Anonymous Search Results

How To: Things to Do on WonderHowTo (05/30 - 06/05)

WonderHowTo is a how-to website made up of niche communities called Worlds, with topics ranging from Minecraft to science experiments to Scrabble and everything in-between. Check in every Wednesday evening for a roundup of user-run activities and how-to projects from the most popular communities. Users can join and participate in any World they're interested in, as well as start their own community.

How To: Things to Do on WonderHowTo (05/16 - 05/22)

WonderHowTo is a how-to website made up of niche communities called Worlds, with topics ranging from Minecraft to science experiments to Scrabble and everything in-between. Check in every Wednesday evening for a roundup of user-run activities and how-to projects from the most popular communities. Users can join and participate in any World they're interested in, as well as start their own community.

Don't Get Doxed: 5 Steps to Protecting Your Private Information on the Web

If you follow the Anonymous, Occupy, and IT security scenes, you have no doubt heard about a dox release. What is it? How can it hurt you? And most importantly, how can you protect yourself from it? Some of these steps might seem common sense, while others will be an ah-ha! moment. Your private info is both your biggest weakness and your biggest weapon in your battle to remain anonymous. You must learn how to use it as both.

How To: Create an SSH Tunnel Server and Client in Linux

SSH is what is referred to as the Secure SHell protocol. SSH allows you to do a plethora of great things over a network, all while being heavily encrypted. You can make a remote accessible shell on your home computer that gives you access to all your files at home, and you can even tunnel all of your traffic to keep you anonymous and protected on public Wi-Fi. It has many great uses and is a must have tool for your arsenal. It was designed to replace the insecure Telnet protocol, which sends ...

HowTo: Screw the President (Well, Sorta)

Whether you're an Obama lover or Obama hater, here's your chance to, ahem, screw him, somewhat literally. The president starred in the recent Sex Culture Festival in the southern city of Guangzhou, China. The screen-printed blow up doll is shown photographed next to his fellow adult toy compatriots.

News: Man Spends $20,000 and 18 Months Creating Clone of Dead Lover

Sad story: a 50-year-old businessman recently lost his lover, and grief stricken, created a sex doll replica of the deceased woman. The 18-month-long painstaking process required dozens of photos to recreate an "exact" plastic copy of her face and body shape. £15,000 ($23,169) later, the clone was finished, complete with articulated joints, a titanium skeleton and lifelike skin.

Bibi’S Twofer: Bulgaria Bombing Allows Him to Flay Hezbollah, Iran, Possibly Go to War

Anonymous U.S. officials are quoted by the NY Times stating explicitly that a Hezbollah suicide bomber attacked the Israeli tourist bus yesterday. While this is entirely possible, I think we should remember the bizarre bombing plot of a few months ago in which a small-time Iranian drug dealer was alleged by the Justice Department to have direct links to the Revolutionary Guards, and to have plotted the assassination of the Saudi ambassador. By the way, this is the same person, Bandar ibn Sult...

How To: Reveal Saved Browser Passwords with JavaScript Injections

JavaScript is the language of the internet. It is what allows us to create dynamic, interesting webpages that are fast, web-based applications and so much more. The primary use of JavaScript is to write functions that are embedded in or included from HTML pages and that interact with the Document Object Model (DOM) of the page. This is the magic that allows all of what we see to happen, and for our browser to be manipulated.

News: iPhone App = Confessional Aide = Absolution (Yeah, Right)

I'm not going to lie. I was Catholic. But one of my reasons for my faithful departure was having to tell my innermost secrets— my sins— to a silhouetted figure behind a latticed screen. With the creepy enclosed booth structure and separation of sinner and confessor, its anonymity was clear, yet deceiving. You always knew the priest and he always knew you. If I wanted total privacy, was there really a need for this intermediary to God?

How To: Install Windows 8 Beta on VirtualBox

Windows 8 Beta (Developer Preview) It wasn't that long ago Windows 7 was released - now Windows 8 Beta is here. I did do a Google search to see when the stable version will be out but wasn't able to find an official statement from Microsoft. However - I saw several articles on Google hinting that the final release might be in August or there about.

How To: Chain VPNs for Complete Anonymity

Big name individual hackers and hacker groups everywhere in the news are getting caught and thrown in jail. Everytime I see something like this happen, I won't lie, I get a little sad. Then I wonder, how are these guys getting caught? If a group like LulzSec, with all the fame and "1337-ness" can get caught, I think my hacker comrades are doing something wrong.

News: Life Simulates Video Games in FPS Russia – And Not in a Bad Way

It's one of the greatest fears among parents and politicians the world over—video game violence spilling out into reality. The shooting at Columbine and the more recent tragedy in Utøya, Norway have touched deep nerves in Western consciousness. And that's why there's a giant pink, juggling elephant in the corner of every production meeting and press conference for each shooter game that comes out.

Dumpster Drive: Exchange Your Digital Trash with Strangers

Do you ever wonder if the files you're trashing on your Mac are actually trash? Let's say there are 80 million computer owners running Mac OS. If each user trashes at least 10 files each day, that's 800 million deleted files that cease to exist every 24 hours. If that doesn't sound like a lot to you, a month would equal 24 billion junked files, a year—nearly 1 trillion.

News: Has Chain World's Journey from Game to Religious Icon Ended?

At GDC 2011 this past March, three of the world's best game designers participated in a contest called Game Design Challenge. Each presented their vision for a game that fit the prompt "Bigger than Jesus: games as religion" before an audience, with applause to determine the winner. Jenova Chen, John Romero, and Jason Rohrer all spoke, and Rohrer won in a landslide with his revolutionary game called Chain World.

How To: Things to Do on WonderHowTo (06/06 - 06/12)

WonderHowTo is a how-to website made up of niche communities called Worlds, with topics ranging from Minecraft to science experiments to Scrabble and everything in-between. Check in every Wednesday evening for a roundup of user-run activities and how-to projects from the most popular communities. Users can join and participate in any World they're interested in, as well as start their own community.

How To: Things to Do on WonderHowTo (05/23 - 05/29)

WonderHowTo is a how-to website made up of niche communities called Worlds, with topics ranging from Minecraft to science experiments to Scrabble and everything in-between. Check in every Wednesday evening for a roundup of user-run activities and how-to projects from the most popular communities. Users can join and participate in any World they're interested in, as well as start their own community.

How To: Things to Do on WonderHowTo (04/11 - 04/17)

WonderHowTo is a how-to website made up of niche communities called Worlds, with topics ranging from Minecraft to science experiments to Scrabble and everything in-between. Check in every Wednesday evening for a roundup of user-run activities and how-to projects from the most popular communities. Users can join and participate in any World they're interested in, as well as start their own community.

Tor vs. I2P: The Great Onion Debate

In my recent Darknet series, I attempted to connect the dots on the Deep Web. I covered the two largest anonymity networks on the Internet today, Tor and I2P. While my initial four articles were meant as an introduction, I ended up receiving a lot of interesting comments and messages asking the technical differences between the two. I'd like to thank all of you for letting me know what was on your minds, as you should always!

Hacking Reconnaissance: Finding Vulnerabilities in Your Target Using Nmap

Remember that scene in The Matrix when Trinity uses a realistic Nmap port scan, followed by an actual SSH exploit (long since patched) to break into a power company? Well, believe it or not, but that scene is not far fetched at all. If you want to exploit vulnerabilities and root boxes, you'll need to learn how to perform the necessary reconnaissance first. In fact, you will spend far more time researching your target then you will exploiting it. In this article, I am going to show you the fi...