Blessed are the Geeks, for they shall internet the earth

2005 Top 10 Hacker Attack Tools

Computer security "agents" must master the same tools used by the hackers they seek, and many of these programs are available to download for free. The man-in-the middle attack, (also known as the monkey-in-the middle) is a useful method of scanning network data and...

Read More →

Phising

Phishing is what a spammer does when he or she wants to steal someone's identity. Some have labeled the action as "Social-engineering hacking done through e-mail", but there are no hackers involved in this scam. Phishing is all the work of spammers and conmen.

Read More →
How to build a cheap Security NOC

How to build a cheap Security NOC

The Network Operations Center or NOC is the cornerstone of all computer networks. I've worked at AT&T's NOC, been around Government NOCs and seen small scaled versions. Most look like something out of the movie, "WarGames" and surprisingly, whether you're a Linux or...

Read More →
Cisco Router Tips

Cisco Router Tips

One of the most important abilities a network administrator can have is the know-how to get information out of his network devices so he can find out what's going on with the network. In most networks, the staple of information gathering has been the "show" commands. Here...

Read More →
2004 Top Hacking Tools

2004 Top Hacking Tools

Here are 2004's most popular hacker tools, viruses, remote tools, adware, spyware, trojans and worms. Hackers and spammers use all the latest software security holes, worms and trojans to attack many businesses and trick Internet users into revealing their personal and...

Read More →