Archive for the ‘Hacking’ Category

A very brief guide to password cracking

In Cryptography, Hacking, Security on February 19, 2007 at 12:32 pm

We all understand the need to protect our private documents, accounts and files with strong passwords. But what can you do if you forget your pass phrase and can’t decrypt the file? Or perhaps your friend needs your expertise to crack that password for them…

In this brief guide, I’ll explain the concepts of password cracking and point you in the direction of sites and downloads which may be of help in such situations.
Read the rest of this entry »


Puzzlehacker online riddle

In Hacking, Mind Games on February 12, 2007 at 12:00 am

Puzzlehacker is a great online riddle for those of a “hacker mentality”.

If you are familiar with NotPr0n, Zest, Dracula’s Riddle or any other online riddles, you will be familiar with the format. But this one has a twist: it encourages you to learn hacking skills as you play…
Read the rest of this entry »

Britons fear cybercrime more than burglary!

In Education, Hacking, Information, Internet, Security on October 24, 2006 at 11:01 pm

A survey released by the UK government has revealed that the British public is now more fearful of cybercrime than burglary and crimes against the person such as muggings.
Read the rest of this entry »

Hacking web based email accounts (hotmail, yahoo, etc.)

In Hacking, Security on October 15, 2006 at 2:15 pm

I found this great article posted by Darknet which details an exploit previously found in Hotmail, Yahoo and other free web based email accounts:
Read the rest of this entry »

Keyloggers: install, detect and remove

In Hacking, Privacy on October 5, 2006 at 1:08 pm

A keylogger is a computer program or hardware device that has the ability to record your keystrokes. It can record anything that you type, including your passwords, emails, credit card number, personal information, etc. Most keyloggers are invisible, so you won’t know if they are running on your system. In this post, I will briefly describe the two types of keyloggers, point you in the direction of free downloads, and explain how keyloggers can be detected and removed.
Read the rest of this entry »

Download the Hacker’s Guide to GSM Phones

In GSM, Hacking on August 31, 2006 at 12:40 pm

The Hacker’s Guide to GSM Phones by protonigger is a great read for those interested in exploiting GSM technology. Although quite dated now, it gives a great overview of GSM technology, including information about sim cards and an explaination of how mobile phones actually work.
Read the rest of this entry »

A quick introduction to IRC (for those who don’t already use it!)

In Hacking, Internet, Uncategorized on August 10, 2006 at 10:33 am

Quite recently, I have been introduced to Internet Relay Chat (IRC for short), which I have found to be a great way of chatting online to people all over the world.

Of course, many of you reading this post will already be familiar with IRC, but for those of you who are uninitiated, here is a brief guide, including links to IRC clients for different operating systems.
Read the rest of this entry »

Spoof Caller ID

In Anonymity, Hacking, Security on June 25, 2006 at 11:27 am

“Spoofing” a caller ID enables you to hide the number you are calling from and replace it with another. This is useful for those who wish for their number to be hidden, but are thwarted by systems which block anonymous calling, or for those who would prefer return calls to their home or office.
Read the rest of this entry »

UK University offers Ethical Hacking Degree

In Hacking on June 23, 2006 at 1:06 pm

The University of Abertay in Scotland will be the first UK university to offer a degree in Ethical hacking from this September.
Read the rest of this entry »

A quick guide to hacking wireless networks

In Hacking on June 20, 2006 at 10:37 am

LAN jacking (hacking wireless area networks) has gained huge popularity in recent years, especially as wireless networks have gained popularity amongst domestic users. LAN jacking is still in the grey area of legality: it is unlikely (though not certain!) that you would be pursued for “borrowing” your neighbour’s unsecured internet access for simply checking your emails, but cracking passwords, or using heavy bandwidth could land you in court!

There are many free wireless access points which you can access legally, but for those who wish to find other ways of securing free internet access, here is my quick guide.
Read the rest of this entry »