Tuesday, August 31, 2010

THE HACKER'S JARGON FILE

The hacker's jargon file is like a hacker's slang dictionary. It is mostly collected from the early hacking cultures. It was first started by Raphael Finkel of standford university. After that it was further broadened and multiple version of it were published.It gives a insight in the hacker cultures with their typical styles of writing and chating online. Though it sounds a bit technical it is very entertaining to read. In recent years Eric Raymond is maintaining the file.The last revision to it was made in DEC 2003 so its a bit old but even then it is worth reading. ENJOY !!!
GO TO JARGON FILE

Saturday, August 28, 2010

HISTORY OF HACKING (discovery channel documentary)

This is a discovery channel documentary on "history of hacking" giving a brief account of the development of Hacking and tells about the new trends and techniques evolved with time.

It is focused on three legendary hacker personalities.
1) John Draper ( also known as Captain Crunch) :- The story of evolution of Phreaking is told using John Draper's experiences, a famous figure in Phreaking.

2)Steve Wozniak :- The co-founder of APPLE also famously known as "The other Steve" . Steve Wozniak made the first apple computer in his garage, which is widely considered as the first successful personal computer. 

3) Kevin Mitnick :-Last but not the least is the famous celebrity in hacking Kevin Mitnick. He represents the modern face of hacking. Famous for penetrating networks of famous companies like Nokia, Motorola etc.

its a bit old documentary but a sure watch one.

it is available on YOU TUBE here is the link   go to the video

you can also download it from here
DOWNLOAD (files tube)
DOWNLOAD (torrent link)

Wednesday, August 25, 2010

Web Hacking-Attacks And Defense

The book gives you information about  how Web hacking occurs and teaches you enhanced skill at developing defenses against such Web attacks. Technologies covered in the book include Web languages and protocols, Web and database servers, payment systems and shopping carts, and critical vulnerabilities associated with URLs. This book is a virtual battle plan that will help you identify and eliminate threats that could take your Web site off line.

Tuesday, August 24, 2010

DECRYPTING DVD TO STORE THEM IN HARD-DRIVE

DVD are very prone to damage and scratches. They are costly so there is a need to save them as a copy on the hardrive but the copy protection doents allow the user to do so. so here is are some free sofwares to to decrypt the dvd.

DVD DECRYPTER    >DOWNLOAD
DVD43     >DOWNLOAD        

Sunday, August 22, 2010

Certified Ethical Hacker Study Guide

Kimberly Graves, CEH, CWSP, CWNP, CWNA, has over 15 years of IT experience. She is founder of Techsource Network Solutions, a network and security consulting organization located in the Washington, DC area. She has served as subject matter expert for several certification programs-including the Certified Wireless Network Professional (CWNP) and Intel Certified Network Engineer programs-and has developed course materials for the Department of Veteran Affairs, USAF, and the NSA.The Certified Ethical Hacker exam is quickly becoming one of the most popular security certifications offered today. Candidates much prove their ability in not only identifying security risks from all levels, but also how to address those risks. This book provides a concise, easy to follow approach to this difficult exam.

Friday, August 13, 2010

HOW TO USE PATCH FILE ( provided with cracked softwares)

Generally the executable files which are provided by software developers to fix some bugs in their software or as a update to the latest version of their softwares used by the users are called Patch Files. But the executable files provided with softwares to crack them are also called Patch files.
If you download softwares using torrent and other p2p sharing sites you will often get a patch file with it to bypass the registration of the software and use the software for free, but many times the downloader doesn't understand how to use the Patch, so here is the method

Wednesday, August 11, 2010

GENUINE SERIAL KEYS AND CRACKS

Many sites on the Internet claim to provide free genuine keys and cracks for softwares and games, but mostly all of them are spam and ad sites. So here is a site which genuinely provides free serial ,keys and cracks. ENJOY !!!

WWW.SERIALS.WS

Tuesday, August 3, 2010

CRACKING ACCESS DATABASE PASSWORD (using CAIN & ABEL)

Windows Access is a software from Microsoft for database management.Access database are widely used in many softwares and fields, but this database are mostly password protected by the creator. so here is a tutorial to crack this password in just few seconds using the software CAIN & ABEL.

Step 1) Download and install the software CAIN & ABEL (its a freeware and can be downloaded for free from here  DOWNLOAD
                                        DOWNLOAD ( mirror )

Monday, August 2, 2010

HACKER MANIFESTO

This is a small essay written in 8 January 1986  by Loyd Blankenship a hacker who went by the handle (or pseudonym) of "The Mentor". He wrote this after he was caught. It was published in the "Phrack" hackers magazine.
 
© 2009 BASIC HACK AND TECH FOR BEGINNERS. All Rights Reserved | Powered by Blogger
Design by psdvibe | Bloggerized By LawnyDesigns