background preloader

Certified Ethical Hacker, EC Council, CEH, Information Security, Computer Security, Network Security, Internet Security, Security Courses, Hacking

2600: The Hacker Quarterly ‘Hackers’ doff hats So-called white hat hacker Grant Cherrington, of Wellington, has given up the practice of making uninvited security checks on organisations’ online systems. Cherrington, and an Auckland security specialist, Brett Moore, of Software Creations, were branded unethical by others in the security industry for the practice. Cherrington says he’s given it up because it took too much time and did not generate sufficient business. “The hosts identified as insecure were generally unappreciative of our efforts. Moore says he’s abandoned the practice because once insecurities were identified, the administrators of the vulnerable systems were fixing the holes themselves. The man who criticised the pair, Auckland security specialist Tony Krzyzewski, of Kaon Technologies, has welcomed their change of heart, saying it makes them more “professional and ethical”. Tags hackersBrett Moorewhite hat hackersecurityGrant Cherringtonhacking

Wake Up SEOs, the New Google is Here No, not just because it decided I was not going to be not provided with useful information about my sites. And neither because it is changing practically every tool I got used since my first days as an SEO (Google Analytics, Webmaster Tools, Gmail…). And, honestly, not only because it released a ravenous Panda. No, the real question that is causing my headaches is: What the hell does Google want to go with all these changes? Search engine optimization is about putting your site's best foot forward when it comes to visibility in search engines, but your ultimate consumers are your users, not search engines. If you want to put your site’s best foot forward and make it the most visible possible in search engines, then you have to be a master in technical SEO. Is all this obvious? The next time you hear someone saying “Content is King” or “Social is the new link building”, snap her face and ask her when it was the last time she logged in Google Webmaster Tools. The decline of Link graph

.:: Phrack Magazine ::. The State of Social Media in 2012: An Interview With The Speakers of #MozCon The author's posts are entirely his or her own (excluding the unlikely event of hypnosis) and may not always reflect the views of Moz. The world is changed (Galadriel) The world has changed a lot. Ten years ago the Internet existed, but it was quite different. In 2003, the first version of WordPress was released, soon followed by a relaunched Blogger which was acquired by Google that same year. Ten years ago, the now concept of Web 2.0 was a great novelty; people, rather than websites themselves, were what the web was made of. Fast forward a few years and, thanks to technology and a higher penetration of use of the Internet, the world was ready for a new concept of website: the social network. Like it or not, the Internet now is intrinsically linked to the concept of social, so much that it is obvious that even the weirdest niche must have a social and community based network has a home online. The most recent "revolution" is within the mobile realm. Enjoy! I don’t care for Google+.

Hacking by Numbers :: Hack In The Box :: Keeping Knowledge Free By: Madirish Hacking, How's it Done? I get a lot of questions via email from people that want to know if I can hack into a website for them, or break into someone's Hotmail account. At first I didn't really understand why people would be asking me these sorts of questions (other than the obvious that they couldn't do it but wanted someone else to break the law on their behalf), but as I pondered the cause for these emails I began to realize that most people's understanding of hackers is generated purely by the mass media. I suppose this fact is true for many occupations and hobbies, but with hacking it is particularly disturbing. For those of you trying to learn how to break into systems let me pose a question: why? Methods How do you hack? Step 1. While this seems fairly obvious you'd be surprised by the number of people that don't even make it this far. that don't know, you can follow Bugtraq via NNTP if you want, or sign up for one of the many kiddies lurking there to find some. 1.)

DojoCon 2010 - Where Security Masters Lead. quirky trek support keeps your batteries charged on the go - technabob September 22nd, 2010 by Shane McGlaun I bet that many geeks have the same issues when they travel that I do. The biggest problem is that I tend to travel with as many gadgets as I do clothing. It’s also really hard to keep the things charged up when I am on the road, and stuff always runs out of juice when I want to use it. Help has arrived. Quirky has a cool new product in the works called the Trek Support. The notebook sleeve is removable and is held in place with Velcro. As is the case with all Quirky products, it won’t be made until enough people decide to order one. Steve Jobs Gets Busted Rampant View Turns Your iPod Nano 5g Into a Helmet Cam

Related: