SouthernWolf.net
 • Home • Downloads • Your Account • Forums • 
Site Menu
null.gif Home
null.gif MembersShow/Hide content
null.gif NewsShow/Hide content
null.gif DownloadsShow/Hide content
null.gif ContentShow/Hide content
null.gif SiteShow/Hide content
null.gif DrugsShow/Hide content
null.gif Physics
null.gif Nature
null.gif Poetry
null.gif Chess
null.gif Website
null.gif Internet
null.gif Tanakh
Site Info
Last SeenLast Seen
Server TrafficServer Traffic
  • Total: 8,926,468
  • Today: 145
Server InfoServer Info
  • Sep 22, 2020
  • 03:29 am EDT
 
NukeSentinel™
This is the list of NukeSentinel(tm) banned IP addresses.

  • 196.196.160.*
  • 191.101.250.*
  • 103.112.3.*
  • 64.137.120.*
  • 89.19.47.*
  • 194.50.5.*
  • 103.112.0.*
  • 75.132.233.*
  • 74.135.192.*
  • 24.169.8.*
  • 98.236.169.*
  • 69.138.105.*
  • 75.82.25.*
  • 216.160.178.*
  • 68.227.29.*
  • 76.169.192.*
  • 75.140.164.*
  • 66.68.67.*
  • 66.228.0.*
  • 184.97.218.*

Trophy

Thank you, Navy SEALs

NukeSentinel™
You have been warned!
We have caught 2494 shameful hackers.

SouthernWolf.net: Hacking

Search on This Topic:   
[ Go to Home | Select a New Topic ]


Page 2 of 10 (58 total stories) [ << | < | 1 | 2 | 3 | 4 | 5 | 6 | 7 | > | >> ]   

A brief history of hacking Score: More about Printer Friendly Send to a Friend Save as PDF Read More...
Hacking

Mark Ward Technology correspondent, BBC News

Sony

Sony PlayStation, Reuters



Sony has suffered a series of attacks by a variety of hacking groups

The world is full of hackers, or so it seems. In the past few months barely a day has gone by without news of a fresh security breach.

Multi-national companies have been left counting the cost of assaults on their e-mail systems and websites.

Members of the public have had their personal information stolen and pasted all over the internet.

In the early decades of the 21st century the word "hacker" has become synonymous with people who lurk in darkened rooms, anonymously terrorising the internet.

But it was not always that way. The original hackers were benign creatures. Students, in fact.

To anyone attending the Massachusetts Institute of Technology during the 1950s and 60s, a hack was simply an elegant or inspired solution to any given problem.

Many of the early MIT hacks tended to be practical jokes. One of the most extravagant saw a replica of a campus police car put on top of the Institute's Great Dome.

Over time, the word became associated with the burgeoning computer programming scene, at MIT and beyond. For these early pioneers, a hack was a feat of programming prowess.

Such activities were greatly admired as they combined expert knowledge with a creative instinct.

 

Comments
Posted by Southern on Friday, November 11, 2011 @ 23:56:00 EST (1812 reads)

Israeli-Turkish Cyberwar Begins Score: More about Printer Friendly Send to a Friend Save as PDF Read More...
Hacking

Turkish hackers launched a DNS attack on 350 Israeli websites in what experts believe was a test run for attacks on Israeli domains.

Gavriel Queenann

Cyberwarfare

Cyberwarfare
Wikicommons

Amid the current diplomatic impasse between Ankara and Jerusalem, Turkish hackers hijacked some 350 Israeli websites on Sunday evening, launching a Domain Name System (DNS) attack on dozens of other websites as well.

Israeli IT analysts said Tuesday the DNS hijacking is likely to be, in fact, a "test-run" ahead of a major attack on Israeli domains.

Visitors to some of the sites were diverted to a page declaring it was “World Hackers Day."

At least seven high-profile websites outside Israel were also hijacked, including those of The Telegraph, Acer, National Geographic, UPS and Vodafone.

Hackers calling themselves the "TurkGuvenligi group" claimed they had done the cyber-attack. TurkGuvenligi translates as "Turkish security."

Comments
Posted by Southern on Friday, September 09, 2011 @ 23:52:57 EDT (2064 reads)

Slip-Up in Chinese Military TV Show Reveals More Than Intended Score: More about Printer Friendly Send to a Friend Save as PDF Read More...
Hacking

Piece shows cyber warfare against US entities

Matthew Robertson & Helena Zhu

Chinese hacking

EXPOSED: A picture of the hacking software shown during the Chinese military program. The large writing at the top says "Select Attack Target." Next, the user can choose which IP address to attack from. The drop-down box is a list of Falun Gong websites, while the button on the left says "Attack." (CCTV)

A standard, even boring, piece of Chinese military propaganda screened in mid-July included what must have been an unintended but nevertheless damaging revelation: shots from a computer screen showing a Chinese military university is engaged in cyberwarfare against entities in the United States.

The documentary itself was otherwise meant as praise to the wisdom and judgment of Chinese military strategists, and a typical condemnation of the United States as an implacable aggressor in the cyber-realm. But the fleeting shots of an apparent China-based cyber-attack somehow made their way into the final cut.

The screenshots appear as B-roll footage in the documentary for six seconds—between 11:04 and 11:10 minutes—showing custom-built Chinese software apparently launching a cyber-attack against the main website of the Falun Gong spiritual practice, by using a compromised IP address belonging to a United States university. As of Aug. 22 at 1:30pm EDT, in addition to Youtube, the whole documentary is available on the CCTV website.

Comments
Posted by Southern on Monday, August 29, 2011 @ 00:06:05 EDT (1993 reads)

Cyber Security Provider Hacked Score: More about Printer Friendly Send to a Friend Save as PDF
Hacking

In more cyber news, defense contracting giant Booz Allen Hamiliton’s networks were apparently breached by the raucous online collective, Anonymous, who proceeded to release more than 90,000 military e-mail addresses and passwords from an unprotected server. Wait a second, an unprotected server at a company positioning itself as a cyber security expert? PR fail.

Anonymous

Anonymous feels the same way, writing this little ditty at the famed/infamous file sharing site, The Pirate Bay, about the irony of a cyber security company being hacked so easily:

    “So in this line of work you’d expect them to sail the seven proxseas with a state-of-the-art battleship, right?” Anonymous said, using pirate jargon and playing off a reference to proxy computer servers.

    “Well, you may be as surprised as we were when we found their vessel being a puny wooden barge,” the message continued. “We infiltrated a server in their network that basically had no security measures in place.”

BAH was targeted on Anonymous’ “Meltdown Monday”, a part of it’s antisec, or anti-security campaign.

Keep in mind that this isn’t the first time Anonymous has hacked a security company. Earlier this year, the group attacked one of the companies hired by the federal government to go after it, forcing the resignation of the firm’s CEO after it was revealed that the company was almost as shady as a bunch of illegal hackers. Ouch.

Ahh, the hive.

DefenseTech

Comments
Posted by Southern on Saturday, August 27, 2011 @ 01:22:34 EDT (1097 reads)

French researchers demo attack on Chrome Score: More about Printer Friendly Send to a Friend Save as PDF Read More...
Hacking

Elinor Mills

Vupen posted a video of the demo of what they say is an exploit against Chrome.

Vupen posted a video of the demo of its exploit against Chrome.

French security firm Vupen said today its team has figured out a way to bypass security measures in Chrome and offers a video demo it says is a successful attack against the browser running on a Windows machine.

"We are (un)happy to announce that we have officially Pwnd Google Chrome and its sandbox," the Vupen Security blog said. "The exploit shown in this video is one of the most sophisticated codes we have seen and created so far as it bypasses all security features including ASLR [Address Space Layout Randomization]/DEP [Data Execution Prevention]/Sandbox, it is silent [no crash after executing the payload], it relies on undisclosed (0day) vulnerabilities discovered by VUPEN and it works on all Windows systems (32-bit and x64)."

Comments
Posted by Southern on Thursday, May 12, 2011 @ 01:06:11 EDT (1305 reads)

Anonymous Score: More about Printer Friendly Send to a Friend Save as PDF
Hacking

 Hacks Westboro Baptist Church Website During Live Confrontation

Comments
Posted by Southern on Monday, March 07, 2011 @ 14:03:27 EST (905 reads)



Page 2 of 10 (58 total stories) [ << | < | 1 | 2 | 3 | 4 | 5 | 6 | 7 | > | >> ]   

Topics
Islam
 
Forums

Papa Mike Creations is BACK!
Energy equals velocity
Black Vortices
Environment
Starships
Microbes
Inverses
Only Down
Question
Hmmm

Babes

© ThemeFreaks
GCalendar
<< September 2020 >>

S M T W T F S
    12345
6789101112
13141516171819
20212223242526
27282930     

bookmark site

Bookmark Us
Bookmark Us

Set as Homepage
Set as Homepage


Support RavenNuke™
RavenNuke(tm) v2.40.01
Proverbs
11:15, He that is surety for a stranger shall smart for it: and he that hateth suretiship is sure.
R.O.P.: R.I.P.

Thousands of Deadly Islamic Terror Attacks Since 9/11


Islam spreads like a virus....
more: Islam violence



List of Islamic Terror Attacks For the Past 2 Months
Support Our Troops
Support Our Troops


© ThemeFreaks
Honey Pot
Bots in the pot!
We have [303] bots in the pot!

Page Generation: 0.94 Seconds

| Fission phpbb2 style by Skaidon Designs | PHP-Nuke theme © www.nukemods.com |