Archive | General Hacking


05 June 2006 | 51,927 views

The Top 10 Most Common Passwords

A pretty interesting article that statistically measured the frequency of passwords by taking an aggregate sample of passwords (primarily from the UK). Here are listed the most commonly occurring from the sample. 10. ‘thomas’ (0.99%) First off, at number 10, is the most common format of passwords – the name. Thomas is a perennially popular [...]

Continue Reading


01 June 2006 | 5,302 views

SyScan’06 – The Asian Hackers’ Conference

The Symposium on Security for Asia Network aims to be a very different security conference from the rest of the security conferences that the information security community in Asia has come to be so familiar and frustrated with. SyScan’06 intends to be a non-product, non-vendor biased security conference. It is the aspiration of SyScan’06 to [...]

Continue Reading


25 April 2006 | 38,948 views

Penetration Testing vs Vulnerability Assessment

There seems to be a certain amount of confusion within the security industry about the difference between Penetration Testing and Vulnerability Assessment, they are often classified as the same thing when in fact they are not. I know Penetration Testing sounds a lot more exciting, but most people actually want a VA not a pentest, [...]

Continue Reading


18 April 2006 | 235,286 views

Photos as Visual Passwords Could Foil Hackers?

I’ve tried out a few of these visual recognition password technique things, and to tell you the truth they didn’t work for me, not at all. I clicked the requisite 3-4 spots on the image, and remembered them, but when I tried to login it wouldn’t accept it. A password that uses images instead of [...]

Continue Reading


13 April 2006 | 12,720 views

British Hacker Gary McKinnon Fears Guantanamo

I don’t know what he was thinking really, tampering with US military or governmental systems without some SERIOUS protection. A British man accused of being behind the largest ever hack of US government computer networks could end up at Guantanamo Bay, his lawyer has claimed. Gary McKinnon, from London, denies causing $700,000 (£400,000) damage to [...]

Continue Reading


12 April 2006 | 45,994 views

Download Youtube.com & Google Videos With 1 Click

With one easy click! We talked about Downloading Youtube.com Videos before, but now it’s even easier. Found a new site that does this seamlessy, all you have to do is drag the bookmarklet to your toolbar, then when you see a video you want on Google or Youtube, just hit the button on your bookmark [...]

Continue Reading


08 April 2006 | 8,104 views

CIA Employees Identified Online

Pretty Scary eh? Although some people do call them the Central Lack-of Intelligence Agency. Privacy is a major issue and well people should be a little more careful about what they reveal online, perhaps I’ll rehash my old Google Hacking Presentation and write it up as a post for Darknet. I guess it would be [...]

Continue Reading


25 March 2006 | 155,610 views

Download youtube.com videos?

Ever wanted to download those cool videos from youtube.com? (Its an online video storage site similar to imageshack.us for storing images) and can’t because those peeps made it difficult for you to just download them offline? Well now you can !! Go to fileleecher.com and follow the instructions on how to copy the youtube.com video [...]

Continue Reading


25 March 2006 | 6,694 views

Spammer gets 8 years in Jail for Identity theft

Good I say, nothing worse than a spammer. A bulk e-mailer who looted more than a billion records with personal information from a data warehouse has been sentenced to eight years in prison, federal prosecutors said Wednesday. Scott Levine, 46, was sentenced by a federal judge in Little Rock, Ark., after being found guilty of [...]

Continue Reading


24 March 2006 | 7,143 views

Is Open Source Really More Secure?

Is Open Source more secure? That’s a question that can be answered with both yes and no. Not only that, but the reasons for the “yes” and the “no” are fairly much the same. Because you can see the source the task of hacking or exploiting it is made easier, but at the same time [...]

Continue Reading