Post here about Cameras on the streets tracking who we meet, to piss tests, sattlelite gps tracking, echelon, carnivore, TIA, DARPA etc...
Site Admin
Posts: 7781


Post#1 » Fri May 13, 2005 2:11 pm

These were the most advanced hacking documents I could find. They assume a minimum level of competency, such as having read Bruce Schneiers book on cryptography, and a working knowledge of assembly language and Unix programming.

Hacking is seductive to the young Christian warrior, because it seems to promise quick fixes. However, it is not only useless for God's purposes, it is counterproductive. By all means, learn about it. You need to know what it is capable of, and what its limits are. Use your knowledge to protect yourself and others. Rely on God, not yourself.

1. The Hacker's Manifesto, by The Mentor. Peer into the mind of a hacker. Do you really want to be one?

2. Chaffing and Winnowing: Confidentiality without Encryption, by Ronald L. Rivest, co-inventor of RSA encryption.

3. Attacking FreeBSD with Kernel Modules - The System Call Approach, by pragmatic/THC.

4. Description of Integer Overflow, by Paul Starzetz, from a posting to BUGTRAQ.

5. The Internet Auditing Project, by Liraz Siri, in which a small team probes every IP address on the internet, describes a breathtakingly sophisticated and advanced break-in perpetrated on them, then describes their ultra-secure internet bunker.

6. Complete Linux Loadable Kernel Modules - the definitive guide for hackers, virus coders and system administrators, by pragmatic/THC.

7. Hacker Crackdown: Law and Disorder on the Electronic Frontier, by Bruce Sterling.

8. How to write Buffer Overflows, by Mudge (L0pht).

9. In the Beginning was the Command Line, by Neal Stephenson. A well written and highly entertaining introduction to engineering philosophy for non-technical and technical people alike.

10. An Introduction To Executing Arbitrary Code via Stack Overflows, by QuantumG.

11. A Method of Free Speech on the Internet: Random Pads, by David A. Madore.

12. Prime Number Hide-and-Seek: How the RSA Cipher Works, author unknown.

13. Programming with Libpcap: a PCAP Tutorial, by Tim Carstens. Learn how to write your own custom packet sniffer!

14. "Reply-To" Munging Considered Harmful. An Earnest Plea to Mailing List Administrators, by Chip Rosenthal.

15. Runtime Kernel Kmem Patching, by Silvio Cesare. Everyone says this is hard, or impossible, or impractical. Silvio shows that hotpatching a running kernel is doable, and shows you how.

16. Solaris Loadable Kernel Modules - Attacking Solaris with loadable kernel modules, by Plasmoid/THC.

17. Smashing The Stack For Fun And Profit, by Aleph One, from Phrack Volume 7, Issue 49.

18. Underground, by Suelette Dreyfus and Julian Assange. True tales of hacker exploits, and detailed look at the parts of hacker culture most rarely seen.

19. Writing Internet Worms For Fun And Profit, by Michal Zalewski, describing the construction of the ultimate worm.


1. Apex AD-1500 ISO images, suitable for use with the UNIX cdrecord program. The regionfree ISO will make your Apex AD-1500 DVD Region Free, allowing it to play any DVD ever made. It will also disable Macrovision, and is RCE Immune. The restore ISO will restore the AD-1500 to it's original firmware, in case you need to ship the unit back for warrantee work.

2. bot.c is a fully general IRC bot that is extremely simple to customize. It does all the necessary RFC compliant parsing of the IRC protocol; you can then insert your own functions to make the bot behave however you want.

3. diary lets you type in a diary entry, then converts it to HTML and generates an archive of all diary entries, and a "top list" of the most recent entries. Very configurable and easy to use, written in shell and C.

4. HOWTO Migrate to a New Hard Drive describes how you can duplicate your current system exactly on another harddrive, without having to deal with upgrades, reinstalls, repartitionings, and finding ones original installation disks.

5. HOWTO Setup Anonymous CVS Over SSH describes a slightly different approach than the OpenBSD method for providing anonymous cvs services to users with ssh.

6. HOWTO Secure A MOO With SSH describes how to provide encrypted access to a MOO, or any other sort of text based chat server like IRC, MUD, MUCK, or MUSH. This defeats packet sniffers that might spy on your chat connection.

7. moo.el is a pimp tight MOO/MUD/MUCK/MUSH client with many zoomy features not found in other clients. It harnesses the power of emacs and lisp, of course.

8. Ogg Vorbis Comment Field Recommendations specifies what tags are recommended for use in ogg files, and describes their usage. Also discusses requirements software must meet to be Standard Compliant.

9. population.c simulates population growth or decline based on a few details that you fill in, such as fertility, initial size, and average life span of the population. It is possible to model the outcome of a wide range of birth control policies with this program. One can learn a lot about population growth by running this program with the Adam and Eve, Middle Ages, Colonial America, and modern China scenarios.

10. pwdgen.c was originally written in PL/I for the Multics operating system in 1968. It generates secure passwords that are very English-like and pronounceable.

11. HOWTO Configure Ratpoison documents how I configured the ratpoison window manager for X to be very comfortable to use.

12. HOWTO Get Help on IRC, a simple set of rules that will maximize your chances of getting good help and Linux support on IRC.

13. rot13.c
and mirror.c
are two simple ciphers popular on the Internet. Both have the property that if you use them to alter some text twice, you get the original text back. matrix.c
will produce the original text if you apply it 4 times. It can interact with rot13 and mirror, but I leave it as an exercise for the reader how to recover text put through the matrix in conjunction with mirror and rot13.

Site Admin
Posts: 7781

An iPod is an iPod is an iPod -- until you hack it

Post#2 » Tue Feb 14, 2006 12:54 am

http://www.boston.com/business/personal ... o_a_friend

An iPod is an iPod is an iPod -- until you hack it
Modifications for everything from browsers to cellphones
By Hiawatha Bray, Globe Staff | February 13, 2006

We are all hackers now. At least, we can be.

Americans have built our lives on a foundation of silicon and
software, with computers in millions of homes and digital music
players in millions of shirt pockets. They're our gadgets. Why
shouldn't we hack them?

Before the word ''hacker" was applied to sleazy computer vandals,
it had a far more honorable meaning among engineers and computer
jockeys. A hacker was someone who'd mastered the powers and
abilities of a technology, and used that knowledge to make it do
amazing things.

Few of us can become master hackers, but anyone can acquire some
measure of hacking skill.

Rael Dornfest, chief technology officer of computer book
publisher O'Reilly Media Inc., said that it's mainly a question
of attitude. ''The difference between a hacker and a civilian is
a civilian sits in front of his TiVo" digital video recorder and
says, 'Gee, I wish I could do that,' " Dornfest said. ''A hacker
says, 'Hey, I've got an hour and some spare time. What the hell.'
Dornfest edits the Hacks series, a popular line of books that
show how to unleash the hidden potential contained in software
like Microsoft Corp.'s Windows XP and hardware like the iPod.
Readers can also learn to hack popular websites like Google and

Many of the hacks have a fairly high geek quotient, requiring
skill with a soldering iron or a knowledge of programming
languages. But about one-third of each book features hacking tips
that can be applied by anyone with a little spare time.
''The idea is to teach them a different way of thinking that's
prevalent among the geek or hacker community," Dornfest said.
We've collected a few of our favorite tricks from the Hacks books
and other sources. They're all perfectly legal, and more than a
little cool.

Note: Most of the Web addresses listed below were too long to
retype into a web browser, so we ran them through tinyurl.com, a
service that creates short Web addresses to replace long ones.
Windows XP hacks

Make it talk
The Windows XP operating system has a built-in speech engine that
can read the contents of a browser window. It's a handy feature
for people with vision problems, or web surfers with eyestrain.
And it's easy to activate. Nearly all Windows computer keyboards
have a key with a window emblem. Press this key and the letter U
to fire up the speech system. You'll also get access to a
magnifier program that makes it easier to read small type.

A fresh start
Tired of waiting for Windows XP to launch a lot of little utility
programs every time you boot up? There's an easy way to skip all
that. Click Start, then Run, and type the command msconfig. Up
pops the System Configuration Utility. Click the Startup tab.
There you'll see the programs that will start up when you boot
up. You can tell the computer to skip any or all of them, thus
making the occasional reboot a little quicker.
iPod hacks

A new look
Maybe you'd like to install a new graphic background on your iPod
screen or put in more attractive text fonts. It's easily done
with a free program called iPodWizard, available for downloading
at ipodwizard.net. Install the software on a Windows PC (there's
no Mac version), plug in your iPod and get creative.

You've got mail
You can't send e-mail from an iPod, but you can download your
mail to it and read your messages on the subway. Windows users
can download a free program called K-Pod that'll collect your
mail and transfer them to the iPod; PodMail does the same thing
on Macintosh computers. K-Pod is available at http://www.tinyurl.com/88doz
while PodMail is at http://www.tinyurl.com/9dnh9

Tuning in
If your favorite Internet radio shows aren't available as
downloadable podcasts, perhaps you can create your own. With a
Macintosh program called Radio Recorder or a Windows program
called Streamripper, you can capture many Internet radio streams
and record them onto the hard drive as MP3 files. Then just
download them to the iPod and enjoy. Both programs are free. Find
Streamripper at streamripper.sourceforge.net; Radio Recorder is
at http://www.tinyurl.com/a4stw

Macintosh hacks

Recalled to life
Even when it's switched off, a Mac is a pretty smart machine.
Smart enough, in fact, to start itself at a preset time every
day. All you need is a free program called ResurrXtion, available
at http://www.tinyurl.com/bofnu
Let Mac do it

Some computing jobs require you to do the same tedious task over
and over. Newer versions of the Mac OS X operating system include
Automator, a feature that lets the user create little computer
programs that perform a series of repetitive tasks, like resizing
a bunch of digital photos or renaming dozens of files. You don't
have to be a programmer to use Automator; you just choose from a
set of preprogrammed actions, drag them into the desired order,
press the start button, and stand back.

Browser hacks
Power grab
Your Internet browser is more versatile than you realize. It can
automatically display the latest weather and news headlines,
protect your privacy, and even identify the best online shopping
bargains. It's just a matter of adding special programs, many of
them free, which add these new features to standard browsers.
Microsoft lists enhancements for its Internet Explorer browser at
http://www.tinyurl.com/6v8k5 Firefox add-ons are available at

Keeping tabs
One of the coolest features of the Firefox browser are ''tabbed"
screens that let you open multiple Web pages in a single window.
This lets you visit a new website without losing your current
page. And there's a handy gimmick to make tabs even easier. Use
the center scroll wheel of your mouse to click links, instead of
the left mouse button, and the link opens in a new tab.
Yahoo hacks

Cutting it short
Good writers rarely use exclamation points -- unless they're
searching for something on Yahoo. Their Open Shortcuts feature
lets you go directly to a favorite Internet resource by typing an
exclamation point, followed by a word. Say you want to search for
power tools on eBay. Just type ''!ebay power tools" and you'll be
dumped directly into eBay's collection of miter saws and nail
guns. Yahoo's created a bunch of these Open Shortcuts, and users
can create their own. To find out more, go to http://www.tinyurl.com/amwk3
Digital widgets

Users of Apple's Macintosh computers like to boast about
Dashboard, a clever feature that lets them run ''widgets," handy
little pop-up programs that display news headlines, the weather,
or a calculator. Yahoo offers free software that'll run equally
appealing widgets on Windows PCs. Just download Yahoo's Widget
Engine, and then choose from hundreds of handy little programs.
Interested? Go to http://www.tinyurl.com/bbwgs

Share your web
Want to take your Internet bookmarks with you, no matter what
computer you're using? Sign up for Yahoo's My Web service. You'll
get a custom Web page where you can post links to all your
favorite sites. In addition, users can share their links with
each other.

Sony PSP hacks

Wireless Web
Maybe you just bought the Sony PSP for playing videogames; maybe
you bought it to watch movies. But with its built-in WiFi
wireless networking system, you can also use it to surf the Web,
whenever you're in an area with wireless access. All you need is
a good browser. Newer versions of the PSP include browser
software. If you've got an older model, go to a wireless access
point and run the Network Update feature. The PSP will download
all the latest upgrades, including your new browser.

Data dump
Who needs one of those keychain-sized thumb drives when you've
got a PSP? Plug in a USB adapter cord, and you can connect the
device to any desktop computer. Then you can copy information
onto the flash memory card that comes with the PSP. Each unit has
a measly 32 megabyte memory card, but you can upgrade to a 1
gigabyte card -- the same capacity as the new iPod nano -- for
about $60. And Sony plans to introduce 4- and 8-gig cards later
this year.

Secret brew
You don't have to go to the software store to find PSP games.
People have cobbled together a bunch of free ''homebrew" titles
available over the Internet. If you'd like to sample a few,
you'll need special homebrew software from the PSP, available for
the downloading at http://www.tinyurl.com/7vh2e

Cellphone hacks Free ring tones
The music industry is making millions from sales of phone ring
tones. But you may not have to pay for music you already own.
Instead, go to Mobile17, an Internet service that lets you submit
your own iTunes or MP3 songs. Mobile17 will automatically
compress the music into a ring tone that'll work on most wireless
phones. And it's free. You'll find Mobile17 at http://www.tinyurl.com/da2hd

You've got mail
If you've got an account on Google's Gmail service, you can have
your messages routed to your cellphone as SMS text messages. Just
have the messages forwarded using an SMS e-mail address. Gmail
provides a list of these addresses for the major wireless phone
providers. Punch the address into the forwarding window, and
Gmail will route the mail to your phone. Remember -- SMS stands
for Short Message Service. Longer e-mails will get cut short.

Sorry -- can't hear you
Want to hang up on the other fellow, but can't bear to be rude?
TV comedians make hissing sounds or pretend they're driving into
a tunnel. The less talented among us can use CallCheater, a $10
software program that works only on Nokia phones, alas. A trial
version of the software can be had at http://www.tinyurl.com/cg23m At the
touch of a button, CallCheater will generate all manner of phony
phone sounds, including auto traffic or jets taking off. What's
that you say? Huh? You're breaking up . . .
Hiawatha Bray can be reached at bray@globe.com.

Who is online

Users browsing this forum: No registered users and 1 guest