background preloader

10 Clever Hacks

10 Clever Hacks
Related:  About Hacking

How to Crack the Account Password on Any Operating System | Joe Tech This guest post was written by Blair Mathis from LaptopLogic.com – your premier source for the latest laptop software news and best laptop accessories. Computer passwords are like locks on doors – they keep honest people honest. If someone wishes to gain access to your laptop or computer, a simple login password will not stop them. Most computer users do not realize how simple it is to access the login password for a computer, and end up leaving vulnerable data on their computer, unencrypted and easy to access. Are you curious how easy it is for someone to gain access to your computer? Windows Windows is still the most popular operating system, and the method used to discover the login password is the easiest. Simply download the Ophcrack ISO and burn it to a CD (or load it onto a USB drive via UNetbootin). The computer will restart and Ophcrack will be loaded. Mac The second most popular operating system, OS X is no safer when it comes to password cracking then Windows. fsck -fy dscl .

HITB Quarterly Magazine The HTML Hell Page "Hell is other websmiths." — Jean-Paul Sartre, updated Translations: GermanPolish blinking text Blinking text makes it nearly impossible to pay attention to anything else on the page. It reduces 87% of all surfers to a helpless state of fixated brain-lock, much like that of a rabbit caught in the headlights of an oncoming semi. This is not good. gratuitous animation With animations you get the all the wonderful injuries of the blink tag with the added insult of the graphics download time. marquees So, maybe you think the blink tag and cheesy animations are the worst abuse half-bright websmiths can perpetrate on your retinas? garish backgrounds The very next time we stumble across a page composed by somebody who thinks it's cool to use leaping flames or a big moire pattern or seven shades of hot pink swirly as a background, we swear we are going to reach right through the screen and rip out that festering puke's throat. unreadable text/background combinations brushscript headings Right. frames

Chaos Communication Congress 30C3 in Hamburg The 22C3 in December 2005 The congress started out in 1984 in Hamburg, moved to Berlin in 1998, and back to Hamburg in 2012, having exceeded the capacity of the Berlin venue with more than 4500 attendees. Since then, the meetings in the considerably larger venue in Hamburg continue to attract an increasing number of people, around 6,600 attendees in 2012 and most recently more than 9,000 in 2013. A large range of speakers are part of the scene. An important part of the congress are the assemblies, semi-open spaces with clusters of tables and internet connections for groups and individuals to collaborate and socialize in projects, workshops, and hands-on talks. From 1997 to 2004 the congress also hosted the annual German Lockpicking Championships. 2005 was the first year the Congress lasted four days instead of three and lacked the German Lockpicking Championships. Congresses[edit] Gallery[edit] See also[edit] References[edit] External links[edit]

Hackers Deface Entire MIT Website in Aaron Swartz Suicide Revenge Attack (Updated: Hackers Speak) How to Use Google for Hacking Google serves almost 80 percent of all the search queries on the Internet, proving itself as the most popular search engine. However, Google makes it possible to reach not only the publicly available information resources, but also gives access to some of the most confidential information that should never have been revealed. In this post, you will find the information on how to use Google for exploiting security vulnerabilities that exists within many websites. The following are some of the ways to use Google for hacking: 1. There exists many security cameras that are used for monitoring places like parking lots, college campus, road traffic etc. inurl:”viewerframe? Click on any of the search results (Top 5 recommended) and you will gain access to the live camera which has full controls. As you can see in the above screenshot, you now have access to the Live cameras which work in real-time. intitle:”Live View / – AXIS” 2. intitle:”curriculum vitae” “phone * * *” “address *” “e-mail” 3. “?

Search Google anonymously while staying logged in to your account in Firefox One of the things that keeps some users from using Google Search is the certainty that everything that is done on the site is being logged and analyzed by Google. While it is possible to overcome this, for instance by launching searches only in the browser's private browsing mode, or using search engines such as Startpage that use Google search results but do not track you, you may prefer an automated solution that just works in the background without you doing anything. You could try and use Google while you are not signed in to your Google Account, but that too means some form of tracking as there are other means besides tracking a user by account. Another option would be to use two different web browsers, one for Google searches, the other for all other activities. The new Firefox add-on Searchonymous introduces a solution that resolves this issue. Even better, the search preferences are retained so that all custom preferences are still applied to the searches.

The Original Hacker's Dictionary [This file, jargon.txt, was maintained on MIT-AI for many years, before being published by Guy Steele and others as the Hacker's Dictionary. Many years after the original book went out of print, Eric Raymond picked it up, updated it and republished it as the New Hacker's Dictionary. Unfortunately, in the process, he essentially destroyed what held it together, in various ways: first, by changing its emphasis from Lisp-based to UNIX-based (blithely ignoring the distinctly anti-UNIX aspects of the LISP culture celebrated in the original); second, by watering down what was otherwise the fairly undiluted record of a single cultural group through this kind of mixing; and third, by adding in all sorts of terms which are "jargon" only in the sense that they're technical. This page, however, is pretty much the original, snarfed from MIT-AI around 1988. -- jpd.] Verb doubling: a standard construction is to double a verb and use i as a comment on what the implied subject does. ARG n. BANG n. J.

15 películas indispensables de 2013 Esta vez presentamos un conteo más con las 15 películas que uno de nuestros colaboradores considera las mejores que trajo este 2013. Ya habíamos presentado con anterioridad una lista con las películas estrella del año, pero ahora damos espacio a un listado con producciones de todo el mundo y algunas menciones honoríficas. Sin más preámbulo, estas son 15 películas indispensables de 2013. 1.- Viola. Matías Piñeiro. Todas las tesis expuestas en la filmografía del francés Jean Luc Godard encuentran su epítome en esta, la más importante obra de uno de sus más fervientes seguidores. 3.- Blue Is The Warmest Color. ¿Hubiera funcionado siendo un filme sobre una pareja heterosexual? 4. La poética de la calle. 5.- Frances Ha. Antonioni tenía a Vitti, Bergman a Ullman, Allen a Keaton, Godard a Anna Karina. 6. ¿Qué puede ser más horrible que una masacre histórica que dio muerte a millares? 7.- Matar Extraños. ¿Un ensayo sobre la dramaturgia? 8.- Labor Day. Cada año hay una película así. 15.- Drug War.

The Coming Insurrection The Tarnac 9 were once just nine individuals who had withdrawn from the capitalist paradigm to live a quiet, communal life in an isolated French mountain village. They grew their own food, opened a small grocery store and started a movie club where they screened films for their rural neighbors. The group, nearly all of whom hailed from affluent Paris suburbs, were highly educated and, by all accounts, friendly, helpful and generous. It was an idyllic existence, far from the consumer spectacle of modern urban existence. But then someone – it has yet to be determined who – sabotaged railways in the surrounding countryside, injuring no one but delaying thousands of passengers for several hours. Suddenly the commune became a cell. In a terrifying show of force, French authorities raided the farmhouse in the predawn hours of November 11, 2008 and tore its sleeping inhabitants from their beds. “I have no idea what’s going on,” said one. —Sarah Nardi

Hackers, le livre The Undeniable Link Between Videogames and Violence John the Ripper Sample output[edit] Here is a sample output in a Debian environment. # cat pass.txt user:AZl.zWwxIh15Q # john -w:password.lst pass.txt Loaded 1 password hash (Traditional DES [24/32 4K]) example (user) guesses: 1 time: 0:00:00:00 100% c/s: 752 trying: 12345 - pookie Attack types[edit] One of the modes John can use is the dictionary attack. John also offers a brute force mode. See also[edit] References[edit] External links[edit] The definitive glossary of hacking terminology We live in an era of unprecedented cyberattacks, where malicious campaigns, both personal and governmental, are carried out across laptops and wireless networks. Even if you are not technically minded, your day-to-day life is still probably pretty crowded with stories about hacking, whether you recognize them as such or not. Have you ever installed an antivirus tool on your computer? We’ve put together a glossary of what we believe to be the most important and current hacking terms you should know. Adware: Adware can mean the software that automatically generates advertisements in a program that is otherwise free, such as an online video game. Anonymous: A non-hierarchical hacktivist collective, Anonymous uses hacking (and arguably cracking) techniques to register political protest in campaigns known as “#ops.” Back door: A back door, or trap door, is a hidden entry to a computing device or software that bypasses security measures, such as logins and password protections.

Related: