SouthernWolf.net
 • Home • Downloads • Your Account • Forums • 
Site Menu
null.gif Home
null.gif MembersShow/Hide content
null.gif NewsShow/Hide content
null.gif DownloadsShow/Hide content
null.gif ContentShow/Hide content
null.gif SiteShow/Hide content
null.gif DrugsShow/Hide content
null.gif Physics
null.gif Nature
null.gif Poetry
null.gif Chess
null.gif Website
null.gif Internet
null.gif Tanakh
Site Info
Last SeenLast Seen
Server TrafficServer Traffic
  • Total: 8,926,563
  • Today: 240
Server InfoServer Info
  • Sep 22, 2020
  • 04:57 am EDT
 
NukeSentinel™
This is the list of NukeSentinel(tm) banned IP addresses.

  • 196.196.160.*
  • 191.101.250.*
  • 103.112.3.*
  • 64.137.120.*
  • 89.19.47.*
  • 194.50.5.*
  • 103.112.0.*
  • 75.132.233.*
  • 74.135.192.*
  • 24.169.8.*
  • 98.236.169.*
  • 69.138.105.*
  • 75.82.25.*
  • 216.160.178.*
  • 68.227.29.*
  • 76.169.192.*
  • 75.140.164.*
  • 66.68.67.*
  • 66.228.0.*
  • 184.97.218.*

Trophy

Thank you, Navy SEALs

NukeSentinel™
You have been warned!
We have caught 2494 shameful hackers.

SouthernWolf.net: Hacking

Search on This Topic:   
[ Go to Home | Select a New Topic ]


Page 5 of 10 (58 total stories) [ << | < | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | > | >> ]   

Miami hacker in credit card scam honed skills at early age Score: More about Printer Friendly Send to a Friend Save as PDF Read More...
Hacking
Gonzalez

image: NYT

The Miami man accused in a massive scheme to steal the credit cards of 130 million Americans showed early signs of his hacking skills -- breaking into the government network of India.
 
NIRVI SHAH, MICHAEL SALLAH AND ROB BARRY

Years before his arrest in the nation's largest credit card heist, Albert Gonzalez launched a bold plan from a computer in his high school library: hack into the government network of India.

By the time FBI agents descended on South Miami Senior High School, the quiet 17-year-old senior had already shattered the security systems and left his mark: offensive notes on government message boards.

The successful breach of a network across the world stunned school administrators, but showed Gonzalez was already demonstrating the skills that would define him as one of the most prolific hackers in United States history.

Comments
Posted by Southern on Saturday, August 22, 2009 @ 22:37:59 EDT (939 reads)

Cyberattacks in Georgia dissected – ties to Russian mob evident Score: More about Printer Friendly Send to a Friend Save as PDF Read More...
Hacking

Steve Ragan

cyber crime

(IMG:J.Anderson)

One year after the cyberattacks on Georgia, there is new information thanks to the non-profit research center US Cyber Consequences Unit (US-CCU). The report, sent to various government officials Monday, details some interesting observations based on information collected by US-CCU.

One observation is that the organizers of the cyber attack had advance notice of Russian military intentions to launch a ground assault on Georgia. The report says that organizers were tipped off about the timing of the Russian military operations, which is why the cyber attacks and the ground assault started almost instantaneously.

“Many of the cyber attacks were so close in time to the corresponding military operations that there had to be close cooperation between the people in the Russian military and the civilian attackers. When the cyber attacks began, they did not involve any reconnaissance or mapping stage, but jumped directly to the sort of packets that were best suited to jamming the websites under attack. This indicated that the necessary reconnaissance and the writing of the attack scripts had to have been done in advance,” the report reads in part.

Another observation is that the civilian attackers were aided by Russian organized crime. This conclusion comes from the fact that some of the webservers and addresses used to control and coordinate the attack were previously used by Russian criminal organizations. “Several servers used in the attacks were simultaneously hosting software ready to be used for other cyber crime. In addition, the specific botnets employed in the cyber campaign were ones closely associated with Russian organized crime,” the report explained. Based on the observations, the US-CCU concluded that the Russian criminals made no real effort to hide their involvement, “because they wanted to claim credit for it.”

Comments
Posted by Southern on Saturday, August 22, 2009 @ 22:24:37 EDT (907 reads)

Could You be Hacked Like Twitter? Score: More about Printer Friendly Send to a Friend Save as PDF Read More...
Hacking

Ian Paul

Webcrime

Artwork: Diego Aguirre

The French hacker who broke into Twitter's Google Apps and stole more than 300 private company documents has revealed in detail how he did it. Using a method known as "cracking," the man who goes by the name Hacker Croll was able to break down Twitter security by trolling the Web for publicly available information, according to TechCrunch. Eventually, Croll found one weakness many of us are guilty of -- using one password for everything -- and Twitter's security was compromised. Read on to see how Hacker Croll did it, and consider whether access to your digital life could be breached by his methods.

Croll Cracks Twitter

Hacker Croll started by building a profile of his target company, in this case Twitter. Basically, he assembled a list of employees, their positions within the company, and their associated e-mail addresses. After the basic information was accumulated, Croll built a small profile for each employee with their birth date, names of pets, and so on.

After Croll had created these profiles, he just went about knocking on doors until one fell down. That's exactly what happened when he did a password recovery process for a Twitter employee's personal Gmail account. Croll discovered that the secondary account attached to this person's Gmail was a Hotmail account. The problem was that Hotmail account had been deleted and recycled due to inactivity -- a longstanding policy on Hotmail. Now, all Hacker Croll had to do was reregister the Hotmail account for himself, go back and do the Gmail password recovery, and then Gmail sent the password reset information straight to the bad guy.

Comments
Posted by Southern on Tuesday, July 21, 2009 @ 22:05:37 EDT (986 reads)

U.S. Web Sites Continue to Suffer Attacks by Hackers Score: More about Printer Friendly Send to a Friend Save as PDF Read More...
Hacking

Gopal Ratnam and Juliann Neher

Web sites of the U.S. departments of State, Treasury and Transportation were attacked by unidentified hackers during the July 4 holiday weekend and in some cases the attacks were continuing today, officials said.

In addition, NYSE Euronext, the world’s largest owner of stock exchanges, said it was notified by authorities that it had been the target of a cyber attack aimed at slowing or shutting down its Web site.

The Department of Homeland Security is aware of the attacks and its Computer Emergency Readiness Team, or CERT, has advised government agencies and private companies on “steps to take to mitigate against such attacks,” Amy Kudwa, a spokeswoman for the department, said in an e-mail today.

The attacks are known as distributed denial of service, a common practice by hackers who commandeer remote computers to flood targeted Web sites with a large volume of data that renders the sites inaccessible to other users. Kudwa said she didn’t have information on reports by Seoul-based Yonhap News that North Korea may have orchestrated the effort.

The attack on the State Department’s state.gov site started July 5, department spokesman Ian Kelly said at the daily briefing with reporters today. “It’s still ongoing, but I’m told it’s much reduced right now.” He said he hadn’t noticed “any real difficulties” in accessing the site.

Comments
Posted by Southern on Friday, July 10, 2009 @ 15:19:08 EDT (861 reads)

Militants, 'hacktivists' exploit Web, eye recruits Score: More about Printer Friendly Send to a Friend Save as PDF Read More...
Hacking

LOLITA C. BALDOR

Terrorist groups that have long used the Internet to spread propaganda are increasingly tapping the Web to teach Islamic extremists how to be hackers, recruit techies for cyberwarfare and raise money through online fraud, U.S. officials say.

A senior defense official said intelligence reports indicate extremist groups are seeking computer experts, including those capable of breaching government or other sensitive network systems.

The official, who spoke on condition of anonymity to discuss sensitive information, said the extent and success of those recruiting efforts are unclear.

But jihadists' interest in hacking is evident in forums across the Internet. Law enforcement officials say terrorists are branching out into Internet fraud to raise money for their operations.

One Internet forum, the Mujahedeen Electronic Net, offers hacking instructions in a number of postings. A lengthy posting markets a weekly course and limits it to regular contributors to the Web site who confirm they are committed to Islam. The author of the offer claims the course will be taught by "experts in the electronic jihad," according to a translation of the posting.

Comments
Posted by Southern on Monday, June 22, 2009 @ 15:24:13 EDT (794 reads)

UC Berkeley computers hacked, 160,000 at risk Score: More about Printer Friendly Send to a Friend Save as PDF Read More...
Hacking

Michelle Meyers

Hackers broke into the University of California at Berkeley's health services center computer and potentially stole the personal information of more than 160,000 students, alumni, and others, the university announced Friday.

At particular risk of identity theft are some 97,000 individuals whose Social Security numbers were accessed in the breach, but it's still unclear whether hackers were able to match up those SSNs with individual names, Shelton Waggener, UCB's chief technology officer, said in a press conference Friday afternoon.

UCB

(Credit: University of California at Berkeley)

Comments
Posted by Southern on Monday, May 11, 2009 @ 20:52:46 EDT (833 reads)



Page 5 of 10 (58 total stories) [ << | < | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | > | >> ]   

Topics
Islam
 
Forums

Papa Mike Creations is BACK!
Energy equals velocity
Black Vortices
Environment
Starships
Microbes
Inverses
Only Down
Question
Hmmm

Babes

© ThemeFreaks
GCalendar
<< September 2020 >>

S M T W T F S
    12345
6789101112
13141516171819
20212223242526
27282930     

bookmark site

Bookmark Us
Bookmark Us

Set as Homepage
Set as Homepage


Support RavenNuke™
RavenNuke(tm) v2.40.01
Proverbs
14:20, The poor is hated even of his own neighbour: but the rich hath many friends.
R.O.P.: R.I.P.

Thousands of Deadly Islamic Terror Attacks Since 9/11


Islam spreads like a virus....
more: Islam violence



List of Islamic Terror Attacks For the Past 2 Months
Support Our Troops
Support Our Troops


© ThemeFreaks
Honey Pot
Bots in the pot!
We have [303] bots in the pot!

Page Generation: 0.83 Seconds

| Fission phpbb2 style by Skaidon Designs | PHP-Nuke theme © www.nukemods.com |