Tullio Facchinetti
Tag cloud
Picture wall
Daily
RSS Feed
  • RSS Feed
  • ATOM Feed
  • Daily Feed
Filters

Links per page

  • 20 links
  • 50 links
  • 100 links

Display

Filter untagged links
12 results tagged hacking  ✕
Bored? How about trying a Linux speed run? https://rachelbythebay.com/w/2020/04/11/pengrun/
Sun 12 Apr 2020 10:19:53 AM CEST
QRCode

About 15 years ago, I mused about the idea of having a "desert island machine". This is where I'd put someone in a room with a box that has a couple of hard drives and a working network connection. HD #1 is blank. HD #2 has a few scraps of a (Linux) OS on it: bootloader, kernel, C library and compiler, that sort of thing. There's a network connection of some sort, and that's about it.

Now you see things like people managing to do the original Super Mario Bros game from the 80s in under five minutes, and I do mean people. There are actual humans frobbing plastic controllers doing this! Just dig around on your favorite giant video-streaming site if you need evidence of this happening.

So here's the pitch: Linux speedruns. By that, I don't mean "speedrunning a game on a Linux box" (like emulation, or something). Nope.

article funny hacking operating_system programming sysadmin
Hacking with Python : 6 Best Online Courses for Ethical Hackers https://www.comparitech.com/blog/information-security/hacking-python-courses-online/
Mon 30 Mar 2020 12:38:30 PM CEST
QRCode

If you’re looking to get into ethical hacking, getting acquainted with Python is a great start. They discuss Python and ethical hacking and reveal the best online courses you can take to start training in the field.

course hacking online programming python resources
Exception(al) Failure - Breaking the STM32F1 Read-Out Protection https://blog.zapb.de/stm32f1-exceptional-failure/
Fri 27 Mar 2020 09:29:40 AM CET
QRCode

The firmware of microcontrollers usually contains valuable data such as intellectual property and, in some cases, even cryptographic material.

image

article embedded hacking programming security
mitmproxy - An interactive HTTPS proxy https://mitmproxy.org/
Sun 12 Jan 2020 06:26:26 PM CET
QRCode
#cli-app command_line hacking networking security
Meet Cliff Stoll, the Mad Scientist Who Invented the Art of Hunting Hackers | WIRED https://www.wired.com/story/meet-the-mad-scientist-who-wrote-the-book-on-how-to-hunt-hackers/
Thu 19 Dec 2019 09:51:03 PM CET
QRCode

Thirty years ago, Cliff Stoll published The Cuckoo's Egg, a book about his cat-and-mouse game with a KGB-sponsored hacker. Today, the internet is a far darker place—and Stoll has become a cybersecurity icon.

I read this book when I was young. Still remember the atmosphere :-)

article book hacking security story
Ken Thompson's Unix password https://leahneukirchen.org/blog/archive/2019/10/ken-thompson-s-unix-password.html
Wed 09 Oct 2019 06:03:17 PM CEST
QRCode

Somewhere around 2014 I found an /etc/passwd file in some dumps of the BSD 3 source tree, containing passwords of all the old timers such as Dennis Ritchie, Ken Thompson, Brian W. Kernighan, Steve Bourne and Bill Joy.

article funny hacking story tech
The Most Clever 'Zip Bomb' Ever Made Explodes a 46MB File to 4.5 Petabytes - VICE https://www.vice.com/en_us/article/597vzx/the-most-clever-zip-bomb-ever-made-explodes-a-46mb-file-to-45-petabytes
Thu 11 Jul 2019 10:17:41 PM CEST
QRCode

Files so deeply compressed that they’re effectively malware have been around for decades—and a researcher just unveiled a brand-new Zip bomb that explodes a 46-megabyte file to 4.5 petabytes of data.

hacking
Huawei’s Hidden Back Doors Found https://breakingdefense.com/2019/07/hunting-huaweis-hidden-back-doors/
Mon 08 Jul 2019 09:05:45 AM CEST
QRCode

How do you find hundreds of vulnerabilities hidden in millions of lines of firmware code?

article debug hacking security
The Scene: Pirates Ripping Content From Amazon & Netflix - TorrentFreak https://torrentfreak.com/the-scene-pirates-ripping-content-from-amazon-netflix-190707/
Mon 08 Jul 2019 08:54:03 AM CEST
QRCode

Traditionally, a major source of high-quality pirate releases has been retail discs, such as Blu-ray or DVD. Today, torrent and streaming sites are regularly fueled by content culled from streaming services such as Netflix and Amazon. Known online as WEB releases, these files are the product of a decryption process using tools mostly not intended for public use. Recently, TF spoke with a person involved in the secretive WEB scene.

article hacking multimedia privacy security
The $100 Million Bot Heist http://m.nautil.us/issue/66/clockwork/the-100-million-bot-heist
Mon 03 Dec 2018 03:44:25 AM CET
QRCode

When it comes to using computers to steal money, few can come close to matching the success of Russian hacker Evgeniy Bogachev.

The $3 million bounty the FBI has offered for Bogachev’s capture is larger than any that has ever been offered for a cybercriminal—but that sum represents only a tiny fraction of the money he has stolen through his botnet GameOver ZeuS.1 At its height in 2012 and 2013, GameOver ZeuS, or GOZ, comprised between 500,000 and 1 million compromised computers all over the world that Bogachev could control remotely. For years, Bogachev used these machines to spread malware that allowed him to steal banking credentials and perpetrate online extortion.2 No one knows exactly how much money Bogachev stole from his thousands of victims using GOZ, but the FBI conservatively estimates that it was well over $100 million.

image

article bot hacking ransomware security story
The New Hacker's Dictionary - Table of Contents http://www.outpost9.com/reference/jargon/jargon_toc.html
Sat 28 May 2016 03:28:40 PM CEST
QRCode
funny hacking
Reflections on Trusting Trust http://www.win.tue.nl/~aeb/linux/hh/thompson/trust.html
Tue 08 Sep 2015 11:04:41 PM CEST
QRCode

Ken Thompson's "cc hack"

Presented in the journal, Communication of the ACM, Vol. 27, No. 8, August 1984, in a paper entitled "Reflections on Trusting Trust".

Ken Thompson, co-author of UNIX, recounted a story of how he created a version of the C compiler that, when presented with the source code for the "login" program, would automatically compile in a backdoor to allow him entry to the system. This is only half the story, though. In order to hide this trojan horse, Ken also added to this version of "cc" the ability to recognize if it was recompiling itself to make sure that the newly compiled C compiler contained both the "login" backdoor, and the code to insert both trojans into a newly compiled C compiler. In this way, the source code for the C compiler would never show that these trojans existed.

c hacking programming software
3672 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service by the Shaarli community - Theme by kalvn