The Document Which Was Formerly Called The MIT Guide to Lockpicking An interesting new lockpicking technique has been making its way around the internet. This technique uses 'bump keys' to open locks in a similar fashion to lockpicking guns but without requiring specialized hardware. You can read about bump keys in this document, and see a news report about them here. --- Presenting ---(drumroll please) I am told that the university which has its' name associated with this document would prefer not to. Which is too bad in a way. My original copy of this file was a text file zipped up with several GIF's. If you prefer, the entire thing is available as a PDF file or the original zipped postscript that the PDF was generated from. Nearly half of all the illustrations appear in chapter nine, so if that one takes a little while for your browser to fetch try to be patient. Otherwise, enjoy the file. - Akira This is how the Guide looked to me (as best I can recreate it) when it was given to me. - Dave Ferret Ted the Tool February 14, 1992 Distribution Contents
File-Extensions.org - File extension library Another Hacker’s Laptop, Cellphones Searched at Border | Threat Level A well-known and respected computer-security researcher was detained for several hours Wednesday night by border agents who searched his laptop and cellphones before returning them to him. The researcher, who goes by the hacker handle Moxie Marlinspike, was met by two U.S. Customs and Border Protection agents at the door of his plane when he arrived at JFK airport on a Jet Blue flight from the Dominican Republic. The agents escorted him to a detention room where they held him for 4 1/2 hours, he says. During that time, a forensic investigator arrived and seized Marlinspike’s laptop and two cellphones, and asked for his passwords to access his devices. Marlinspike refused, and the devices were later returned to him. “I can’t trust any of these devices now,” says Marlinspike, who prefers not to divulge his legal name. Three months later, PayPal froze his account with $500 in it because the company objected to the use of its logo on his website, where visitors could download the free tools.
FLV2MP3 SQL Injection Attacks by Example A customer asked that we check out his intranet site, which was used by the company's employees and customers. This was part of a larger security review, and though we'd not actually used SQL injection to penetrate a network before, we were pretty familiar with the general concepts. We were completely successful in this engagement, and wanted to recount the steps taken as an illustration. "SQL Injection" is subset of the an unverified/unsanitized user input vulnerability ("buffer overflows" are a different subset), and the idea is to convince the application to run SQL code that was not intended. If the application is creating SQL strings naively on the fly and then running them, it's straightforward to create some real surprises. We'll note that this was a somewhat winding road with more than one wrong turn, and others with more experience will certainly have different -- and better -- approaches. We speculate that the underlying SQL code looks something like this: A standalone query of
Clip Converter How to Take Down Facebook -- Hint: It Ain't Twitter. (aka: An Open Letter to the Next Big Social Network I've held off writing this post for a long time, because I couldn't quite get my head around all the issues. It wouldn't be accurate to say there's something "wrong" with Facebook, and it's not like I don't spend a shitload of time ego-whoring around on Twitter too. Let's face it: I'm completely & utterly addicted to social networks & tha Interwebs. but: Something is Still Missing. Assertion #1: Facebook doesn't get Intimacy. Facebook is full of my "friends", but it's not a great place to hang with my BEST friends (aka "BFF"). Now before you lose your shit, i know many of you are saying: a) Dave, you're full of crap -- intimacy doesn't come from a computer, orb) Dave, you're full of crap -- Facebook has *plenty* of intimacy, orc) Dave, you're full of crap -- the only thing that might kill Facebook is Twitter, which is the exact opposite of intimacy (true) or last but not least:d) Dave, hey WTF happened to all the crazy fonts & colors? None of these are the right response. Holy.
PDF OCR Online Converter Choose the online option for: High quality scanned documents Non confidential files Small to medium file sizes 1 Select PDF to convert Select file 2 Type your e-mail address 3 Convert PDF & Send e-mail We guarantee that your email address is secure and will never be sold, rented or given to a third party. Advanced Desktop OCR PDF Conversion Choose the desktop option for: Most Accurate OCR Output Editing PDF content Converting all types of scanned documents Able2Extract Professional 10 is one of the leading PDF OCR conversion tools on the market, used by 93% of the Fortune 100 companies. Why Able2Extract Professional 10? Instantly convert any PDF to 12 file formats Convert any printable file to Excel Convert multiple PDFs at once and save time Edit PDF text on the spot Split and merge PDF documents quickly and easily Try FREE Now Note: The quality of the OCR conversion process will largely depend on the quality of the scanned image and the clarity of the characters of that image. 30 min
Cryptome Miro Video Converter FREE - Convert any video to MP4, WebM (vp8), iPhone, Android, iPod, iPad, and more. IHTFP Hack Gallery: Welcome to the IHTFP Gallery! Free Video Converter, Any Video Converter Freeware: Convert any video to MP4/WMV/MP3 for mobile devices Any Video Converter is designed with no limitations and zero costs. It lets you effortlessly convert any video files to any format for FREE! Supported video inputs: MP4, MPEG, VOB, WMV, 3GP, 3G2, MKV, MOD, M2TS, RMVB, AVI, MOV, FLV, F4V, DVR-MS, TOD, DV, MXF, OGG, WEBM, any 4K video format and more.