Phising

Phishing is what a spammer does when he or she wants to steal someone's identity. Some have labeled the action as Social-engineering hacking done through e-mail, but there are no hackers involved in this scam. Phishing is all the work of spammers...

comments

How to build a cheap Security NOC

The Network Operations Center or NOC is the cornerstone of all computer networks. I've worked at AT&T's NOC, been around Government NOCs and seen small scaled versions. Most look like something out of the movie, "WarGames" and surprisingly,...

comments

Cisco Router Tips

One of the most important abilities a network administrator can have is the know-how to get information out of his network devices so he can find out what's going on with the network. In most networks, the staple of information gathering has been...

comments

2004 Top Hacking Tools

Here are 2004's most popular hacker tools, viruses, remote tools, adware, spyware, trojans and worms. Hackers and spammers use all the latest software security holes, worms and trojans to attack many businesses and trick Internet users into...

comments

Subscription based licenses

A study released by the Macrovision Corporation says that more than 50 percent of software publishers favor subscription-based software licensing by 2006. Subscription-based software licensing is nothing more than a fancy term for leased...

comments

Steel Bolt Hacking

Lock picking has become an odd diversion for many computer people for sport and hobby. With lock picking contests at such events as DefCon and HOPE, the need to push pins with your peers is slowly moving through computer groups with interesting...

comments

Linux Sling

There is a great similarity between computer people, and a great part of it is a passion for making the bloody things do great tricks (the digital equivalents of a loop the loop, or hand stands) as a result of some really elegant math on our...

comments