Whos is tonyenkiducx? Who the hell are you?

Im a tinkerer. I can’t say I’m expert in anything more than ASP and MSSQL, but I make a point of playing and learning anything new and wanky. I’ve tweaked dBase, fiddled with Python, installed Apache, destroyed MS2003 server, plugged in SUN boxes, screamed at VisualStudio, urinated on Fedora, set fire too Game Maker, avoided […]

Tags: , , , , , , , , , , , , , ,

Posted in: Authors | Add a Comment

An Introduction to AJAX

No it’s not AJAX Amsterdam… it’s something more interesting (or boring to some of you)… so let’s get it started…. I. Introduction AJAX stands for Asynchronous JavaScript And XML… It is a new technology which comes to help any web developer who really is interesed in dynamic webpages… Click here for a overview of the […]

Tags: , , , , , ,

Posted in: Web Hacking | Add a Comment

Security Cloak – Mask Against TCP/IP Fingerprinting for Windows

I’ve seen quite a lot of discussion lately on how to ‘defend against nmap’ or how to change the properties of your TCP/IP Stack so your Windows OS appears to be something else (As in you can guess the OS from the TTL value passed back in a TCP/IP packet). One way you can do […]

Tags: , , , , , , , ,

Posted in: Countermeasures, Network Hacking, Windows Hacking | Add a Comment

Appledoz

Each day I check out the technology section of the bbc site, ok, its not the most in-depth, or techy site in the world, but it covers interesting stuff. One interesting article http://news.bbc.co.uk/1/hi/technology/4816520.stm talks about getting a mac to run windows. That in it self is quite cool, but to my mind its the wrong […]

Tags: , , , ,

Posted in: Apple, Windows Hacking | Add a Comment

Measuring up the Security Risks for Mac – Are Apple Prepared?

The fact is Windows is getting ripped apart with viruses, spamware, spyware, zombie clients, trojans worms and whatever else you can think of. Mac and Linux aren’t (at the moment), there are already Bluetooth viruses, so why not Linux and Mac.. Some may say it’s because they are inherently more secure, the architecture and user […]

Tags: , , , , , ,

Posted in: Apple, Linux Hacking | Add a Comment
Elevator Lift Hacking

Elevator/Lift Hacking !!!!!

This is old news to those who already knows about it (Found out about it last year and tested it till now). But i just had to try it before actually posting it up. Do you get tired of being in an elevator and someone else gets on every other floor in between the floors […]

Tags: , , , , , , , ,

Posted in: General Hacking, Hardware Hacking | Add a Comment

10 Best Security Live CD Distros (Pen-Test, Forensics & Recovery)

1. BackTrack The newest contender on the block of course is BackTrack, which we have spoken about previously. An innovative merge between WHax and Auditor (WHax formely WHoppix). BackTrack is the result of the merging of two Innovative Penetration Testing live Linux distributions Whax and Auditor, combining the best features from both distributions, and paying […]

Tags: , , , , , , , , , , , ,

Posted in: General Hacking, Security Software | Add a Comment
Spectrum ZX-81

Who is Darknet?

Well seen as though I tell the others to do some kind of introduction, probably I should do one for myself too. Then I started out with a Spectrum ZX-81 back in the olden days, typing whole games out of the Spectrum magazines I picked up from charity shops. Yah it had no tape drive, […]

Tags: , , , , , , , , ,

Posted in: Authors | Add a Comment

Donations Flood in for Guilty Security Researcher Guillaume Tena

This could be the end of reverse engineering in France sadly, I hope it doesn’t have repucussions in other parts of the world. I think it’s the end of using reverse engineering tools to find flaws in France. Maybe the next step will be to forbid the possession of debuggers and disassemblers. It’s a valid […]

Tags: , , , ,

Posted in: General News, Legal Issues | Add a Comment