background preloader

Hacktivismo: News

Hacktivismo: News
cDc releases Goolag Scanner (posted by MiB on Februari 20th, 2008) SECURITY ADVISORY: The following program may screw a large Internet search engine and make the Web a safer place. LUBBOCK, TX, February 20th -- Today CULT OF THE DEAD COW (cDc), the world's most attractive hacker group, announced the release of Goolag Scanner, a web auditing tool. Goolag Scanner enables everyone to audit his or her own web site via Google. The scanner technology is based on "Google hacking," a form of vulnerability research developed by Johnny I Hack Stuff. He's a lovely fellow. "It's no big secret that the Web is the platform," said cDc spokesmodel Oxblood Ruffin. Goolag Scanner will be released open source under the GNU Affero General Public license. Goolag Scanner is a standalone windows GUI based application. Press Contact Oxblood Ruffin oxblood at hacktivismo.com About Goolag Scanner About Johnny I Hack Stuff and here About Wau Holland and here Arrakis joins the team (posted by MiB on April 24th, 2007)

http://www.hacktivismo.com/news/

Related:  Hacking tutorials sites & tools

How can I mask my IP address and become untraceable online? Hide IP NG Concerned about Internet privacy? Want to hide your IP address? Hide IP NG (short for Hide IP Next Generation) is the software you are looking for! Hackers Unite for Social Good The third Random Hacks of Kindness (RHoK) Hackathon kicks off in just a few days, bringing together hackers from all over the world to develop software for disaster relief and mitigation. The event spans December 4th and 5th with groups all over the world gathering in cities such as Buenos Aires, New York City, Singapore, and Mexico City. RHoK is hosted by Microsoft, Google, Yahoo!, NASA, and the World Bank and previous software solutions are already being implemented around the world and have helped save lives in both the Chile and Haiti earthquakes this year. "Random Hacks of Kindness goes to the heart of what we believe at Google; that the creative and cooperative use of technology can help make the world a better place and that collective intelligence is strength,” said Vint Cerf, Google Chief Internet Evangelist, in a press release.

An Overview of Cryptography 1. INTRODUCTION Does increased security provide comfort to paranoid people? Or does security provide some very basic protections that we are naive to believe that we don't need? Fibonacci Flim-Flam. The Fibonacci Series Leonardo of Pisa (~1170-1250), also known as Fibonacci, wrote books of problems in mathematics, but is best known by laypersons for the sequence of numbers that carries his name: This sequence is constructed by choosing the first two numbers (the "seeds" of the sequence) then assigning the rest by the rule that each number be the sum of the two preceding numbers. This simple rule generates a sequence of numbers having many surprising properties, of which we list but a few: Take any three adjacent numbers in the sequence, square the middle number, multiply the first and third numbers. The difference between these two results is always 1.

Painfully Computer Pranks ~ Computer Hacking Computer pranks to freak out your friends and make them crying for mummy I've been posting many articles about computer pranks on this blog (Deadly Virus Prank, The Ultimate Virus, How to Create a Fake and Harmless Virus and Facebook Virus Prank). Today , I will show you 5 great computer pranks that will frustrate your victims very much. These pranks could be very painfully, so please use them at your own risk ;) 1. milw0rm milw0rm on CNN Milw0rm is a group of "hacktivists"[1] best known for penetrating the computers of the Bhabha Atomic Research Centre (BARC) in Mumbai, the primary nuclear research facility of India, on June 3, 1998.[2] The group conducted hacks for political reasons,[3] including the largest mass hack up to that time, inserting an anti-nuclear weapons agenda and peace message on its hacked websites.[4][5] The group's logo featured the slogan "Putting the power back in the hands of the people.

Free computer forensic software tools have a recommendation? want to see your software promoted? We’re happy to receive suggestions for inclusion on this list. The software must be free and unrestricted, that is, fully functional and not time-limited. The glider: an Appropriate Hacker Emblem The Linux folks have their penguin and the BSDers their daemon. Perl's got a camel, FSF fans have their gnu and OSI's got an open-source logo. What we haven't had, historically, is an emblem that represents the entire hacker community of which all these groups are parts.

Learn Ethical Hacking Online - HackingLoops There’s a seemingly endless number of free open-source tools for penetration testing, and most of them seem to gravitate around the Kali Linux distribution. But with so many free tools, it’s easy to miss out on some of the best ones. So today we’re going to take a closer look at Armitage, define what it is, and define how it works. However, there’s a few things that you need to know before we start digging into the dirty details of how to use this tool. 80+ Best Free Hacking Tutorials Learning to become hacker is not as easy as learning to become a software developer. I realized this when I started looking for learning resources for simple hacking people do. Even to start doing the simplest hack on own, a hacker requires to have in depth knowledge of multiple topics. Some people recommend minimum knowledge of few programming languages like C, Python, HTML with Unix operating system concepts and networking knowledge is required to start learning hacking techniques. Though knowing a lot of things is required, it is not really enough for you to be a competent and successful hacker.

Top 15 Open Source/Free Security/Hacking Tools 1. Nmap Nmap (“Network Mapper”) is a free and open source (license) utility for network discovery and security auditing. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics.

Related: