Archive | General Hacking

Penetration Testing vs Vulnerability Assessment

There seems to be a certain amount of confusion within the security industry about the difference between Penetration Testing and Vulnerability Assessment, they are often classified as the same thing when in fact they are not. I know Penetration Testing sounds a lot more exciting, but most people actually want a VA not a pentest, […]

Tags: , , , , , , , , , ,

Posted in: General Hacking | Add a Comment

Photos as Visual Passwords Could Foil Hackers?

I’ve tried out a few of these visual recognition password technique things, and to tell you the truth they didn’t work for me, not at all. I clicked the requisite 3-4 spots on the image, and remembered them, but when I tried to login it wouldn’t accept it. A password that uses images instead of […]

Tags: , , , , , ,

Posted in: General Hacking | Add a Comment

British Hacker Gary McKinnon Fears Guantanamo

I don’t know what he was thinking really, tampering with US military or governmental systems without some SERIOUS protection. A British man accused of being behind the largest ever hack of US government computer networks could end up at Guantanamo Bay, his lawyer has claimed. Gary McKinnon, from London, denies causing $700,000 (£400,000) damage to […]

Tags: , , , , , , ,

Posted in: General Hacking, Legal Issues | Add a Comment

Download & Google Videos With 1 Click

With one easy click! We talked about Downloading Videos before, but now it’s even easier. Found a new site that does this seamlessy, all you have to do is drag the bookmarklet to your toolbar, then when you see a video you want on Google or Youtube, just hit the button on your bookmark […]

Tags: , , , , , , , , ,

Posted in: General Hacking | Add a Comment

CIA Employees Identified Online

Pretty Scary eh? Although some people do call them the Central Lack-of Intelligence Agency. Privacy is a major issue and well people should be a little more careful about what they reveal online, perhaps I’ll rehash my old Google Hacking Presentation and write it up as a post for Darknet. I guess it would be […]

Tags: , , , , , ,

Posted in: General Hacking, Privacy | Add a Comment

Download videos?

Ever wanted to download those cool videos from (Its an online video storage site similar to for storing images) and can’t because those peeps made it difficult for you to just download them offline? Well now you can !! Go to and follow the instructions on how to copy the video […]

Tags: , , , , , , , ,

Posted in: General Hacking, Web Hacking | Add a Comment

Spammer gets 8 years in Jail for Identity theft

Good I say, nothing worse than a spammer. A bulk e-mailer who looted more than a billion records with personal information from a data warehouse has been sentenced to eight years in prison, federal prosecutors said Wednesday. Scott Levine, 46, was sentenced by a federal judge in Little Rock, Ark., after being found guilty of […]

Tags: , , , , ,

Posted in: General Hacking | Add a Comment

Elevator/Lift Hacking !!!!!

This is old news to those who already knows about it (Found out about it last year and tested it till now). But i just had to try it before actually posting it up. Do you get tired of being in an elevator and someone else gets on every other floor in between the floors […]

Tags: , , , , , , , ,

Posted in: General Hacking, Hardware Hacking | Add a Comment

10 Best Security Live CD Distros (Pen-Test, Forensics & Recovery)

1. BackTrack The newest contender on the block of course is BackTrack, which we have spoken about previously. An innovative merge between WHax and Auditor (WHax formely WHoppix). BackTrack is the result of the merging of two Innovative Penetration Testing live Linux distributions Whax and Auditor, combining the best features from both distributions, and paying […]

Tags: , , , , , , , , , , , ,

Posted in: General Hacking, Security Software | Add a Comment

Popular Tags

computer-security · darknet · exploits · fuzzing · google · hacking · hacking-networks · hacking-websites · hacking-windows · hacking tool · Hacking Tools · information gathering · malware · microsoft · network-security · Network Hacking · Password Cracking · penetration-testing · Phishing · Privacy · Python · scammers · Security · Security Software · spam · spammers · sql-injection · trojan · trojans · virus · viruses · vulnerabilities · web-application-security · web-security · Web Hacking · windows · windows-security · Windows Hacking · worms · XSS ·