Quantcast

hack Articles

Microsoft Strolls The Rumor Treadmill

As the company continues to tack upon the seas of Windows Live, Microsoft has been predicted to have a stop scheduled at the shores of social media.

Hackers Told To Hack Off Ponytails

Open source developers are the grunge rockers of the new millennium, the originals long dissolved in corporate formulaic art. Unlike their barefoot hippie predecessors (who woke up one day in Birkenstocks as Volvo-driving yuppies), they kept their ponytails as an affront to The Man, sharing their warez with the Kool-Aid drinking masses.

WordPress Upgraded

I’ve just upgraded WordPress on this blog to version 2.0.2 which was released last week.

Excellent hack for K2 WordPress theme

One of the things I continue to find a bit tricky with WordPress and the customized K2 theme I have on this blog is tweaking the sidebar to include or exclude elements on certain pages.

Blogger Hack Endangers Sensitive Word Docs?

Here’s a potential ticking time bomb. To the Microsoft Office team, you have what could be a sizable PR problem on your hands.

Ten Technorati Hacks

If there’s any one site I use more than others (with the exception of Gmail), it’s Technorati. This site is a fantastic window into the psyche of the more digitally inclined. Here, in another in my series of hack postings, are 10 ways I get more mileage from T’rati.

Google Earth And The Hurricane

Asa Dotzler asks the question many may have been wondering during today’s, “moderately” difficult weather condition …

Darwin Was A Hack, Says Geneticist

A retired Italian scientist says not all critics of evolution come from strict supporters of creationism.

Spammers Hack SpreadFirefox.com

An email advisory to the volunteers who have registered on the site have been advised to update their logins.

Google Maps Address Hack

Has it’s been documented quite frequently, since the launch of Google’s map service, there have been quite a few hacks and extensions built that further Google’s map search functionality.

Freelance Copywriters on the Internet: How to Tell the Difference Between Heaven-Sent and Hack

If you’re hunting for a good freelance copywriter and have never done it before, or if you have but find yourself needing another for the first time in a while, I don’t envy you.

Google Maps Hack finds Cheap Gas!
· 1

Ahding.com has created a timely hack for everyone weary of paying high gas prices. His hack is called Cheap Gas and utilizes Google Maps and GasBuddy to create a display of gas prices and map locations for an area.

Hacks Increase Google Satellite Maps Usability
· 1

A little over a month ago, Google introduced satellite technology, which was acquired from Keyhole, onto their Google Maps service.

Google Hack Not A Hack

No word on whether anyone’s been sacked, and Google claims it wasn’t an attack that set its DNS back.

Apple Strikes Back at iTunes Hack

Apple Computer has “closed” (cough) a security hole that allows users to download mp3s from the iTunes Music Store and purchase songs stripped of antipiracy protections …

Jeansonne Gets 6 Months for WebTV Hack

A man from Louisiana, David Jeansonne, who sent around a malicious program that caused WebTV customers to call 911, was sentenced to six months in prison.

Exxon Mobile SpeedPass Hack via RFID

Tired of paying for gas … Are you a geek with a laptop, knowledge of the Texas Instruments RFID spec and live near an Exxon Mobile gas station equipped with SpeedPass …

Pepsi Challenge: Consumers Hack Their Promotions

One of the most interesting developments in the golden era of transparency is that consumers are sharing all kinds of information to hack/circumvent traditional promotions such as coupons, contests and giveaways.

Penetration Test : My Meanest Hack
· 1

I was requested to perform a proof of concept hack into a large organization a few weeks ago. The aim was to get an interactive session, preferably GUI, on one of the internal machines which was guarded by 2 (External and DMZ) firewalls, and an Intrusion detection system. I was allowed to use any means necessary to achieve this goal. This is extremely unusual for a penetrations test, where the rules, guidelines and penetration methods are very strict and defined. I was supposed to impersonate a hacker that would stop at nothing to gain interactive access to the internal network.

After the Hack: How to Get Back to Business

More often than not, when your machine has been the victim of a cracker’s attack, the best solution is to completely reinstall the operating system, being sure to apply all relevant patches to the machine. In other words, go to your software vendor’s website and double-check all of the security announcements and patches… you may have been hit by a brand new exploit. I have many times been asked if a complete reinstall is absolutely necessary. The short and simple answer is “yes”.

Network Denial of Service Attacks. Can you hack it?

These days there are significant increases in network-based attacks and among them is the dreaded Denial-of-Service attack, which can leave your systems either unusable or unreachable. Although these attacks don’t make the news as often as they did when Yahoo.com was taken down by a massive Distributed Denial of Service attack, they are still prevalent.