Elevator Hacks – How To Override To Skip Floors

Elevator Hacks – How To Override To Skip Floors

These Elevator Hacks are old news to those who already know about it (Found out about it last year and tested it till now). But I just had to try it before actually posting it up. Do you get tired of being in an elevator and someone else gets on every other floor in between […]

Topic: Hardware Hacking

Who is Haydies? Me my self and quite possibly some one else.

Shaolin introduced him self, and said he had asked every one to do like wise. News to me mate :-P or did that slip my mind? Can’t see how it could but one never knows… So, any way, who the hell am I? I have known Shaolin for years, he might have some idea how […]

Topic: Authors

10 Best Security Live CD Distros (Pen-Test, Forensics & Recovery)

1. BackTrack The newest contender on the block of course is BackTrack, which we have spoken about previously. An innovative merge between WHax and Auditor (WHax formely WHoppix). BackTrack is the result of the merging of two Innovative Penetration Testing live Linux distributions Whax and Auditor, combining the best features from both distributions, and paying […]

Topic: Hacking Tools, Networking Hacking
Spectrum ZX-81

Who is Darknet?

Well seen as though I tell the others to do some kind of introduction, probably I should do one for myself too. Then I started out with a Spectrum ZX-81 back in the olden days, typing whole games out of the Spectrum magazines I picked up from charity shops. Yah it had no tape drive, […]

Topic: Authors

Donations Flood in for Guilty Security Researcher Guillaume Tena

This could be the end of reverse engineering in France sadly, I hope it doesn’t have repucussions in other parts of the world. I think it’s the end of using reverse engineering tools to find flaws in France. Maybe the next step will be to forbid the possession of debuggers and disassemblers. It’s a valid […]

Topic: Legal Issues

VMWare Rootkits, The Next Big Threat?

Lab rats at Microsoft Research and the University of Michigan have teamed up to create prototypes for virtual machine-based rootkits that significantly push the envelope for hiding malware and that can maintain control of a target operating system. The proof-of-concept rootkit, called SubVirt, exploits known security flaws and drops a VMM (virtual machine monitor) underneath […]

Topic: Malware