No doubt you've seen some of the hack logs being released. One part that stands out over and over again is the heavy database usage. It used to be early on that virus and hackers would destroy data, usually just for lulz. However, with the explosive commercial growth of the Internet, the real target is turning into data theft. You should learn how this happens so you can protect yourself accordingly. Let's take a look at what makes this possible and dare I say, easy.
You wouldn't think that something so simple as a "suggested users" list would create so much controversy, but Google+ seemed to have accidentally ignited a firestorm when they introduced a new feature over the weekend: the "Suggested People to Follow" list now appears when a new user joins Google+.
Big brother is watching when you're playing around on another system—and big brother is that system. Everything from operating systems to intrusion detection systems to database services are maintaining logs. Sometimes, these are error logs that can show attackers trying various SQL injection vectors over and over. This is especially so if they are using an automated framework like sqlmap that can spam a ton of requests in a short time. More often than not, the access logs are what most amate...
Industrial espionage, social engineering and no-tech hacking are all very real and there are simple precautions that you can take to protect yourself, which this article will discuss. Whether you are a high-profile businessman or a housewife (or husband), keeping information you want to keep private, private, should be important to you.
Remember that scene in The Matrix when Trinity uses a realistic Nmap port scan, followed by an actual SSH exploit (long since patched) to break into a power company? Well, believe it or not, but that scene is not far fetched at all. If you want to exploit vulnerabilities and root boxes, you'll need to learn how to perform the necessary reconnaissance first. In fact, you will spend far more time researching your target then you will exploiting it. In this article, I am going to show you the fi...
I have had a lot of people ask me, "How does my neighbor keep getting into my wireless?!". Chances are, these people are all using WEP, a deprecated wireless encryption protocol. Either that, or you are using one weak WPA passphrase.
Since the invention of the mechanical clock, enclosure of the commons, and proletarianization of labor, the alarm clock has been the bane of our existence. While not actually evil, it does represent the constant and uncompromising glare of our owners shaking a patronizing finger at us, telling us to get to work so they can use our labor to grant themselves bonuses.
Before jumping right into becoming the next James Neely or Moose Peterson, you're going to have get situated with your new digital SLR. No matter if you purchased the Canon EOS 5D Mark II body and lens separately or together, you've got everything you need to get started except the CompactFlash (CF) card. If you plan on shooting in RAW or capturing HD video, I suggest getting an 8GB or larger CF card. If you can afford it, maybe even opt for a high-speed UDMA card.
Photoshop. It’s like a mountain to climb. You can chug up to the top, working hard, never letting up, or you can just go part way up and scoot around the side of the mountain and still get to the other side. Not everyone needs to be a Photoshop guru, or ninja pixel punisher. There are a few things to know and be comfortable with in order to do lots of cool things. Here are some tips that will take you a little way up the mountain, somewhat in order of altitude.
So, you scratched up your $500 Adobe CD and now it's unreadable. You could go buy a new one, but you already purchased it! Searching The Pirate Bay and downloading some Adobe software can usually be easy enough, but what should you watch out for?