Market Share of Hacking Targets

hacker_659px

My site is dedicated to further exploring the techniques and know-how of hacking the various operating systems and configurations a person might run into among the vast wilderness that is the internet. It has come to my attention that the … Continue reading

Passive Operating System Fingerprinting with p0f

p0f-fingerprinting

Passive fingerprinting works by quietly examining packets for patterns and not  sending data directly to a target host. Due to this passive analysis, the remote system will not be able to detect the packet capture. The process is completely passive … Continue reading

Historical Hacking Philes: Improving the Security of Your Site by Breaking Into it (1993)

again_china_implicated_espionage

Dan Farmer Wietse Venema Sun Microsystems Eindhoven University of Technology 2550 garcia ave MS PAL1-407 P.O. Box 513, 5600 MB Mountain View CA 94043 Eindhoven, NL zen@sun.com wietse@wzv.win.tue.nl Introduction ———— Every day, all over the world, computer networks and hosts … Continue reading

Max Headroom’s List of Acronyms – pt 1 (1990’s)

max-headroom

A lot of you are probably feeling the same I way am right at the moment I am writing this file. I just got done applying for a nice board and I simply went blank while filling out the New … Continue reading

Hackers – Wizards of the Electronic Age (1984)

Hackers – Wizards of the Electronic Age is a PBS documentary directed by Fabrice Florin filmed at the first Hacker Conference that took place at the Headlands Institute Conference Center in 1984. The conference was organized as a result of … Continue reading

Historical Hacking Philes: ATM Security Overview (1987)

ATM

(>View: automatic teller machines From ames!amdahl!nsc!voder!wlbr!gins Mon Jul 13 12:41:23 PDT 1987 Article 479 of sci.crypt: Path: ames!amdahl!nsc!voder!wlbr!gins >From: gins@wlbr.UUCP (Fred Ginsburg) Newsgroups: sci.crypt Subject: Re: ATM secret codes Summary: ATM stuff LONG… Message-ID: <1038@wlbr.UUCP> Organization: Eaton IMS, Westlake Village, … Continue reading

Historical Hacking Philes: ARPANET Information Brochure (1985)

arpanet-5_large (1)

ARPANET INFORMATION BROCHURE DECEMBER 1985   Editor: Stephen C. Dennett Elizabeth J. Feinler Francine Perillo Additional copies of this document may be obtained from the DDN Network Information Center, SRI International, 333 Ravenswood Avenue, Room EJ291, Menlo Park, CA 94025, or from … Continue reading

Historical Hacking Philes: A Beginners Guide to Hacking Unix by Jester Sluggo (1985)

A-BEGINNERS-GUIDE-TO-Hacking-Unix-740x230

************************************** * A beginners guide to: * * H A C K I N G * * * * U N I X * * * * By Jester Sluggo * * Written 10/08/85 * ************************************** In the following file, … Continue reading

Historical Hacking Philes: My Favourite UNIX Commands, By ZeeBee (1990)

Unix-1

*** My Favourite UNIX Commands *** *** A List Of Some OF The Most Useful UNIX ** *** Hacking Commands, and Some Hints On Their Usage *** *** Written By ZeeBee Australia Inc. 1990 *** Ok UNIX freaks, here is … Continue reading

Robert Tappan Morris – Creator of the First Internet Worm

images

Robert Tappan Morris (born November 8, 1965) is an American computer scientist and entrepreneur. He is best known for creating the Morris Worm in 1988, considered the first computer worm on the Internet, and for companies he has founded. Morris … Continue reading

MafiaBoy Brings Down Yahoo, eBay, Amazon, and others…

article-2477746-1902D66800000578-687_634x434

MafiaBoy was the Internet alias of Michael Demon Calce, a high school student from West Island, Quebec, who launched a series of highly publicized denial-of-service attacks in February 2000 against large commercial websites including Yahoo!, Fifa.com, Amazon.com, Dell, Inc., E*TRADE, … Continue reading

Documentary: The Day of the Technopath (1989)

The October 11th, 1989 Dispatches episode – The Day of the Technopath – explores computer security threats of the era. This documentary is particularly interesting because very common problems today are discussed at their infancy: organized crime first experimenting with … Continue reading