Blessed are the Geeks, for they shall internet the earth

2005 Top 10 Hacker Attack Tools

Computer security "agents" must master the same tools used by the hackers they seek, and many of these programs are available to download for free. The man-in-the middle attack, (also known as the monkey-in-the middle) is a useful method of scanning network data and...

Read More →
2004 Top Hacking Tools

2004 Top Hacking Tools

Here are 2004's most popular hacker tools, viruses, remote tools, adware, spyware, trojans and worms. Hackers and spammers use all the latest software security holes, worms and trojans to attack many businesses and trick Internet users into revealing their personal and...

Read More →
Steel Bolt Hacking

Steel Bolt Hacking

Lock picking has become an odd diversion for many computer people for sport and hobby. With lock picking contests at such events as DefCon and HOPE, the need to push pins with your peers is slowly moving through computer groups with interesting enthusiasm. And it's far...

Read More →