Archive for KnowledgeBase
Posted by Siren on July 23, 2013
3. The Fog of Law If you are hacking for malicious, nefarious, evil reasons, you probably already know you are on the wrong side of the law so can turn out this section; for those out there who are white or grey hat hackers you do need to listen to what I am about to […]
Read more →
Posted by Siren on July 23, 2013
This is a starting guide to hacking. In general, there will be a series of articles to show you how to hack computers, networks etc. Disclaimer! As far as posters and drafters of this article are concerned, hacking is simply a technical skillset, so understanding how hacking works, how hacking attack happens, the ability to […]
Read more →
Posted by Siren on July 6, 2013
Rule 8: Privileges and Permissions You can’t break what you can’t touch The next way to protect your computer is to properly use privileges and permissions. That means every computer has an operating system with users having different permission levels built into them. So the main user at any computer is considered to be Administrator, […]
Read more →
Posted by Siren on July 6, 2013
Rule 4: AntiVirus Software – Beware the Wolf in AntiVirus Clothing Yes, of course, updates are nice, but we also need to kill the viruses, to stab’em in the heart and kill’em dead; that is really cool, and that is where antivirus software comes in. Antivirus software is computer software that resides on your computer […]
Read more →
Posted by Siren on July 6, 2013
The hackers are coming, can you smell their foul breath? No longer are they satisfied with tackles on the super highways, No longer will the bandit stay to the road, no, They come for us You can hear them outside They want in They want us dead To suck us dry, leave lifeless, Profiles filled […]
Read more →
Posted by Siren on June 20, 2013
Kevin Nassery: So, how did this stuff end up? Really, it just got sold. BCL got acquired by Access US. Most of the system staff eventually left and they migrated off those systems. I do recall once sitting at a table and Dop logging into an Access US with root and fixing something for his […]
Read more →
Posted by Siren on June 20, 2013
Mike “Dop” Dopheide: Okay, so we get root access, we’re playing around and everything’s great and no one really cares. But we got lazy; they upgrade system – and we lost all of our access. And I can’t remember why we decided we needed to get it back, but I remember we were in one […]
Read more →
Posted by Siren on June 20, 2013
Kevin Nassery: The NeXT stuff was really cool for me to see because it was probably the first UNIX system I had shell on, and this was the first time we were exposed to UNIX. And it was kind of eccentric and cool. Here I put up just a picture side by side of the […]
Read more →
Posted by Siren on June 20, 2013
Hi! I’m Kevin Nassery; this is Mike “Dop” Dopheide. We’ve been friends for about 15 years, we actually work together now; and we are going to kind of talk about how Dop and I got to know each other a little bit. We grew up in the same town – Quincy, Illinois. We have a […]
Read more →
Posted by Siren on May 22, 2013
Hi! Today we’re going to talk to you about malicious software, also known as malware, and how you can protect your computer from infection. First let’s talk about how you get malware. Malware is often installed on your computer without your knowledge when you visit certain websites. Sometimes these are good sites that have been […]
Read more →
Page 35 of 35 «...1020303132333435