Copyrighted Material
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Paradise Lost , Book III, Line 18
_Paradise Lost_, book III, line 18 %%%%%%%%%%%%%%%%%%%%%%%% ++++++++++Hacker's Encyclopedia++++++++ ===========by Logik Bomb (FOA)======== <http://www.xmission.com/~ryder/hack.html> ---------------(1997- Revised Second Edition)-------- ##################V2.5################## %%%%%%%%%%%%%%%%%%%%%%%% "[W]atch where you go once you have entered here, and to whom you turn! Do not be misled by that wide and easy passage!" And my Guide [said] to him: "That is not your concern; it is his fate to enter every door. This has been willed where what is willed must be, and is not yours to question. Say no more." -Dante Alighieri _The Inferno_, 1321 Translated by John Ciardi Acknowledgments ---------------------------- Dedicated to all those who disseminate information, forbidden or otherwise. Also, I should note that a few of these entries are taken from "A Complete List of Hacker Slang and Other Things," Version 1C, by Casual, Bloodwing and Crusader; this doc started out as an unofficial update. However, I've updated, altered, expanded, re-written and otherwise torn apart the original document, so I'd be surprised if you could find any vestiges of the original file left. I think the list is very informative; it came out in 1990, though, which makes it somewhat outdated. I also got a lot of information from the works listed in my bibliography, (it's at the end, after all the quotes) as well as many miscellaneous back issues of such e-zines as _Cheap Truth _, _40Hex_, the _LOD/H Technical Journals_ and _Phrack Magazine_; and print magazines such as _Internet Underground_, _Macworld_, _Mondo 2000_, _Newsweek_, _2600: The Hacker Quarterly_, _U.S. News & World Report_, _Time_, and _Wired_; in addition to various people I've consulted. -
Damn Vulnerable Linux CCERT-PUBDOC-2007-04-190
Damn Vulnerable Linux CCERT-PUBDOC-2007-04-190 Sigurnosni problemi u računalnim programima i operativnim sustavima područje je na kojem CARNet CERT kontinuirano radi. Rezultat toga rada ovaj je dokument, koji je nastao suradnjom CARNet CERT-a i LS&S-a, a za koji se nadamo se da će Vam koristiti u poboljšanju sigurnosti Vašeg sustava. CARNet CERT, www.cert.hr - nacionalno središte za sigurnost računalnih mreža i sustava. LS&S, www.lss.hr - laboratorij za sustave i signale pri Zavodu za elektroničke sustave i obradbu informacija Fakulteta elektrotehnike i računarstva Sveučilišta u Zagrebu. Ovaj dokument predstavlja vlasništvo CARNet-a (CARNet CERT-a). Namijenjen je za javnu objavu, njime se može svatko koristiti, na njega se pozivati, ali samo u originalnom obliku, bez ikakvih izmjena, uz obavezno navođenje izvora podataka. Korištenje ovog dokumenta protivno gornjim navodima, povreda je autorskih prava CARNet-a, sukladno Zakonu o autorskim pravima. Počinitelj takve aktivnosti podliježe kaznenoj odgovornosti koja je regulirana Kaznenim zakonom RH. Revizija v1.0 CCERT-PUBDOC-2007-04-190 Stranica 2 / 15 Sadržaj 1 UVOD .............................................................................................................................................. 4 2 OPĆENITO O DAMN VULNERABLE LINUX SUSTAVU .................................................................................. 5 2.1 SVRHA SUSTAVA..................................................................................................................................... 5 2.2 -
Debian \ Amber \ Arco-Debian \ Arc-Live \ Aslinux \ Beatrix
Debian \ Amber \ Arco-Debian \ Arc-Live \ ASLinux \ BeatriX \ BlackRhino \ BlankON \ Bluewall \ BOSS \ Canaima \ Clonezilla Live \ Conducit \ Corel \ Xandros \ DeadCD \ Olive \ DeMuDi \ \ 64Studio (64 Studio) \ DoudouLinux \ DRBL \ Elive \ Epidemic \ Estrella Roja \ Euronode \ GALPon MiniNo \ Gibraltar \ GNUGuitarINUX \ gnuLiNex \ \ Lihuen \ grml \ Guadalinex \ Impi \ Inquisitor \ Linux Mint Debian \ LliureX \ K-DEMar \ kademar \ Knoppix \ \ B2D \ \ Bioknoppix \ \ Damn Small Linux \ \ \ Hikarunix \ \ \ DSL-N \ \ \ Damn Vulnerable Linux \ \ Danix \ \ Feather \ \ INSERT \ \ Joatha \ \ Kaella \ \ Kanotix \ \ \ Auditor Security Linux \ \ \ Backtrack \ \ \ Parsix \ \ Kurumin \ \ \ Dizinha \ \ \ \ NeoDizinha \ \ \ \ Patinho Faminto \ \ \ Kalango \ \ \ Poseidon \ \ MAX \ \ Medialinux \ \ Mediainlinux \ \ ArtistX \ \ Morphix \ \ \ Aquamorph \ \ \ Dreamlinux \ \ \ Hiwix \ \ \ Hiweed \ \ \ \ Deepin \ \ \ ZoneCD \ \ Musix \ \ ParallelKnoppix \ \ Quantian \ \ Shabdix \ \ Symphony OS \ \ Whoppix \ \ WHAX \ LEAF \ Libranet \ Librassoc \ Lindows \ Linspire \ \ Freespire \ Liquid Lemur \ Matriux \ MEPIS \ SimplyMEPIS \ \ antiX \ \ \ Swift \ Metamorphose \ miniwoody \ Bonzai \ MoLinux \ \ Tirwal \ NepaLinux \ Nova \ Omoikane (Arma) \ OpenMediaVault \ OS2005 \ Maemo \ Meego Harmattan \ PelicanHPC \ Progeny \ Progress \ Proxmox \ PureOS \ Red Ribbon \ Resulinux \ Rxart \ SalineOS \ Semplice \ sidux \ aptosid \ \ siduction \ Skolelinux \ Snowlinux \ srvRX live \ Storm \ Tails \ ThinClientOS \ Trisquel \ Tuquito \ Ubuntu \ \ A/V \ \ AV \ \ Airinux \ \ Arabian -
Steve Wozniak
Steve Wozniak. http://www.woz.org http://en.wikipedia.org/wiki/Steve_Wozniak http://en.wikipedia.org/wiki/Blue_box http://en.wikipedia.org/wiki/Apple_computer Steve Wozniak’s patent: Microcomputer for use with video display. Apple 1 manual. Apple 1 manual (PDF). http://apple2history.org/ http://www.digibarn.com/ http://www.macmothership.com/ http://www.multimedialab.be http://www.mast-r.org Wozniak’s early inspirations came from his father Jerry who was a Loc- kheed engineer, and from a fictional wonder-boy: Tom Swift. His father infected him with fascination for electronics and would often check over young Woz’s creations. Tom Swift, on the other hand, was for Woz an epitome of creative freedom, scientific knowledge, and the ability to find solutions to problems. Tom Swift would also attractively illustrate the big awards that await the inventor. To this day, Wozniak returns to Tom Swift books and reads them to his own kids as a form of inspiration. John Draper explained to Wozniak the Blue Box, a device with which one could (mis)use the telephone system by emulating pulses (i.e. phone phreaking). Although Draper instructed Woz not to produce and especially not sell the gadgets on account of the possibility of being discovered, Wo- zniak built and sold Blue Boxes for $150 a piece. Wozniak met Steve Jobs while working a summer job at HP, and they began selling blue boxes to- gether. Many of the purchasers of their blue boxes were in fact discovered and sure enough John Draper was linked to their use. 1975. By 1975, Woz dropped out of the University of California, Berkeley (he would later finish his degree in 1987) and came up with a computer that eventually became successful nationwide. -
Smashing the Stack in 2011 | My
my 20% hacking, breaking things, malware, free time, etc. Home About Me Undergraduate Thesis (TRECC) Type text to search here... Home > Uncategorized > Smashing the Stack in 2011 Smashing the Stack in 2011 January 25, 2011 Recently, as part of Professor Brumley‘s Vulnerability, Defense Systems, and Malware Analysis class at Carnegie Mellon, I took another look at Aleph One (Elias Levy)’s Smashing the Stack for Fun and Profit article which had originally appeared in Phrack and on Bugtraq in November of 1996. Newcomers to exploit development are often still referred (and rightly so) to Aleph’s paper. Smashing the Stack was the first lucid tutorial on the topic of exploiting stack based buffer overflow vulnerabilities. Perhaps even more important was Smashing the Stack‘s ability to force the reader to think like an attacker. While the specifics mentioned in the paper apply only to stack based buffer overflows, the thought process that Aleph suggested to the reader is one that will yield success in any type of exploit development. (Un)fortunately for today’s would be exploit developer, much has changed since 1996, and unless Aleph’s tutorial is carried out with additional instructions or on a particularly old machine, some of the exercises presented in Smashing the Stack will no longer work. There are a number of reasons for this, some incidental, some intentional. I attempt to enumerate the intentional hurdles here and provide instruction for overcoming some of the challenges that fifteen years of exploit defense research has presented to the attacker. An effort is made to maintain the tutorial feel of Aleph’s article. -
Joseph Migga Kizza Fourth Edition
Computer Communications and Networks Joseph Migga Kizza Guide to Computer Network Security Fourth Edition Computer Communications and Networks Series editor A.J. Sammes Centre for Forensic Computing Cranfield University, Shrivenham Campus Swindon, UK The Computer Communications and Networks series is a range of textbooks, monographs and handbooks. It sets out to provide students, researchers, and nonspecialists alike with a sure grounding in current knowledge, together with comprehensible access to the latest developments in computer communications and networking. Emphasis is placed on clear and explanatory styles that support a tutorial approach, so that even the most complex of topics is presented in a lucid and intelligible manner. More information about this series at http://www.springer.com/series/4198 Joseph Migga Kizza Guide to Computer Network Security Fourth Edition Joseph Migga Kizza University of Tennessee Chattanooga, TN, USA ISSN 1617-7975 ISSN 2197-8433 (electronic) Computer Communications and Networks ISBN 978-3-319-55605-5 ISBN 978-3-319-55606-2 (eBook) DOI 10.1007/978-3-319-55606-2 Library of Congress Control Number: 2017939601 # Springer-Verlag London 2009, 2013, 2015 # Springer International Publishing AG 2017 This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. The use of general descriptive names, registered names, trademarks, service marks, etc. -
GNU/Linux Distro Timeline LEAF Version 10.9 Skolelinux Lindows Linspire Authors: A
1992 1993 1994 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 Libranet Omoikane (Arma) Gibraltar GNU/Linux distro timeline LEAF Version 10.9 Skolelinux Lindows Linspire Authors: A. Lundqvist, D. Rodic - futurist.se/gldt Freespire Published under the GNU Free Documentation License MEPIS SimplyMEPIS Impi Guadalinex Clonezilla Live Edubuntu Xubuntu gNewSense Geubuntu OpenGEU Fluxbuntu Eeebuntu Aurora OS Zebuntu ZevenOS Maryan Qimo wattOS Element Jolicloud Ubuntu Netrunner Ylmf Lubuntu eBox Zentyal Ubuntu eee Easy Peasy CrunchBang gOS Kiwi Ubuntulite U-lite Linux Mint nUbuntu Kubuntu Ulteo MoLinux BlankOn Elive OS2005 Maemo Epidemic sidux PelicanHPC Inquisitor Canaima Debian Metamorphose Estrella Roja BOSS PureOS NepaLinux Tuquito Trisquel Resulinux BeatriX grml DeadCD Olive Bluewall ASLinux gnuLiNex DeMuDi Progeny Quantian DSL-N Damn Small Linux Hikarunix Damn Vulnerable Linux Danix Parsix Kanotix Auditor Security Linux Backtrack Bioknoppix Whoppix WHAX Symphony OS Knoppix Musix ParallelKnoppix Kaella Shabdix Feather KnoppMyth Aquamorph Dreamlinux Morphix ZoneCD Hiwix Hiweed Deepin Kalango Kurumin Poseidon Dizinha NeoDizinha Patinho Faminto Finnix Storm Corel Xandros Moblin MeeGo Bogus Trans-Ameritech Android Mini Monkey Tinfoil Hat Tiny Core Yggdrasil Linux Universe Midori Quirky TAMU DILINUX DOSLINUX Mamona Craftworks BluePoint Yoper MCC Interim Pardus Xdenu EnGarde Puppy Macpup SmoothWall GPL SmoothWall Express IPCop IPFire Beehive Paldo Source Mage Sorcerer Lunar eIT easyLinux GoboLinux GeeXboX Dragora -
Jims Virtual World
December 21, 2010, VOLUME 1, ISSUE 20 JIMS VIRTUAL WORLD A NEWSLETTER BY THE DEPARTMENT OF INFORMATION TECHNOLOGY VoIP: The Modern day Phone Phreaking Phone Phreaking was a rage during the 1950s - John Draper better known as Captain Crunch used to hack into tele- phone lines to make long distance calls. In today’s world, we use VoIP supported applications but during the early days of phone hacking, there was the Blue Box. The most famous ex phone phreaks were Steve Jobs and Steve Wozniak during their college days. In an old interview, Steve Wozniak stated that once they both had nearly been arrested for using it but they got away when they explained to the police officer that, “It is a music calibration tool.” Phone Phreaking was the first form of hacking; automated machines replaced manual phone exchanges and these automated machines used certain pitches of sound to connect the calls. By the use of the Blue Box, these audio signals were bypassed just as VoIP today uses digital signals to bypass the audio signals. The Blue Box was a legal and monetary complication for the telecom industry with AT&T taking stern action against all the Phone Phreakers. Captain Crunch and many other pioneers and users of this technology were arrested and prosecuted for stealing from the telephone company. Not too different from today’s scenario, the Indian Government’s stand on VoIP is still being debated upon, the intelligence bureau thinks VoIP is too undisciplined for any regulation or surveillance, and hence a threat to national security. -
History of Hacking Part 1: Phone Phreaking Bruce Nikkel
History of Hacking Part 1: Phone Phreaking Bruce Nikkel Published in HISTEC Journal, a publication by the Swiss computer museum Enter (https://enter.ch). This is part one of a four part series on the history of computer hacking. The words "hacker" and "hacking" in the context of technology was first used in the Tech Model Railway club at the Massachusetts Institute of Technology (MIT) in the 1950s. A “hack” by students referred to a clever technical or engineering achievement (sometimes in the form of pranks) for the purpose of fun and learning. Early hackers and hacking were not associated with criminal activity. To begin this series we start with hacking activity on the earliest public global network, the original telephone system. In this article we explore early hackers known as "phone phreaks" or “phreakers” and the technical methods they used. Before home computers or the Internet became popular, a hacking technique called "phone phreaking" was used to exploit weaknesses in the global telephone system. The word "phreak" is an English misspelling of "freak" using the "ph" from the word phone (the switching of "f" with "ph" for hacking is also used today with the word phishing). Phone phreaks learned how telephone networks functioned and manipulated central switching infrastructure by generating tones and pulses. Unlike the hacks from MIT students, phone phreaking was considered criminal activity in many countries where wire fraud laws prevented unauthorized misuse of network systems and bypassing telephone billing to make free calls. When phone companies started to transition from human switchboard operators to automated dialing and switching systems they needed a way to pass signals from the customer's phone to the telephone switching infrastructure. -
The Journal of AUUG Inc. Volume 24 ¯ Number 3 September 2003
The Journal of AUUG Inc. Volume 24 ¯ Number 3 September 2003 Features: Going 3D with Blender: A toy train 7 The Linux System Administrator’s Security Guide 12 2003 and Beyond (part 2) 18 AUUGN Book Review: Google Hacks 29 Linux and Open Source in Government: CfP 30 AUUGN Book Review: Essential CVS 31 UNIX and Bioinformatics 32 Tuning and Optimizing Red Hat Advanced Server for Oracle9i Database 35 AUUGN Book Review: Drive-by Wi-Fi 49 Play Encoded DVDs in Xine 5O Interview: Australian Sun HPC Team 52 AUUGN 2003: The Photos 58 News: Public Notices 5 AUUG: Corporate Members 31 AUUG: Chapter Meetings and Contact Details 63 Regulars: President’s Column 3 My Home Network 5 ISSN 1035-7521 Print post approved by Australia Post - PP2391500002 AUUG Membership and General Correspondence The AUUG Secretary Editorial AUUG Inc PO Box 7071 Con Zymaris auugn(~.auu.q.or.q.au Baulkham Hills BC NSW 2153 Telephone: 02 8824 9511 A few words on the power of words. I am a great or 1800 625 655 (Toll-Free) advocate of the need for technical people, AUUG Facsimile: 02 8824 9522 people, to get out and speak their mind, to make their Email: [email protected] opinions, ideas and ideals heard by the great AUUG Management Committee mainstream; by those whose utilisation patterns of Email: a u u,[email protected] u technology we have foreseen and whose lives we are helping to shape the digital future of. President Greg Lehey PO Box 460 Words have the power to anger, the power to inspire. -
Founding a Hackerspace
Founding a Hackerspace An Interactive Qualifying Project Report Submitted to: Project Advisor: Francis Hoy Faculty of Worcester Polytechnic Institute in partial fulfillment for the requirement for the Degree of Bachelor of Science Submitted by Joseph Schlesinger Md Monirul Islam Kelly MacNeill Date: Professor Frank Hoy Project Advisor Abstract This report is the written component of our project that explores the hackerspace phenomenon. The report discusses the background and history of hackerspaces along with the social context of the modern hackerspace. Interviews of various hackerspaces were conducted and analyzed in order to gain insight into their operation and management. The research conducted was used to establish a hackerspace as a for-profit business. We describe the process of launching this entity, MakeIt Labs LLC in Lowell, MA. Also included is the business plan created for MakeIt Labs. Acknowledgements We would like to show our gratitude to the many individuals and organizations that helped us with our project by supplying us with data about the hackerspace community. These individuals allowed us know first-hand what it was like to be part of the maker community. Specifically, we would like to thank the founders and members of the following hackerspaces for giving their valuable time and valuable information: Hacker Dojo, NYC Resistor, Sprout & Co, BUILDS, and Noisebridge. Our appreciation goes to all the people who have put information about hackerspaces online. Finally, we would like to thank our project advisor, Frank Hoy, for his assistance and guidance throughout the project experience. Authorship page This project report was produced by Md Monirul Islam, Kelly MacNeill and Joseph Schlesinger. -
Cybersecurity and Forensic Challenges - a Bibliographic Review
https://doi.org/10.2352/ISSN.2470-1173.2018.06.MOBMU-100 © 2018, Society for Imaging Science and Technology Cybersecurity and Forensic Challenges - A Bibliographic Review Reiner Creutzburg Technische Hochschule Brandenburg, Department of Informatics and Media, IT- and Media Forensics Lab,, P.O.Box 2132, D-14737 Brandenburg, Germany Email: [email protected] Abstract professional obligations on their learning processes. One can in- The aim of this paper is to give a bibliographic review of creasingly observe that colleges and universities more and more the growing number of different Cybersecurity and Forensic Chal- have to adjust to this present generation of students and respond lenges for educational and vocational training purposes. by increasing the flexibility of the courses. For this reason, on- Special attention is given to the hacking lab, which enables effec- line degree programs, or suitable combinations of classroom and tive training in cybersecurity and computer forensics in the uni- online studies (blended learning) are increasingly offered. It is versity environment and in vocational education and training. well-known that man learns about 80% of its knowledge and skills by informal learning compared to learning from formal learning. Introduction Unfortunately, often this fact is not taken into account by plan- Nowadays, small- and medium-sized enterprises (SME) ners and decision-makers from school, university and companies. have to deal more and more with the issue of IT security. Due A well-known example is the now already for 10 years success- to the ever-growing popularity of mobile devices, but also by the fully operating ”Virtuelle Fachhochschule (Virtual University)”, general acceptance of IT technology in everyday life, new secu- an association of 10 established Universities of Applied Sciences rity threats to corporate data occur every day [1-13].