• Home • Downloads • Your Account • Forums • 
Site Menu
null.gif Home
null.gif MembersShow/Hide content
null.gif NewsShow/Hide content
null.gif DownloadsShow/Hide content
null.gif ContentShow/Hide content
null.gif SiteShow/Hide content
null.gif DrugsShow/Hide content
null.gif Physics
null.gif Nature
null.gif Poetry
null.gif Chess
null.gif Website
null.gif Internet
null.gif Tanakh
Site Info
Last SeenLast Seen
Server TrafficServer Traffic
  • Total: 8,923,157
  • Today: 827
Server InfoServer Info
  • Sep 18, 2020
  • 07:16 pm EDT
This is the list of NukeSentinel(tm) banned IP addresses.

  • 196.196.160.*
  • 191.101.250.*
  • 103.112.3.*
  • 64.137.120.*
  • 89.19.47.*
  • 194.50.5.*
  • 103.112.0.*
  • 75.132.233.*
  • 74.135.192.*
  • 24.169.8.*
  • 98.236.169.*
  • 69.138.105.*
  • 75.82.25.*
  • 216.160.178.*
  • 68.227.29.*
  • 76.169.192.*
  • 75.140.164.*
  • 66.68.67.*
  • 66.228.0.*
  • 184.97.218.*


Thank you, Navy SEALs

You have been warned!
We have caught 2494 shameful hackers. Hacking

Search on This Topic:   
[ Go to Home | Select a New Topic ]

Page 4 of 10 (58 total stories) [ << | < | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | > | >> ]   

Operation Titstorm: hackers bring down government websites Score: More about Printer Friendly Send to a Friend Save as PDF Read More...


Minister Stephen Conroy has barely raised an eyebrow at the thought of more cyber attacks from internet prank group Anonymous.

Groups opposing the government's internet censorship plans have condemned today's attacks on government websites, saying it will do little to help their cause, while Communications Minister Stephen Conroy called them "totally irresponsible".

Hackers connected with the group Anonymous, known for its war against Scientology, this morning launched a broad attack on government websites.

They are protesting against forthcoming internet filtering legislation and the perceived censorship in pornography of small-breasted women (who are thought to be under age) and female ejaculation.

Operation Titstorm

A flyer Anonymous used to recruit people for the hack attack.

Posted by Southern on Friday, February 12, 2010 @ 23:03:32 EST (1140 reads)

Report warned about Google-like attacks Score: More about Printer Friendly Send to a Friend Save as PDF Read More...

Zeljka Zorz

Could the attack on Google have been prevented or, at least, mitigated? The question arose when the existence of a report titled "Report on the Capability of the People's Republic of China to Conduct Cyber Warfare and Computer Network Exploitation", published in October, has been noticed by the general public.

crystal ball

According to InformationWeek, the report, ordered by the U.S.-China Economic and Security Review Commission and compiled by Northrup Grumman, was made public in October - 2 months before the attack.

"Little evidence exists in open sources to establish firm ties between the People’s Liberation Army and China’s hacker community, however, research did uncover limited cases of apparent collaboration between more elite individual hackers and the PRC’s civilian security services," says the report. So, the possibility of the attacks being sponsored or, at least, being condoned by the Chinese government exists.

The report also gives an overview of China's strategy regarding cyber warfare and cyber espionage and its past intrusions and actions taken against US and other foreign interests.`

Posted by Southern on Monday, February 01, 2010 @ 17:36:15 EST (1177 reads)

Ahmadinejad's Website Hacked Score: More about Printer Friendly Send to a Friend Save as PDF


Dear God, In 2009 you took my favorite singer - Michael Jackson, my favorite actress - Farrah Fawcett, my favorite actor - Patrick Swayze,
my favorite voice - Neda.
Please, please, don't forget my favorite politician - Ahmadinejad and my favorite dictator - Khamenei
in the year 2010. Thank you.

Mahmoud the Ape


Posted by Southern on Monday, January 11, 2010 @ 23:02:19 EST (953 reads)

Hacking XP User Account Score: More about Printer Friendly Send to a Friend Save as PDF


WINDOWS XP/Media Center PASSWORD Hack Crack. Hack Any User Accou - The best home videos are here
Posted by Southern on Monday, January 04, 2010 @ 14:07:12 EST (1109 reads)

The Cyber-Threat Grows Score: More about Printer Friendly Send to a Friend Save as PDF Read More...

We’ve got a lot of catching up to do before we’re secure.

John P. Avlon

First your cell phone doesn’t work. Then you notice that you can’t access the Internet. Down on the street, ATMs won’t dispense money. Traffic lights don’t function, and calls to 911 don’t get routed to emergency responders. Radios report that systems controlling dams, railroads, and nuclear power plants have been remotely infiltrated and compromised. The air-traffic control system shuts down, leaving thousands of passengers stranded or rerouted and unable to communicate with loved ones. This is followed by a blackout that lasts not hours but days and even weeks. Our digital civilization shudders to a halt. When we emerge, millions of Americans’ data are missing, along with billions of dollars.

This scenario may sound like the latest doomsday blockbuster to come out of Hollywood. But each of the elements described above has occurred over the past decade as the result of a cyber-attack. Cyber-attacks are an accelerating threat, still without generally accepted terminology, effective deterrents, or comprehensive legal remedies. They are weapons of mass disruption, used by adversaries cloaked in anonymity, that could prove at least temporarily crippling to the digital infrastructure of modern society. This kind of attack is attractive to America’s enemies, not only because it allows weaker entities to take on far stronger ones but because it turns our technological strength into a weakness.

We know that al-Qaida is interested in cyber-terrorism. Seized al-Qaida computers show details about Supervisory Control and Data Acquisition (SCADA) systems in America, which control critical infrastructure, including electrical grids, nuclear plants, fiber-optic cables, oil and gas pipelines, dams, railroads, and water storage and distribution facilities. SCADA systems were never meant to be accessed by the public, but many are now controlled via the Internet, leaving them vulnerable to infiltration and attack. The al-Qaida computers also contained schematics of a U.S. dam, along with engineering software that enabled operatives to simulate its catastrophic failure and flooding of populated areas. One al-Qaida safe house in Pakistan was devoted to the operational study of Internet attacks, according to terrorism expert Magnus Ranstorp.

Perhaps America’s most dangerous online adversary is not the Islamic radical but the “hacktivist,” the technological equivalent of the lone gunman. “We’re facing people who, to quote the Joker, ‘just want to watch it all burn,’ ” says Tom Rushmore, whose New York–based small business lost $1.7 million between 2001 and 2003 to hacktivists. In March 2000, 49-year-old Vitek Boden, fired from his job at an Australian sewage-treatment plant, remotely gained control of its systems and flooded Queensland rivers, coastland, and parks with 1 million liters of raw sewage, causing millions of dollars of damage. In the United States, a researcher at IBM Security Services named Scott Lunsford successfully test-hacked into a nuclear power plant in 2007, despite assurances from the Nuclear Regulatory Commission that it would be nearly impossible. “It turned out to be one of the easiest penetration tests I’ve ever done,” Lunsford told Forbes. “By the first day, we had penetrated the network. Within a week, we were controlling a nuclear power plant. I thought, ‘Gosh. This is a big problem.’ ”

Posted by Southern on Saturday, December 05, 2009 @ 19:55:00 EST (1098 reads)

CRU has apparently been hacked – hundreds of files released Score: More about Printer Friendly Send to a Friend Save as PDF

The details on this are still sketchy, we’ll probably never know what went on. But it appears that University of East Anglia Climate Research Unit has been hacked and many many files have been released by the hacker or person unknown.

This image source:

I’m currently traveling and writing this from an airport, but here is what I know so far:
An unknown person put postings on some climate skeptic websites that advertised an FTP file on a Russian FTP server, here is the message that was placed on the Air Vent today:

We feel that climate science is, in the current situation, too important to
be kept under wraps.

We hereby release a random selection of correspondence, code, and documents

The file was large, about 61 megabytes, containing hundreds of files.

It contained data, code, and emails from Phil Jones at CRU to and from many people.

I’ve seen the file, it appears to be genuine and from CRU. Others who have seen it concur- it appears genuine. There are so many files it appears unlikely that it is a hoax. The effort would be too great.

Here is some of the emails just posted at Climate Audit on this thread:

cont: WattsUpWithThat

Posted by Southern on Sunday, November 29, 2009 @ 21:53:29 EST (787 reads)

Page 4 of 10 (58 total stories) [ << | < | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | > | >> ]   


Papa Mike Creations is BACK!
Energy equals velocity
Black Vortices
Only Down


© ThemeFreaks
<< September 2020 >>


bookmark site

Bookmark Us
Bookmark Us

Set as Homepage
Set as Homepage

Support RavenNuke™
RavenNuke(tm) v2.40.01
7:1, My son, keep my words, and lay up my commandments with thee.
R.O.P.: R.I.P.

Thousands of Deadly Islamic Terror Attacks Since 9/11

Islam spreads like a virus....
more: Islam violence

List of Islamic Terror Attacks For the Past 2 Months
Support Our Troops
Support Our Troops

© ThemeFreaks
Honey Pot
Bots in the pot!
We have [302] bots in the pot!

Page Generation: 0.74 Seconds

| Fission phpbb2 style by Skaidon Designs | PHP-Nuke theme © |