Defcon 5
|
 |
« Reply #15 on: January 24, 2008, 05:01:14 am » |
|
Wonder if they are coming back?
|
|
|
|
Darksat
|
 |
« Reply #16 on: February 18, 2008, 07:53:36 pm » |
|
Dont think its likely, do you.
|
|
|
|
ailema
N00b

Posts: 3
|
wow this is great hahha being a hacker is really a cool skill but its very risky too
|
|
|
|
Defcon 5
|
Why is it risky? Its not exactly a area which is 'risky' what is risky is social engineering, because your their in person commiting fraud.
|
|
|
|
niaz333
N00b

Posts: 6
|
 |
« Reply #19 on: August 20, 2008, 06:50:12 pm » |
|
Hi How are you guys. First i thanks to you about your interesting and important trophic. Any one can not want her computer is hacked by others.Many software were loose by lacker. so, this is the large subject in the online users.
thanks for again.
|
|
|
|
sryk
|
 |
« Reply #20 on: November 05, 2008, 06:52:39 am » |
|
Hi, How are you dears. Initially thanks about your interesting trophic. The information is really great but very risky too. 
|
|
|
|
Rockstar
N00b

Posts: 2
|
 |
« Reply #21 on: November 14, 2008, 11:50:26 pm » |
|
hi guys, I an new here, am interested in new Security prosucts.. its a part of my profile... so check out K7 Total security.. @ www.k7computing.com .. lemme know of what u think. Rockstar
|
|
|
|
blaster
N00b

Posts: 2
|
 |
« Reply #22 on: November 23, 2011, 07:35:22 pm » |
|
People what do you think about this server with open SSH port dacs138.tsl.utwente.nl
As I know it is corporate research server for PHD students in University of Twente. But they are not good in computer field - and I found many weaknesses in that system . Check this out .
|
|
|
|
JamesC
N00b

Posts: 1
|
 |
« Reply #23 on: January 23, 2012, 12:03:59 pm » |
|
dose any 1 have another link to the vid im a noobon this forum and looking to expend my knowled of IT Security and any help or advise for preparing for SANS serts.
|
|
|
|
dragoon
N00b

Posts: 2
|
 |
« Reply #24 on: August 09, 2018, 09:49:34 am » |
|
Hacking 101: How to Break Into ComputersWithin the boundaries of good ethics, About.com will show you resources on how computer security does have holes, and how it is possible to exploit those holes. Now, let's hope you use this knowledge for good... How Bad Hacking Really Is: An Interview With An ExpertJacques Erasmus is a "white hat" hacker... a once-dishonorable craftsman who has now chosen to work for the protection of corporate networks. Here is a video of how Windows XP gets hacked, and Jacques explains the steps... Hacking Basics: What is Your IP Address?If you want to learn about hacking computers, then start here: identify how your computer has a digital fingerprint. This helpful website will scan your computer and identify your internet protocol address (IP address), your connection location on the planet, and the digital ports and software you are using. Neat. Security Basics for Home ComputingIf you subscribe to broadband cable or DSL, then you are at high risk for casual hackers. There are three simple steps you can take to reduce your hacker attacks by 90%! See this excellent tutorial by security professional, Tony Bradley Wireless Networking Security for the HomeIf you just installed "WiFi" for your house, then do spend 15 minutes checking out these six safeguarding tips, including changing your Identifier ID, enabling WEP encryption, and shutting down identifier broadcasting. Excellent information for the new wireless owner. "Help! I Think I've Been Hacked!"Your computer starts to run a little weird. You notice the drive light blinking when you aren’t doing anything and the system seems a little slow. At first you may shrug it off, then you notice some weird program in your Startup group. There is a good chance your system has been hacked. If so, then this article is for you... Source: http://netforbeginners.about.com/od/hacking101/
|
|
|
|
geemail
N00b

Posts: 2
|
 |
« Reply #25 on: February 23, 2019, 03:46:15 am » |
|
My phone does what it wants, I'm over sharing my life with the dodgy characters of the world, I've nothing to hide it just gets tiresome
|
|
|
|
|
|