background preloader

Hack This Site!

Hack This Site!

Related:  Reverse Engineering and Anti-circumvention LawNewBlogsskenyIT Securityhacking

Law and technology The New Zealand Privacy Commissioner’s office has reportedly met with police to discuss a possible criminal investigation into Google’s controversial WiFi data collection. A civil investigation sure, but a criminal one? Really? I hope the police have rather more pressing matters. The Old New Thing Welcome, Slashdot readers. Remember, this Web site is for entertainment purposes only. Sean wants to know what the role of MS-DOS was in Windows 95. I may regret answering this question since it's clear Slashdot bait.

15 Books that Will Actually Change Your Future Guest Post By Julia McCoy Books are powerful things, aren’t they? They’re like the TARDIS—they look small(ish) on the outside yet when you open them up you are immediately transported to a large interior with rooms filled with adventure. You can’t step two sentences into a book without beginning some new moment in your life. Hacking Techniques in Wireless Networks Prabhaker Mateti Department of Computer Science and EngineeringWright State UniversityDayton, Ohio 45435-0001 This article is scheduled to appear in “The Handbook of Information Security”, Hossein Bidgoli (Editor-in-Chief), John Wiley & Sons, Inc., 2005. How To Become A Hacker Copyright © 2001 Eric S. Raymond As editor of the Jargon File and author of a few other well-known documents of similar nature, I often get email requests from enthusiastic network newbies asking (in effect) "how can I learn to be a wizardly hacker?". Back in 1996 I noticed that there didn't seem to be any other FAQs or web documents that addressed this vital question, so I started this one.

Copyright and Technology DRM Anticircumvention for Dummies July 15, 2012 Posted by Bill Rosenblatt in DRM, Law. I have seen a lot of writings and gotten a lot of feedback regarding the EPUB Lightweight Content Protection (EPUB LCP) scheme I am helping to design for the International Digital Publishing Forum (IDPF), which oversees the EPUB standard. The criticisms fall into two buckets: DRM sucks, why is the IDPF wasting time on this; the security is too weak, publishers need stronger protection. Yet these diametrically opposed criticisms have one thing in common: a lack of understanding of how anticircumvention law, such as Section 1201 of the DMCA in the United States, works in practice and how it figures into the design of EPUB LCP. This lack of understanding is common to both DRM opponents and people from DRM technology vendors.

Building Resilient Services with Go – Tech Talk In this Tech Talk from GopherCon 2015, Blake Caldwell, a former Software Engineer here at Fog Creek who worked on the Kiln team, explains how he used Go to re-write and speed up KilnProxy, our SSH Reverse Proxy. Hear how he was able to re-write the service and reduce clone times by half, whilst making it more reliable and less noisy. Blake writes about Go and software development on his blog. He has open-sourced the profiler mentioned and you can get the slides from the talk on his GitHub. About Fog Creek Tech Talks At Fog Creek, we have weekly Tech Talks from our own staff and invited guests.

Earth - The strange fate of a person falling into a black hole It could happen to anyone. Maybe you're out trying to find a new habitable planet for the human race, or maybe you're just on a long walk and you slip. Whatever the circumstances, at some point we all find ourselves confronted with the age-old question: what happens when you fall into a black hole? You might expect to get crushed, or maybe torn to pieces. But the reality is stranger than that. The instant you entered the black hole, reality would split in two. I Love Free Software5 Best Free Network Packet Sniffer Here are 5 Best free network packet sniffers that does a fantastic job of packet sniffing. These free packet sniffer can analyze network packets of all outgoing traffic, and analyze information from them. Before we go further, here is a definition of a Packet Sniffer from Wikipedia:

“thereisnofatebutwhat­wemake”—Turbo-charged cracking comes to long passwords For the first time, the freely available password cracker ocl-Hashcat-plus is able to tackle passcodes with as many as 55 characters. It's an improvement that comes as more and more people are relying on long passcodes and phrases to protect their website accounts and other online assets. Until now, ocl-Hashcat-plus, the Hashcat version that can use dozens of graphics cards to simultaneously crack huge numbers of cryptographic hashes, has limited guesses to 15 or fewer characters.

EFF to Congress: Get Rid of DMCA's "Anti-Circumvention" Provisions At a congressional hearing this morning, EFF Intellectual Property Director Corynne McSherry urged lawmakers to abandon the failed “anti-circumvention” provisions of the Digital Millennium Copyright Act (DMCA)—provisions that harm researchers, innovators, and technology users of all kinds. In recent years, concerns about the anti-circumvention provisions have hit the mainstream, as cell phone users realized that something as simple as unlocking their device to use a rival carrier could get them threatened with a crime. Congress has clarified that unlocking your cell phone is legal, at least for now—but there's still a real problem when EFF and other groups (like the American Foundation for the Blind, who also testified today) have to return to the rulemaking process every three years to exhaustively argue and re-argue for temporary carve-outs.

DDI On my first day of physics graduate school, the professor in my class on electromagnetism began by stepping to the board, and wordlessly writing four equations: He stepped back, turned around, and said something like [1]: “These are Maxwell’s equations. Just four compact equations. With a little work it’s easy to understand the basic elements of the equations – what all the symbols mean, how we can compute all the relevant quantities, and so on. But while it’s easy to understand the elements of the equations, understanding all their consequences is another matter.

List of The Vampire Diaries episodes The Vampire Diaries follows the life of Elena Gilbert (Nina Dobrev), who falls for a handsome century-old vampire named Stefan Salvatore (Paul Wesley). Their lives grow more and more complicated as Stefan's vicious older vampire brother Damon Salvatore (Ian Somerhalder) also returns to town with a vendetta against his brother and the Founding Families's descendants. However Damon quickly becomes their greatest ally in their fight against evil.

Network Defense and Countermeasures: Assessing System Security Perhaps the most critical step in assessing any network is to probe the network for vulnerabilities. This means using various utilities to scan your network for vulnerabilities. Some network administrators skip this step. They audit policies, check the firewall logs, check patches, and so on. However, the probing tools discussed in this section are the same ones that most hackers use. If you want to know how vulnerable your network is, it is prudent to try the same tools that an intruder would use.

Related:  HackerhackHackinghambali