Search
Items tagged with: Hacker
https://vid.puffyan.us/watch?v=ENISCG2a15g #cyberpunk #hacking #hacker #Hackerculture
Clock DVA - The Hacker (HQ)
Intro is 30 seconds. Photosensitivity warning! Originally from the 1993 "Kinetic Engineering" VHS tape.neckro23 | Invidious
Hackers find #killswitch in train 🚉
Source: https://social.hackerspace.pl/@q3k/111528162462505087
We found that the #PLC code actually contained logic that would lock up the train with bogus error codes after some date, or if the train wasn't running for a given time. One version of the controller actually contained #GPS coordinates to contain the behaviour to third party workshops.
#crime #software #economy #Poland #hack #hacker #news #DragonSector
You don't have to be a professional 🧑💻 #hacker to code for freedom!
Our coding competition, Youth Hacking For Freedom, is open to all European youth, regardless of their coding skills.
💡 Maybe this challenge could be the right opportunity to get into #FreeSoftware development!
Check it out, the #YH4F launch event is tomorrow! 🚀
Youth Hacking 4 Freedom - FSFE
If you like coding, tinkering, having fun with software and if you are up for a challenge, we have something exciting for you: "Youth Hacking 4 Freedom" (Y...FSFE - Free Software Foundation Europe
https://www.amazon.com/Space-Rogue-Hackers-Known-Changed/dp/B0BRNVLDRX/
Vodafone alerta de un ataque 'pirata': estos son los clientes afectados y los datos bancarios revelados | El Correo https://www.elcorreo.com/economia/tu-economia/vodafone-alerta-ataque-pirata-clientes-afectados-datos-bancarios-revelados-20231126111525-nt.html
#cybersecurity #ciberseguridad #vodafone #hacker #hacking #security #telecom
GitHub - mytechnotalent/Embedded-Hacking: A FREE comprehensive step-by-step embedded hacking tutorial covering Embedded Software Development to Reverse Engineering.
A FREE comprehensive step-by-step embedded hacking tutorial covering Embedded Software Development to Reverse Engineering. - GitHub - mytechnotalent/Embedded-Hacking: A FREE comprehensive step-by-s...GitHub
have no issue neither 2 actually become #cybercriminals in the name
of fucking $ is why that even do I work in #infosec for 24
years now still like when people call me a #hacker rather than
a #infosec because 4 me that is just a job not a way of thinking or a culture
#HackingIsNotACrime https://www.theregister.com/2023/11/20/former_infosec_coo_pleads_guilty/
Former infosec COO pleads guilty to attacking hospitals to drum up business
Admits to taking phones used for 'code blue' emergencies offline and moreConnor Jones (The Register)
The Fort Scott Tribune 18 July, 1984 - "Mother says she had no idea what her #hacker son was doing"
"We weren't really sure what he was doing, typing away at that computer all the time. I guess now we know"
Joe Moorman, 13, said he wasn't particularly impressed by what he found during electronic forays into the National Aeronautics and Space Administration's computers.
"We didn't find anything top secret or anything we thought was top secret, just stuff about space and satellites"
#history
FXBG Hackers - Fredericksburg, VA
1st Wednesday of Every Month!
(Note: not everyone RSVPs or clicks "Participate" in Mobilizon, so if it says no one is participating, it's lying. We have a couple hundred members with 20 to 30 folks that come out each month.)
White Hat, Black Hat, Gray Hat - N00b, 1337, Obso1337 Hacktivist, Corporate, Fed, Govt, Mil, Hobbyist - All are welcome.
AGENDA
- 7:00 - Soft start / Socializing
- 7:15 - Meeting begins
- Intro
- Guidelines
- Community News
- 7:30 - Firetalks
- 10-minute presentation
- 5-minute discussion
- Slides, media, and demos are encouraged but not required.
- We'll have a large display and a display laptop running Ubuntu available if need be; otherwise, bring your laptop or speak without slides.
- Note: No vendor pitches, no recruiter pitches.
- 8:45 - Who's Hiring / Who's Looking for Work
- Those that are hiring can give a quick announcement.
- Those who are looking for work can give a quick pitch.
- 9:00 - Formal End of Meetup
- 9:00+ - Socializing, Eating, Hanging Out, Hacking
- The brewery closes at 9:00, but the night owls typically migrate to another venue after the meetup.
Note on FireTalks: If it's your first time here - chill, relax, enjoy and hang out. Otherwise, hop up and give a fire talk. Fire talks are short talks around a topic generally related to hacking. Talks last roughly 10 minutes or less, with 5 minutes of discussion afterward. Be as formal or informal as you like. Slides, demos, and media are encouraged but not required. If you're unsure what to talk about or have worries about presenting, ask one of the organizers for help. We're here for you. We apply a very broad definition of hacking - taking something and utilizing it beyond its intended means.
Note: We do not advocate illegal activities. If you're discussing bypassing computer security, you have permission to do so or are utilizing your equipment in a lab environment.
CODE OF CONDUCT & RULES
- Don't hack the venue!
- Don't hack other attendees without consent.
- Don't talk about anything illegal.
- Don't harass other attendees.
- Follow venue rules.
- Treat venue staff well.
- Do participate. Do Have Fun.
- Don't hack the venue!
All are welcome regardless of race, age, experience, gender identity, sexual orientation, ethnicity, disability, national origin, religion, or creed.
The Paradox of Tolerance Addressed: We do NOT tolerate intolerance. You will be banned if you advocate ostracizing, oppressing, or hurting others.
GitHub - mytechnotalent/Reverse-Engineering: A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures. - GitHub - mytechnotalent/Reverse-Engineering: A FREE comprehensive reverse engineeri...GitHub
La abogacía es una profesión ingrata, donde muchas veces se pierde y algunas veces se gana.
Pero hay veces que un caso te devuelve la fe en lo que haces. Esta es una de ellas.
Han sido siete años de proceso, un calvario para dos personas inocentes. Les acusaban de hackear los datos de 5500 Mossos d'Esquadra. Y contra todos ellos, contra el Ministerio Fiscal y contra todo pronóstico, hemos ganado.
GitHub - mytechnotalent/Embedded-Hacking: A FREE comprehensive step-by-step embedded hacking tutorial covering Embedded Software Development to Reverse Engineering.
A FREE comprehensive step-by-step embedded hacking tutorial covering Embedded Software Development to Reverse Engineering. - GitHub - mytechnotalent/Embedded-Hacking: A FREE comprehensive step-by-s...GitHub
GitHub - mytechnotalent/Reverse-Engineering: A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures. - GitHub - mytechnotalent/Reverse-Engineering: A FREE comprehensive reverse engineeri...GitHub
GitHub - mytechnotalent/Hacking-Rust: A FREE comprehensive online Rust hacking tutorial utilizing the x64, ARM64 and ARM32 architectures going step-by-step into the world of reverse engineering Rust from scratch.
A FREE comprehensive online Rust hacking tutorial utilizing the x64, ARM64 and ARM32 architectures going step-by-step into the world of reverse engineering Rust from scratch. - GitHub - mytechnota...GitHub
a mi me gustan mucho estas definiciones:
- Persona que practica la programación informática, con una especie de pasión artística.
- Persona que manipula o que posee conocimientos prácticos que modifican los usos de las cosas de modo que estas puedan emplearse para fines no previstos en su origen.
GitHub - mytechnotalent/Embedded-Hacking: A FREE comprehensive step-by-step embedded hacking tutorial covering Embedded Software Development to Reverse Engineering.
A FREE comprehensive step-by-step embedded hacking tutorial covering Embedded Software Development to Reverse Engineering. - GitHub - mytechnotalent/Embedded-Hacking: A FREE comprehensive step-by-s...GitHub
RACCOON THE HACKER
#deathgrips #hacker #mcride #raccoon #raccoonsoftiktok #catgrips #catgripsnation #fyp #foryou #riddlerfucker
https://www.tiktok.com/@deathgripslover333/video/7245805572551920922
deathgripslover333 on TikTok
RACCOON THE HACKER #deathgrips #hacker #mcride #raccoon #raccoonsoftiktok #catgrips #catgripsnation #fyp #foryou #riddlerfuckerTikTok
A #Hacker Manifesto: Twenty Years After. A special issue of e-flux journal.
https://www.e-flux.com/announcements/567733/a-hacker-manifesto-twenty-years-after/
A Hacker Manifesto: Twenty Years After - Announcements - e-flux
For summer 2024, e-flux journal, together with guest-editor McKenzie Wark, will publish a special issue on A Hacker Manifesto at twenty.www.e-flux.com
More tales from my past - when ones were ones, and we the evil hackers of the early Internet days were zeroes. Some of us wanted to fix things....
https://www.markloveless.net/blog/2023/8/29/tftp-not-getting-caught-part-two
#infosec #HackerLife #hacker #hacking
Tales from the Past: Not Getting Caught Part Two
Vendors are the worse. Sometimes you had to report security problems to them in weird ways to get them to act at all.Mark Loveless
Un grupo #hacker asegura haber vulnerado todos los sistemas de #Sony y pone a la venta los datos extraídos https://www.vidaextra.com/industria/grupo-hacker-asegura-haber-vulnerado-todos-sistemas-sony-pone-a-venta-datos-extraidos
Un grupo hacker asegura haber vulnerado todos los sistemas de Sony y pone a la venta los datos extraídos
Todavía falta una confirmación o desmentido por parte de Sony, pero un grupo de ransomware asegura haber atacado los sistemas de la compañía japonesa....Juan Sanmartín (Vida Extra)
#HackerHistory #HackerCulture #2600Magazine
Exclusive footage of one of the first #hacker gatherings: TELEPUB '86 where Cheshire Catalyst hosts around 20 people in NYC to decide the future of TAP Magazine.
Los #Hackers,Antonio no pueden arreglar -"fix"- #Sevilla pq #Sevilla es la ciudad del desgobierno y ni los #Hackers pueden hacer cosas imposibles.
Para tu larga lista de deseos,sería más útil no tu "Recuadro" sino carta a los Reyes Magos.
Nueva tarde de grabación para JuncoTIC.com!! 💪
Seguimos avanzando con el curso de Networking TCP/IP completo!
Hoy le tocó el turno a #Ethernet y al algoritmo de BackOff en CSMA/CD 🙂
Próximamente: Comprensión de la trama Ethernet y sus variantes, campos, y lo interesante! 👉 análisis y captura de tráfico con #wireshark y #tcpdump para parecer un poquito más #hacker's 😎
Los tengo al tanto de los avances para el que le interese sumarse cuando esté online!
Quan algú et digui que el hacking es un crim normalment es per que el que preten es ser l'unic que pot entrar on vulgui i que ningu sapiga com ho ha fet.
https://botiga.4xsample.cat/products/hacking-is-not-a-crime
#HackingNotACrime #Hacking #SeguretatInformàtica #Ciberseguretat #Hacktivisme #WhiteHat #BlackHat #GreyHat #Cracker #Hacker #RedTeam
El Blog de Angelucho, el último adiós.
Hoy despedimos a Ángel Pablo Avilés, aunque todos lo llamábamos Angelucho. Ángel era un #hacker pero un hacker de verdad, dedicó su vida a proteger a los más vulnerables utilizando para ello todas las armas que tenía a su alcance, aunque en su cinturón llevaba una 9mm, nunca la tuvo que utilizar para proteger a los más débiles.,,,
https://glider.es/el-blog-de-angelucho-el-ultimo-adios/
El Blog de Angelucho, el último adiós.
Hoy despedimos a Ángel Pablo Avilés, aunque todos lo llamábamos Angelucho. Ángel era un hacker, pero un hacker de verdad, dedicó su vida a proteger a los más vulnerables utilizando para ello todas …GLIDER.es
you can download the MP3 from https://2600.com/offthehook/2023/0723.html I have been listening to this #hacker show
since I was a kid in 1988, like I don't know what I will do if I miss one, this and the #2600 #Magazine are
a must for me. #HackerCulture #HackingIsNotACrime #offthehook #Hacking @2600@hispagatos@anarcho_hackers@hacking@cyberpunk
Using Machine Learning to Detect Keystrokes
Qué interesante este ataque de canal lateral acústico 🤔
New acoustic attack steals data from keystrokes with 95% accuracy
A team of researchers from British universities has trained a deep learning model that can steal data from keyboard keystrokes recorded using a microphone with an accuracy of 95%.Bill Toulas (BleepingComputer)