Recent Changes

Saturday, December 19

  1. page Oprah Winfrey edited ... entrepreneur, business mongrel, mogul, and a {http://www.poptower.com/images/db/1091/420/…
    ...
    entrepreneur, business mongrel,mogul, and a
    {http://www.poptower.com/images/db/1091/420/300/oprah-winfrey-show.jpg} Image of Oprah Winfrey
    Key References:
    (view changes)
    9:29 am

Tuesday, December 8

  1. page glossaryDDOS edited {http://www.our-picks.com/wp-content/uploads/2007/02/blue_screen_of_death.gif} Blue screen of de…

    {http://www.our-picks.com/wp-content/uploads/2007/02/blue_screen_of_death.gif} Blue screen of deathDistributed Denial-of-Service Attack
    A DDoS (distributed denial-of-service) attack is one of the simplest attacks to perform from a hacker standpoint. The idea is to flood some service or website with excess amounts of data to the point that the servers fail in trying to handle the load. To attempt to perform such an attack is illegal and breaks most policies set forth by Internet Service Providers.
    A DoS attack can take many forms:
    ICMP flood - Flooding a network with large amounts of packets to destroy the network's bandwidth, thus resulting in lost legitimate packets.
    Application level floods - Exploits found within applications that let the attacker use up all of the victim's CPU time or memory.
    Nuke - Old form of attack that is still used today; "spam". This is sending corrupt data to a user's machine in order to cause it to crash and display a blue screen. Today, it can be seen in online gaming in the form of message-spamming other users to slow down or crash their systems (or otherwise just annoy them).
    And many more...
    For a distributed denial-of-service attack, the hacker will usually use a botnet to help him perform his task. A botnet is a collection of computers that have been infected with a worm or virus and can be used by the hacker to send the corrupted packets to his victim; these botnets usually range in the hundreds to thousands of computers, depending on the size and importance of user being attacked.
    Key Source
    DoS wiki: http://en.wikipedia.org/wiki/Denial-of-service_attack

    (view changes)
    10:18 pm
  2. page hackerGlossaryWallhack edited ... {Counter-Strike_Box.jpg} Counter-Strike: One of the first games to popularize the wallhackIn o…
    ...
    {Counter-Strike_Box.jpg} Counter-Strike: One of the first games to popularize the wallhackIn online first-person shooters, a wallhack is a hack that changes the way a players video card renders the game world, making it possible to "see through walls" and shoot at opponents who should not be visible due to intervening geometry (i.e. buildings). Wallhacks constitute one of the most popular hacks in online games (the other being the aimbot).
    Wallhacks first appeared in the game Quake, but were made most popular with their development for Valve's Half Life, and it's widely played modification Counter Strike.
    The first wallhacks simply told the players video card to render everything semi-transparently, which made it difficult for players to navigate the level. A tell-tale sign of a hacker was a tendency to walk repeatedly into walls.
    Later wallhacks fixed this problem by rendering all player models in front of the screen, but rendering the level normally.
    Key Resource:
    Wikipedia Page

    (view changes)
  3. page hackerGlossary edited ... Daisy Chaining Darknet DDOS Freenet Hacktivism
    ...
    Daisy Chaining
    Darknet
    DDOS
    Freenet
    Hacktivism
    (view changes)
    10:08 pm
  4. page Hacking- It's All About Beginning edited Hacking- It's All About Beginning ... familiar to most most members of Key Resource: He…

    Hacking- It's All About Beginning
    ...
    familiar to most
    most
    members of
    Key Resource:
    Here's the main page of the guide:
    (view changes)
  5. page Status Updates edited ... Raj: Deep. And to answer: "if you'd like, sir." (Patrick) Added a page to film and …
    ...
    Raj: Deep. And to answer: "if you'd like, sir." (Patrick)
    Added a page to film and video -- The Screen Savers -- an awesome and geeky TV show that deeply shaped me during my formative years. (Patrick)
    Added page for book, did a bit of clean up. It's midnight, and I'm gone. (Patrick)
    (view changes)
  6. page hackerMediaBookPiratesDilemma edited ... Book on Amazon Blog of Matt Mason A helpful review
    ...
    Book on Amazon
    Blog of Matt Mason
    A helpful review
    (view changes)
  7. page hackerMediaBookPiratesDilemma edited ... The Pirate's Dilemma Dilemma, by Matt Mason The Pirate's Dilemma: How Youth Culture is Re…
    ...
    The Pirate's DilemmaDilemma, by Matt Mason
    The Pirate's Dilemma: How Youth Culture is Re-Inventing Capitalism
    The Pirate's Dilemma: How Youth Culture is Re-Inventing Capitalism is a book by Matt Mason, published in 2008, that deals with the effects of technology on the creation and distribution of content. Mason is one of the first authors (along with Paulo Coelho and Cory Doctorow) to release complete and free electronic copies of his books online, as a means to share ideas and drive the sales of traditional paper copies.
    (view changes)

More