Archive | General Hacking


25 March 2006 | 6,698 views

Spammer gets 8 years in Jail for Identity theft

Good I say, nothing worse than a spammer. A bulk e-mailer who looted more than a billion records with personal information from a data warehouse has been sentenced to eight years in prison, federal prosecutors said Wednesday. Scott Levine, 46, was sentenced by a federal judge in Little Rock, Ark., after being found guilty of […]

Continue Reading


24 March 2006 | 7,143 views

Is Open Source Really More Secure?

Is Open Source more secure? That’s a question that can be answered with both yes and no. Not only that, but the reasons for the “yes” and the “no” are fairly much the same. Because you can see the source the task of hacking or exploiting it is made easier, but at the same time […]

Continue Reading


16 March 2006 | 76,418 views

Elevator/Lift Hacking !!!!!

This is old news to those who already knows about it (Found out about it last year and tested it till now). But i just had to try it before actually posting it up. Do you get tired of being in an elevator and someone else gets on every other floor in between the floors […]

Continue Reading


14 March 2006 | 1,139,356 views

10 Best Security Live CD Distros (Pen-Test, Forensics & Recovery)

1. BackTrack The newest contender on the block of course is BackTrack, which we have spoken about previously. An innovative merge between WHax and Auditor (WHax formely WHoppix). BackTrack is the result of the merging of two Innovative Penetration Testing live Linux distributions Whax and Auditor, combining the best features from both distributions, and paying […]

Continue Reading


02 March 2006 | 12,231 views

Norton Antivirus Funny Bug

the following exploits (if we can call it this way) was published on securityfocus bugtraq mailinglist… it is entirely reproduced in the following lines: Norton Internet monitoring tools issues Versions Affected : * Fix : No What im writing about is how to stop the internet of some user that is using the norton tools […]

Continue Reading


01 March 2006 | 17,302 views

Should Social Engineering be a part of Penetration Testing?

This is actually a very interesting debate. Just to introduce if you don’t know.. What is Penetration Testing A penetration test is a method of evaluating the security of a computer system or network by simulating an attack by a malicious cracker. The process involves an active analysis of the system for any weaknesses, technical […]

Continue Reading


27 February 2006 | 415,329 views

Password Cracking with Rainbowcrack and Rainbow Tables

What is RainbowCrack & Rainbow Tables? RainbowCrack is a general propose implementation of Philippe Oechslin’s faster time-memory trade-off technique. In 1980 Martin Hellman described a cryptanalytic time-memory trade-off which reduces the time of cryptanalysis by using precalculated data stored in memory. This technique was improved by Rivest before 1982 with the introduction of distinguished points […]

Continue Reading


24 February 2006 | 22,797 views

mIRC Backdoor

Well it’s not really a backdoor… but we can consider it one… Some time ago it apeared on many websites (including mine) an article about a backdoor in mIRC… all this backdoor stuff was really nothing more than a mIRC script that by it’s mean made the client to respond at any command received via […]

Continue Reading


24 February 2006 | 6,521 views

Passwords Passe at RSA

SAN JOSE, California — Identity theft and online bank fraud were the unofficial themes of the 2006 RSA Conference, a massive security confab where Bill Gates came to announce the imminent death of the password and vendors filled the exhibition halls with iPod giveaways and promises that their product could stop everything from spam and […]

Continue Reading


23 February 2006 | 8,231 views

Google Desktop 3 Enterprise

Google Enterprise has reacted to privacy concerns and released Google Desktop 3 Enterprise. It responds to security concerns allowing full administrator control, letting them use the standard group policy settings to completely disable features, including the controversial Search Across Computers feature which you can read about in our original article. Google Enterprise’s Article

Continue Reading