Tag Archive | "dos"


25 February 2009 | 7,380 views

Hackers Targeting Xbox Live Players with DoS Attacks

Well the day has come when money-minded botnet owners have turned their services towards online gaming. For a small fee (USD20) you can get someone to set you up with the software to ‘boot’ people from the Xbox Live network. It’s always been a problem in gaming, if something can get hold of your IP […]

Continue Reading


29 January 2009 | 7,329 views

Kyrgyzstan Taken Offline by Huge Denial of Service Attack

Isn’t it amazing in this day and age an entire country can be knocked offline by Denial of Service attacks! You’d have though it wouldn’t happen any more. I do remember the days when it was fairly easy to take one of the smaller ISPs out in UK, so I guess the infrastructure of some […]

Continue Reading


19 November 2008 | 6,717 views

Dshocker AKA Aush0k Hacker Pleads Guilty to Computer Felonies

Another teen hacker in the news, this guy looks like he has some formidable skills though with the list of crimes he’s perpetrated. He’s pleaded guilty though, so he should get a reduced sentence and he’s still classified as a juvenile offender being only 17 – so that works in his favour too. A juvenile […]

Continue Reading


03 March 2008 | 6,490 views

New Sophisticated Botnets Discovered

It seems like botnets are getting more sophisticated – we thought the Storm Worm was pretty hot, but some of these new contenders are showing the guys on the dark side has some advanced understanding of technology and the architecture many companies use…this enables them to get deeper inside and remain undetected Researchers have unearthed […]

Continue Reading


28 February 2008 | 10,696 views

Teenage Bot Herder Admits to Infecting Military Computers

Hacking for money again? Well not really in this case, more like script kiddying for money – modifying an ‘off the shelf’ malware/bot package to evade detection and then cashing in on spamware affiliate fees. I guess they could have made much with a 400,000 bot network – by renting it out for DDoS attacks […]

Continue Reading


19 November 2007 | 14,879 views

The World’s Biggest Botnets – Peer to Peer

So what’s coming next, after Storm you might ask. You might remember Storm Worm Descending on Blogspot recently and other news about Botnets spiraling out of control accounting for almost 25% of online computers. Well apparently next will be p2p or peer to peer Botnets which could literally blow Storm away. You know about the […]

Continue Reading


26 July 2007 | 7,671 views

TimeWarner DNS Hijacking IRC Servers to Stop DDoS Attacks

An interesting happening this week, some ISP’s have been jacking the DNS entries for certain IRC networks to crack down on zombie/bot infections. Is it ethical? Should they be doing this to their users? I first got wind of this from a post on Full Disclosure mailing list from an IRC network administrator. You can […]

Continue Reading


02 July 2007 | 8,086 views

Piping Data in DOS on Windows – Video

Well this is my last week of exams, and today I got a free day, tomorrow it will be maths… Anyway while waiting for somebody I got bored and decided to make a small (tiny) video about piping data under windows, you know | … In Unix-like computer operating systems, a pipeline is the original […]

Continue Reading


16 June 2007 | 9,063 views

Netstat Revealed!

Another video in 2-3 days… I think i this becoming like a mania for me… Anyway in this video i played around with netstat so that for those who do not play with it could see the possibilities it offers to us… no more tutorials like: netstat -a to view all you connections the end […]

Continue Reading


17 May 2007 | 10,397 views

ISIC – IP Stack Integrity & Stability Checker

ISIC is a suite of utilities to exercise the stability of an IP Stack and its component stacks (TCP, UDP, ICMP et. al.) It generates piles of pseudo random packets of the target protocol. The packets be given tendencies to conform to. Ie 50% of the packets generated can have IP Options. 25% of the […]

Continue Reading


Popular Tags

computer-security · darknet · exploits · google · hacking · hacking-networks · hacking-websites · hacking-windows · hacking tool · Hacking Tools · Information-Security · information gathering · malware · microsoft · network-security · Network Hacking · Password Cracking · penetration-testing · Phishing · Privacy · Python · scammers · Security · Security Software · spam · spammers · sql-injection · trojan · trojans · virus · viruses · vulnerabilities · web-application-security · web-security · Web Hacking · windows · windows-security · Windows Hacking · worms · XSS ·