background preloader

The Hacker Manifesto

The Hacker Manifesto
by +++The Mentor+++ Written January 8, 1986 Another one got caught today, it's all over the papers. "Teenager Arrested in Computer Crime Scandal", "Hacker Arrested after Bank Tampering"... Damn kids. They're all alike. But did you, in your three-piece psychology and 1950's technobrain, ever take a look behind the eyes of the hacker? I am a hacker, enter my world... Mine is a world that begins with school... Damn underachiever. I'm in junior high or high school. Damn kid. I made a discovery today. Damn kid. And then it happened... a door opened to a world... rushing through the phone line like heroin through an addict's veins, an electronic pulse is sent out, a refuge from the day-to-day incompetencies is sought... a board is found. Damn kid. You bet your ass we're all alike... we've been spoon-fed baby food at school when we hungered for steak... the bits of meat that you did let slip through were pre-chewed and tasteless. Yes, I am a criminal. I am a hacker, and this is my manifesto.

http://www.mithral.com/~beberg/manifesto.html

Related:  Hacks/ToolsSecurity - Privacy - Back Ups - Hacking - DownloadingHacking/CrackingComputer TweaksMiscellaneous & Ideas

Software gives visual representation of who’s following you online By Stephen C. WebsterThursday, March 1, 2012 11:08 EDT A new piece of software released this week by browser-maker Mozilla does something unique: it provides a real-time visualization of who is tracking your movements online. The software is called “Collusion,” developed last year by Mozilla programmer Atul Varma, who became inspired to code the program after reading extensively about online privacy matters. It plugs into the Firefox browser and watches as websites and ad networks drop “cookies” into the browser during normal surfing. The Hack FAQ: Password Basics This section deals with the basics regarding passwords. 4.1 What are some password basics? Most accounts on a computer system usually have some method of restricting access to that account, usually in the form of a password. When accessing the system, the user has to present a valid ID to use the system, followed by a password to use the account. Most systems either do not echo the password back on the screen as it is typed, or they print an asterisk in place of the real character.

The Best Hacking Tutorial Sites - Learn Legal Hacking written by: Daniel Robson•edited by: Aaron R.•updated: 2/13/2011 Whether it's to understand potential attack vectors or simply for the fun of it, learning the basics of hacking is something that a lot of people aspire to. Using PS3 Controller in Windows (Wired) This guide is to show you how to Use PS3 Controller in Windows – (Wired). Works for Windows 7, Vista and XP. Those using their SIXAXIS or Dualshock 3 controller can use this guide. There are FOUR methods to use from. UVB-76 UVB-76, also known as "the Buzzer", is the nickname given by radio listeners to a shortwave radio station that broadcasts on the frequency 4625 kHz.[1][2] It broadcasts a short, monotonous buzz tone , repeating at a rate of approximately 25 tones per minute, 24 hours per day.[1] Sometimes, the buzzer signal is interrupted and a voice transmission in Russian takes place.[3] The first reports were made of a station on this frequency in 1982.[4] Its origins have been traced to Russia, and although several theories with varying degrees of plausibility exist, its actual purpose has never been officially confirmed and remains a source of speculation.[5] The name[edit] Format[edit]

Getting Started - Google Swiffy Swiffy can be used in two ways: With the Swiffy Extension, you can directly publish to HTML5 from Adobe Flash Professional. On the Swiffy homepage, you can upload your SWF file to convert it to HTML5. Both methods will always use the most recent version of Swiffy. How Swiffy works Swiffy converts a SWF file to an HTML page that contains an efficient representation of the file as a JSON object. Great apps for defeating hackers One candidate allegedly told a hiring manager that he would do anything for a job -- even if that meant committing a crime, according to CareerBuilder.com. iStockphoto (MoneyWatch) It's a dangerous world out there for computer users, with hackers constantly on the prowl for ways to steal passwords, penetrate networks or read people's emails. Even your private voice communications may not be secure since cell phone service and Skype use only relatively lightweight encryption to keep away prying ears. There are highly secure solutions available, of course. CellCrypt, for example, is a commercially available, military-grade encryption system that runs on smartphones like iPhone and Android.

How To Become A Hacker Copyright © 2001 Eric S. Raymond As editor of the Jargon File and author of a few other well-known documents of similar nature, I often get email requests from enthusiastic network newbies asking (in effect) "how can I learn to be a wizardly hacker?". Back in 1996 I noticed that there didn't seem to be any other FAQs or web documents that addressed this vital question, so I started this one. A lot of hackers now consider it definitive, and I suppose that means it is. Still, I don't claim to be the exclusive authority on this topic; if you don't like what you read here, write your own.

Related:  Operation NewbloodHacking / HackenNerd Stuffhack stuffHacking, and exploits and stuff. For learning puproses only.robertjohnstonProgrammingComputer ScienceManifestoes