Tag Archives | hacking




UK Government To Launch ‘Hack Idol’

Now this should be interesting, perhaps they should turn it into a hacking based reality TV show? From the description though it looks more centered around defense than offense and perhaps should be called ‘System Administrator Idol’. Not quite so catchy though is it. Well at least they doing something to try and nurture talent […]

Tags: , , , , , , , , ,

Posted in: General Hacking | Add a Comment

Retarded E-mails – Brute Force, Change School Grades, Hack US Military & MORE

It’s been a few months since the last Retard Update, and it’s definitely been slower since I posted the disclaimer and link on the Contact Page. There have been some weird ones, one worders, one liners and stuff in foreign languages. Anyway let’s get started with a classic ‘script-kiddy I can’t operate my computer‘ type […]

Tags: , , , , , , , , , , ,

Posted in: Retards | Add a Comment

List of Famous Hackers in Computer History Both White Hat and Black Hat

This is a very complete list, probably the most complete one I’ve seen and it includes pictures – pictures of people who rarely have their pictures taken or allow them out on the Internet. The list is according to the proper original definition of a Hacker, as taken from the New Hacker’s Dictionary: A person […]

Tags: , , , , ,

Posted in: General Hacking | Add a Comment

TJX (T.J. Maxx and Marshall’s) Hacker Jailed For 30 Years

You should be familiar with the TJX case by now (TJX Largest Breach of Customer Data in U.S. History) and we’ve been following it here for a couple of years. We reported back in August last year that the TJX Credit Card Hackers were Busted and now one of the 11 guys involved has been […]

Tags: , , , , , , ,

Posted in: General Hacking, Legal Issues | Add a Comment

Retarded E-mails – ATM Cards, Very Important Details, VOIP Testing Tools and MORE!

Merry xmas everyone, here is the year end summary of retarded e-mails. We have had a splendid amount of retarded comments recently too and some decent e-mails too (but all asking the same thing “How do I start learning to be a hacker, what should I do, what should I read etc..I’ll write a post […]

Tags: , , , , , , , , , ,

Posted in: Retards | Add a Comment

Retarded E-mails – Crack Hotmail? Hack Facebook? Boyfriend Cheating?

I get a lot of these e-mails, sometimes I receive them almost every day. I had a thought the other day, it might be amusing if I shared them with you guys. So I’ll post them up every time I receive 2-3. I’ve had a LOT of these kind of e-mails and some spooky ones […]

Tags: , , , , , , , ,

Posted in: Retards | Add a Comment

Dshocker AKA Aush0k Hacker Pleads Guilty to Computer Felonies

Another teen hacker in the news, this guy looks like he has some formidable skills though with the list of crimes he’s perpetrated. He’s pleaded guilty though, so he should get a reduced sentence and he’s still classified as a juvenile offender being only 17 – so that works in his favour too. A juvenile […]

Tags: , , , , , , , , , , , ,

Posted in: General Hacking, Legal Issues | Add a Comment

Gooscan – Automated Google Hacking Tool

Whilst reading an article the other day I saw this mentioned and realised I haven’t written about this yet either, although I have written about the similar tool Goolag. What is Gooscan? Gooscan is a tool that automates queries against Google search appliances, but with a twist. These particular queries are designed to find potential […]

Tags: , , , , , , , ,

Posted in: Hacking Tools, Web Hacking | Add a Comment

Modern Exploits – Do You Still Need To Learn Assembly Language (ASM)

This is a fairly interesting subject I think as a lot of people still ask me if they are entering the security field if they still need to learn Assembly Language or not? For those that aren’t what it is, it’s pretty much the lowest level programming languages computers understand without resorting to simply 1’s […]

Tags: , , , , , , , , , , , , , , ,

Posted in: Exploits/Vulnerabilities, Programming | Add a Comment

Popular Tags

computer-security · darknet · exploits · fuzzing · google · hacking · hacking-networks · hacking-websites · hacking-windows · hacking tool · Hacking Tools · information gathering · malware · microsoft · network-security · Network Hacking · Password Cracking · penetration-testing · Phishing · Privacy · Python · scammers · Security · Security Software · spam · spammers · sql-injection · trojan · trojans · virus · viruses · vulnerabilities · web-application-security · web-security · Web Hacking · windows · windows-security · Windows Hacking · worms · XSS ·