiretapping "bugs", pirate broadcasting apparatus or exploits involving computer security. See also[edit] External links[edit]

HackQuest :: Learn about Hacking, Cracking, JavaScript, PHP, Cryptology and Password security How to Build a Robot Tutorial - Society of Robots Introduction to Mechanical Engineering Theory, Statics Want to optimize your robot parameters mathematically? Want to verify that an expensive motor you are about to purchase has enough torque? This is a math tutorial for robot chassis construction. My approach will be talking about the most common calculation uses of mechanical forces for robots. Theory: Statics Statics is concerned about how a mechanical system would act if everything is perfectly motionless and rigid. Remember in elementary you learned (or should have learned) that for every force there is an equal and opposite force? Now suppose you add in friction of joints, efficiency rates, multiple actuators, and unevenly distributed weight across an oddly shaped object. Moment Arms Moment arms will probably be the most useful for you. Moment = Force * distance Here is the first example. All you do is measure the distance and multiply that by the force that is being applied. Now suppose your robot is lifting a beer with an arm.

How To Validate A Credit Card With Your Mind | 1m4ge How To Validate A Credit Card With Your Mind [source] Accept Credit Cards Using your Smartphone with no monthly fees - Try Kudos Today! RedditTumblrStumbleUponDigg Labels: graphic, illustration, infographic You may also like : Mercedes Key Chain Pendrive Crystal Owl Pendrive Star Trek Pizza Cutter Asparagus Cake Crystal Car Pendrive Chameleon Light 5 comments: July 6, 2011 at 6:09 AM EteRniTy said... It worked for most of the cards...but still there are some exceptions...I use my Master Credit Card which doesn't follow this. July 24, 2011 at 6:04 PM NeKroloGiK said... Same here, I have a master card and it doesn't follow. July 28, 2011 at 5:39 AM elads said... yea... now do cvv/2... October 14, 2011 at 4:27 PM Joao said... so... what exactly does this "skill" help you with? November 1, 2013 at 4:42 PM Jason Murphy said... I wonder if this apply to most or all credit cards. Post a Comment Newer PostOlder Post Subscribe to: Post Comments (Atom) Tags Subscribe via e-mail Enter your email address: Top 1m4ge Blog Archive

How to start investing : This little piggy tale Once upon a time, in the charming little town of Pigglesworth, there lived five little piggies – Patricia, Priscilla, Pippin, Pookie and Pinky. They all had a great desire to retire and enjoy the relaxed life around Pigglesworth. Here are their stories: This little piggy went to market The oldest piggy Patricia wanted to become rich fast. Well, the plum season got over and Patricia, highly excited, went back to the market to sell all her plums. There went Patricia’s dream to retire rich. Lesson: Never put all you eggs in one basket. This little piggy stayed home The second piggy, Priscilla, decided she is going to marry the richest piggy in town and become rich that way. She didn’t pay much attention to her husband’s spending neither did she plan for her own retirement (spousal IRA). Unfortunately after a few years they grew apart and before their 15th anniversary they got divorced. There went Priscilla’s dream of retiring rich. This little piggy had roast beef This little piggy had none

Phone hacking Phone hacking is the practice of intercepting telephone calls or voicemail messages, often by accessing the voicemail messages of a mobile phone without the consent of the phone's owner. The term came to prominence during the News International phone hacking scandal, in which it was alleged (and in some cases proved in court) that the British tabloid newspaper the News of the World had been involved in the interception of voicemail messages of the British Royal Family, other public figures, and the murdered schoolgirl Milly Dowler.[1] Risks[edit] Although any mobile phone user may be targeted, "for those who are famous, rich or powerful or whose prize is important enough (for whatever reason) to devote time and resources to make a concerted attack, there are real risks to face."[2] Techniques[edit] Voicemail[edit] Handsets[edit] Other[edit] Legality[edit] See also[edit] References[edit] External links[edit]

Related: