background preloader

Tech Loading Bay

Facebook Twitter

AutoHotKey

Dark Net. IRC. Video: Schedule your work. <div class="cdOLblEmRed cdSearchResultsMargin">Warning: This site requires the use of scripts, which your browser does not currently allow. <a href=" how to enable scripts. </a><br/></div> Video: Schedule your work With a few clicks, you can tap the power of Project 2013 to convert your to-do list into a full-fledged project for you to manage and share with your team and stakeholders. Get the whole story Rating: Applies to: Project Professional 2013, Project Standard 2013 Views: Submitted on: Length: See Also: Basic tasks in Project 2013 What's new in Project 2013. GitHub For Beginners: Don't Get Scared, Get Started. It's 2013, and there's no way around it: you need to learn how to use GitHub. Why? Because it's a social network that has completely changed the way we work. Having started as a developer's collaborative platform, GitHub is now the largest online storage space of collaborative works that exists in the world.

Whether you're interested in participating in this global mind meld or in researching this massive file dump of human knowledge, you need to be here. See also: GitHub For Beginners: Commit, Push And Go Simply by being a member, you can brush elbows with the likes of Google and Facebook. Before GitHub existed, major companies created their knowledge mainly in private. Looking For GitHub Answers As embarrassing as it is to admit, this tutorial came into being because all of the “GitHub for Beginners” articles I read were way over my head. See also: Github's Tom Preston-Werner: How We Went Mainstream If you’ve given up on understanding how to use GitHub, this article is for you.

First type: Meernotes Puts the Look and Feel of a Moleskine on your iPhone. Minilogs Turns Your Media Links Into Playlists. What Would You Do For Bitcoin? - For Bitcoin. Hacker Fundamentals: The Everyman's Guide to How Network Packets Are Routed Across the Web. Hacker Fundamentals: The Everyman's Guide to How Network Packets Are Routed Across the Web In general, hacking and information security is not just one discipline, but a number of them, and today we will look into some of the networking concepts. In the last Hacker Fundamentals, we talked about the OSI model as well as a little on TCP/IP and the protocols that make up the suite. Now, we're going to expand on that now and take a look at the various parts of a network that you might have heard about, but might not understand.

We already covered how your data travels the OSI model, layer by layer, and talks with other machines on your local network. Much of the 'talking' on a local network are broadcasts. No routers were hurt in the writing of this article. A Tale of Two Packets: Internal If you remember correctly, an IP address has two components, the network section and the host section. Let's say you wanted to send data to another computer on your local network at home. Route Me Baby! How Secure Are You Online: The Checklist. Computer and Network Security Tutorials and Classes. GOOGLE HACKING TO HACK INTO A LIVE SECURITY CAMERA « FREE EDUCATION. Google serves almost 80 percent of all search queries on the Internet, proving itself as the most popular search engine.

However Google makes it possible to reach not only the publicly available information resources, but also gives access to some of the most confidential information. In this post I will show how to use Google Hacking to Hack into a Live Security Camera. There exists many security cameras used for monitoring places like parking lots, college campus, road traffic etc. which can be hacked using Google so that you can view the images captured by those cameras in real time. So how do you find such cameras. Just google these following strings and select any result(Top 5 recommended) and you will gain access to the live camera which has full controls.

•inurl:”CgiStart? Page=” •inurl:”viewerframe? For Example use this query inurl:”viewerframe? Wow, you can see a live cam on your PC screen!! Like this: Like Loading... How To Use Google Search Engine for Hacking. | Kanishk's Technical Blog. How to Watch Security Camera Streams on the Internet: 6 steps. Favorite This Article Edit Article Search Queries Edited by anthony eide, Josh H., Maluniu, Sondra C and 101 others Security cameras are everywhere, it seems, but what are they looking at?

If you have ever been curious about it, we will show you not only how to see through the eyes of Big Brother, but even how you can sometimes zoom, pan, tilt, capture, and save images right from your computer! Ad Steps 1Open up your web browser. 4Manipulate the camera. Search Queries 1The list is continuously evolving so if you find a query that doesn't work, edit this page and remove it from the list.inurl:/view.shtmlinurl:ViewerFrame?

Tips You can take a screenshot or use a screen recording program to record the video stream. Warnings This does not fall within most school or business guidelines for acceptable use of their computers. How to use Google for Hacking, how to hack security cameras, Hacking Personal and Confidential Documents ~ Dunya Infocom blog. Google serves almost 80 percent of all search queries on the Internet, proving itself as the most popular search engine. However Google makes it possible to reach not only the publicly available information resources, but also gives access to some of the most confidential information that should never have been revealed. In this post I will show how to use Google for exploiting security vulnerabilities within websites.

The following are some of the hacks that can be accomplished using Google 1. Hacking Security Cameras There exists many security cameras used for monitoring places like parking lots, college campus, road traffic etc. which can be hacked using Google so that you can view the images captured by those cameras in real time. All you have to do is use the following search query in Google. Click on any of the search results (Top 5 recommended) and you will gain access to the live camera which has full controls.

Intitle:”Live View / – AXIS” 2. Filetype:xls inurl:”email.xls” 3. . “? Popular Surveillance Cameras Open to Hackers, Researcher Says | Threat Level. In a world where security cameras are nearly as ubiquitous as light fixtures, someone is always watching you. But the watcher might not always be who you think it is. Three of the most popular brands of closed-circuit surveillance cameras are sold with remote internet access enabled by default, and with weak password security — a classic recipe for security failure that could allow hackers to remotely tap into the video feeds, according to new research.

The cameras, used by banks, retailers, hotels, hospitals and corporations, are often configured insecurely — thanks to these manufacturer default settings, according to researcher Justin Cacak, senior security engineer at Gotham Digital Science. As a result, he says, attackers can seize control of the systems to view live footage, archived footage or control the direction and zoom of cameras that are adjustable. “All the ones we found have remote access enabled by default,” Cacak says. “Not all the customers may be aware [of this]…. Internet protocol suite. The Internet protocol suite is the computer networking model and set of communications protocols used on the Internet and similar computer networks. It is commonly known as TCP/IP, because its most important protocols, the Transmission Control Protocol (TCP) and the Internet Protocol (IP), were the first networking protocols defined in this standard.

Often also called the Internet model, it was originally also known as the DoD model, because the development of the networking model was funded by DARPA, an agency of the United States Department of Defense. TCP/IP provides end-to-end connectivity specifying how data should be packetized, addressed, transmitted, routed and received at the destination. The TCP/IP model and related protocol models are maintained by the Internet Engineering Task Force (IETF). History[edit] Early research[edit] Diagram of the first internetworked connection Specification[edit] Adoption[edit] Key architectural principles[edit] Abstraction layers[edit] Link layer[edit] How to Spy on Your "Buddy's" Network Traffic: An Intro to Wireshark and the OSI Model. Wouldn't it be nice to just sit at your buddy's house, plug into his network, and see exactly what he's doing? What if it was as easy as that?

What makes packet sniffers like Wireshark such potent tools is that a majority of local area networks (LANs) are based on the shared Ethernet notion. In a shared Ethernet, you can think of all of the computers in a LAN as being plugged into the same wire, and all of the traffic that travels through it can be captured. Packet sniffers are more formally known as network analyzers and protocol analyzers.

But what traffic are we talking about? Everything. For example, assume that your network card picks up a packet from someone else's network. Now, this is an oversimplified version of what really goes on, but I'm trying to illustrate a point. Before we get into grabbing frames and causing mayhem for lulz, we need to explain what a packet is and the concept of a frame. The Open Source Interconnection (OSI) Model Layer 1: Physical Layer 2: Datalink $ .

Hacker Fundamentals: A Tale of Two Standards. Hacker Fundamentals: A Tale of Two Standards If you read my article on the OSI model, you got a good overview on communications from that model's perspective, but how does that relate to TCP/IP? We're going to take it a step further, getting into the idea behind the two address concept. How does an IP address and a MAC address work together? If you want to hijack sessions and all sorts of lulz like that, you need to understand these concepts. Let's get into it, mates! OSI, TCP and What's Going on Here? A good way to understand what a protocol is, would be to view it like a language. OSI was never meant to be just a model. Examples of addresses include: Hexadecimal - 12:34:56:78:9A:BC IPv4 (current standard) - 74.125.225.98 IPv6 (new format) - fe80::223:4eff:fec0:5b48 A Tale of Two Models OSI is still used today to describe network communication and for standards to unite, while the TCP model is used to show relation between the various protocols it contains.

Still with me? The TCP/IP Suite. What is the TCP Split-Handshake Attack and Does It Affect Me? | WatchGuard Security Center. If you’ve followed security news over the past few days, you’ve probably seen a lot of hoopla about a TCP split-handshake vulnerability that can affect firewalls and other networking and security devices. Many of the Media’s articles characterize this complicated TCP connection attack as, “a hacker exploit that lets an attacker trick a firewall and get into an internal network as a trusted IP connection” or as a “hole” in firewalls. I’m not sure that these descriptions properly characterize this vulnerability, and I suspect many administrators may not really understand how this attack works (let alone what it does and doesn’t allow an attacker to accomplish).

I hope to try and rectify that in this post. Before I jump into a description of this attack, WatchGuard XTM owners probably want to know if they are vulnerable to this attack. The answers is, No. Our XTM appliances do not allow TCP split-handshake connections. What is the TCP Split-Handshake Attack? OK. So in summary: Like this: Bitcoin - P2P digital currency. 8 Wireshark Filters Every Wiretapper Uses to Spy on Web Conversations and Surfing Habits. 8 Wireshark Filters Every Wiretapper Uses to Spy on Web Conversations and Surfing Habits In my Wireshark article, we talked a little bit about packet sniffing, but we focused more on the underlying protocols and models.

Now, I'd like to dive right back into Wireshark and start stealing packets. The filtering capabilities here are very comprehensive. You can filter on just about any field of any protocol, even down to the hex values in a data stream. Sometimes, the hardest part about setting a filter in Wireshark is remembering the syntax, so below are the top display filters that I use. All examples below are from a 10 minute period of packet capture on my lab network. What Is a Filter? When you first fire up Wireshark, it can be daunting. Moving into larger wireless networks, the sheer amount of broadcast traffic alone will slow you down and get in your way. Wait! The most visible and easy to use spot is right in front of you! Whoop there it is. Ip.addr ==x.x.x.x http or dns tcp.port==xxx ! Our Favorite Keyboard Shortcuts. A Hitchhiker's Guide to the Internet: Today and Now, How It All Connects.

A Hitchhiker's Guide to the Internet: Today and Now, How It All Connects In the first part of this series, we took a factual and technical look at the history of the Internet. I explained how all of these wires and servers got here in the first place. Obviously, a firm did not just create and build the Internet around 1995! Now that we know how the Internet came to be, we can get into the really fun stuff—what the Internet looks like now! Well, that's not quite the network design I was talking about, but it does show what the Internet looked like back in 2007 before the great Facebook/MySpace War of '09. However, none of this would be possible if we didn't have an overarching scheme to connect the hardware in a way to allow all communication to happen relatively seamlessly. Sending an email to your friend is simple enough. The View from the Top To start out, let's look at the Internet like a giant 3D blob of interconnected networks and nodes. Backbones: The Autobahn of the Internet.

A Hitchhiker's Guide to the Internet: A Brief History of How the Net Came to Be. A Hitchhiker's Guide to the Internet: A Brief History of How the Net Came to Be You walk over to your laptop, wiggle your mouse to wake up the screen, then fire up your browser to come visit Null Byte. Catching the article about Anonymous and how they presumably will not take down the Internet, you find yourself wondering... how would someone take down the Internet? Could they even do it?

The Internet is definitely a cool place, but a lot of people don't understand how it is all connected together. I don't mean how your laptop plugs into your router, but how entire networks like AT&T and Verizon interface with everything else to help make the seemingly effortless transfer of data possible. An understanding on the underlying design of the Internet gives you a MUCH better idea what is going on out there and how certain attacks will and will not work.

But first, where did this all come from? A Long Time Ago, In a Government Bunker Far, Far Away... The Raging '80s In Closing See Also. Technorati. The Lifehacker Tech Dictionary. 32-bit vs. 64-bit. Chrome tells me that's why it can't run Java 7 and I don't know why.

Bluetooth could be included and maybe how it differs from wireless (802.11). You included NAS, might as well include SAN and explain the difference. You mention Cloud Storage, what about Cloud Computing? MHz/GHz Bits, Bytes, and so on 32-bit, 64-bit Cache (Web, CPU, etc...) Ethernet 10/100 vs. 10/100/1000 (Gigabit) Cat 5, 5e, 6 Crossfire Northbridge Southbridge Web Hosting Compiler Runtime Java, .NET, Python, C#, VB .NET, ASP .NET, MVC, Ruby, Ruby on Rails (Other programming and scripting languages besides just PHP) Browser Exchange (You mention POP and IMAP, you should mention Exchange) Progressive Scan Interlaced Component Composite Hash (MD5 and SHA-1) Operating System Linux Windows Windows RT Bluetooth Latency DVD-R, DVD+R, DVD+RW (And Blu-Ray too) This is the stuff I could just think of off the top of my head.

Different kinds of cables/connectors? Never Miss A Word. 75 useful Keyboard Shortcuts for Evernote . Top 10 Pervasive Tech Myths That Are Only Wasting Your Time. Lifehacker: The Guide to Working Smarter, Faster, and Better - Chapter 6, Streamline Common Jobs. A Guide to Torrent Acronyms: How to Choose the Right Download for Your Damaged or Missing Media. Automate Just About Anything on Your Windows PC, No Coding Required. The Stupid Things You Do Online (and How to Fix Them) Tiny Satellite To Scrawl Morse Code Messages Across the Night Sky. Automate Everyday Tasks at Home, at Your Computer, and on Your Phone. Processing.org. BODYBUGG :: WELCOME. Top 10 Ways to Get the Most Out of Your Gear (Without Spending Extra Money) How We Predict Each Other's Choices. Destress Your Tech with a Delete Binge. Top 10 Warranty-Voiding Hacks. Feel, Act, Make sense • Sen.se.

Computerspielemuseum. Alchemy - Open Source AI. Nerd Nearby - Aggregating social media near you. Discover, Evaluate, and Shop with the Gadget Experts at Retrevo. TechSplurge | A Blog on Web 2.0 Apps and Softwares. MYO - The Gesture Control Armband. Atooma Automates Almost Anything In a Few Taps, Is Like IFTTT for Your Android Phone. How to Break Your Media Addiction and Clean Up Your Digital Clutter. Top 10 Simple Things Every Computer User Should Know How to Do. How to Run Mac OS X Inside Windows Using VirtualBox.