251 posts tagged with hacking.
Displaying 151 through 200 of 251. Subscribe:

DIY Biotech

Worried about the state of biodiversity? Why not make some of your own? Moore’s law is all over biotechnology right now. Can the hackers be far behind? MIT's Drew Endy doesn’t think so. Ready to get started? You might already have some of the tools that you will need. Plans for others are available on the web. All you need now are some parts.
posted by Kid Charlemagne on Feb 11, 2008 - 12 comments

24c3

The 24th Chaos Communication Congress, "the annual four-day conference organized by the Chaos Computer Club is taking place in Berlin right now. The Congress offers lectures and workshops on a multitude of topics and attracts a diverse audience of thousands of hackers, scientists, artists, and utopians from all around the world." Lectures are also being streamed live (Check the CCC Tube) [more inside]
posted by kolophon on Dec 27, 2007 - 4 comments

Make sure to clean your logfiles.

Ever admired those hard-working hackers, toiling away to get you the programs you've always loathed to have? Have you ever dreamt of exploring the innards of someone else's computer but have held back due to those pesky legalities? If you said yes to either of the above questions or just want to play an online hacking simulation, then SlaveHack is the website for you. [more inside]
posted by flatluigi on Dec 23, 2007 - 9 comments

Amazing discoveries in plain-text Tor exit traffic.

This is an ironic tale of the consequences of inept application of cryptographic tools. Or is it? Dan Egerstad, a Swedish hacker, gained access to hundreds of computer network accounts around the world, belonging to various embassies, corporations and other organizations. How did he do it? Very easily: by sniffing exit traffic on his Tor nodes. [more inside]
posted by Anything on Dec 4, 2007 - 27 comments

SPLed beans

"Finding JTAG on the iPhone": a ten-step hardware unlock of the iPhone, allowing it to function with other carriers
posted by Blazecock Pileon on Aug 23, 2007 - 40 comments

I'm in ur address book, callin ur peeps

How secure is your password? If you're like some people, it's probably not secure enough. When did you last change yours?
posted by chuckdarwin on Jun 13, 2007 - 66 comments

Introducing Jikto

Klaatu barada...Jikto? First there was Nikto. Then along came Wikto. Last Saturday at Shmoocon Billy Hoffman introduced the world to Jitko, a client-side vulnerability scanner that exploits your browser & turns your PC into a platform for finding holes in computers across the Internet (or behind your firewall). Reactions were mixed. Does Jikto go too far?
posted by scalefree on Mar 28, 2007 - 11 comments

Just watch the video, it's really neat.

The Wii Loop Machine. Via.
posted by solistrato on Mar 22, 2007 - 28 comments

Band of Developers

A hacker breaks into the forums of the guild Band of Brothers on the MMORPG Eve, where he discovers an Eve devolper, called t20, is not only a high-ranking member of the alliance, but has been feeding BoB expensive and rare in-game items. CCP, the company who runs EVE, denies any wrong doing, before it is revealed that CCP knew about t20's abuses for over six months. Players are not happy.
posted by Snyder on Feb 12, 2007 - 49 comments

333-333-333 We Present A SPECIAL PRESENTATION 333-333-333

333-333-333 YOU WILL SEE SUCH PRETTY THINGS (via) 333-333-333
posted by Rev. Syung Myung Me on Jan 22, 2007 - 50 comments

What Not To Do and How Not To Do It

Idiot Tries to Hire Hacker to Change his GPA
Why study when you can just hire a hacker to adjust your GPA to something more to your liking? Or not.
And now an amazing (and scary) amount of his personal information is pwned!
posted by fenriq on Dec 21, 2006 - 70 comments

MAKE's open source gift guide

There are a lot of gift guides for the holiday season, but Make Magazine's open source gift guide skews towards the cool, techy, but also hackable products. Lots of great things listed including: display images in your bike spokes with a POV kit, an open source media server, control your house lights with perl, and free planetarium software.
posted by mathowie on Nov 27, 2006 - 19 comments

Crime and Punishment, Online Style

Crime and Punishment, Online Style Long a bastion of metaverse fantasies, avatars competing for style, and commercial dreams, Second Life has become a phenomenon. Lately, though, things are going a bit awry. Hacking attempts have been common, with the latest shutting things down only a few days ago. To address this crime, the SL crew is looking into creating a virtual FBI. Dibs on the Scully avatar.
posted by PreacherTom on Nov 21, 2006 - 8 comments

Hacking Democracy

Hacking Democracy. A frightening and well-made full-length HBO documentary.
posted by Espoo2 on Nov 5, 2006 - 40 comments

Diebold hacking in the flesh

Ed Felten shows a hacked Diebold voting machine (youtubesday) in action, on Fox News of all places. Yeah, that Ed Felten.
posted by mathowie on Sep 19, 2006 - 72 comments

The (not so) Secret History of Hacking

The Secret History of Hacking [google video from a C4 documentary] is a fun romp through the exploits of Steve Wozniak, John Draper (a.k.a. Captain Crunch) and Kevin Mitnick. [via]
posted by MetaMonkey on Sep 1, 2006 - 13 comments

Limp Bizkit? Seriously?

Compromise any Windows XP machine (that you have physical access to) with one single line of code. Even if you're logged on as guest, this cmd line text will upgrade your account to root level on the fly, after which time you can do anything you wish to the machine, (even reformat the drive & install linux!). ACHTUNG: Link goes to video that, for inexplicable reasons, has Limp Bizkit for the soundtrack.
posted by jonson on Aug 1, 2006 - 44 comments

Web savvy

I am computer literate! I have 22 years in computer systems engineering and operation. Now, can you tell me how to remove "your software" that you acknowledge you provided free of charge? I consider this "hacking". I have no fear of the media, in fact I welcome this publicity.
posted by rxrfrx on Mar 25, 2006 - 176 comments

There's some sort of karmic justice here.

"To tell the truth ... I'm sorta surprised they haven't caught me yet," The Washington Post ran an interesting interview with a botmaster, a young man who made serveral thousands of dollars a month installing XXX spyware on machines that he controlled. He installed the software on the machines of people he did not know by hacking into them remotely. The lenghty article included a partial photo of the botmaster along with vauge descriptions of the small midwestern town where the man lives, and was published with the understanding that the man's identity would be kept secret. Someone should have told that to the person that manages photos at the Washington Post. An estute reader over at Slashdot was able to locate some extra information stored in the picture's metadata including the photographer and the location the picture was taken, Roland, Oklahoma, a town of less than 3000 people. Whoops.
posted by daHIFI on Feb 21, 2006 - 56 comments

Great Firewall of China

Smash and grab, the hi-tech way. Are the Chinese government responsible for recent sophisticated hacking attempts on such targets as the British parliament and the US Army's Aviation and Missile Command?
posted by Hartster on Jan 19, 2006 - 17 comments

Second Life turns in players to the FBI

Second Life CEO turns in players name to the FBI for disrupting one of his virtual parties. In the world of Second Life any player can create objects using the built in scripting language. Some players have created self replicating "bombs" or hand out embedded pornography. Instead of just banning users or limiting what can be done with the scripting language the CEO Philip Rosendale is simply turning over the names of players straight to the feds and expecting the FBI to prosecute players under existing anti-DoS laws. A case of the bruised ego of a self-important CEO or are virtual world 'hackers/pranksters' best treated like common criminals?
posted by skallas on Dec 15, 2005 - 67 comments

YA reason to love the DMCA

Judge: Stealing a password does not constitute hacking. David Egilman is a highly-regarded expert in occupational medicine; he was the plaintiff's witness in a recent $253-million verdict in Texas against Vioxx. After two opposing law firms stole a password to his private website containing confidential information for his clients and students, he sued them under the DMCA. He lost.
posted by docgonzo on Dec 14, 2005 - 50 comments

XSS Attacks

Cross Site Scripting (XSS) Filter Tests Are you in charge of a system that allows users to enter comments? Here's a huge list of techniques that may be used against you (or, "why you shouldn't use regex").
posted by null terminated on Dec 7, 2005 - 9 comments

'I'm only a little nerd'

In some ways, Gary McKinnon is indeed a complete idiot. Well, he is a likable and intelligent geeky man who did many, many idiotic things. What he is not, his friends and supporters reckon, is someone who deserves extradition and 70 years in an American jail.
posted by Grangousier on Jul 9, 2005 - 59 comments

Coffee any way you like it

Coffee hacking: See self-heating coffee cans and cold-brewed coffee. [via MAKE: blog, which is shaping up nicely]
posted by Lush on Jul 7, 2005 - 14 comments

InstantSOUP

InstantSOUP is good for the android's soul An open electronics hobbiest kit geared towards design students in non-engineering disciplines. It's built around a simple I/O board that can interface with your computer (MacOS, Windows or Linux) and, wiring a programming language. Wiring is in turn based around the nifty Processing programming language.
posted by substrate on Jun 16, 2005 - 9 comments

Harvard rejects

"Hacker" discovers backdoor to Harvard Business School admissions decisions.
Harvard rejects all applicants who used the "hack."
posted by trharlan on Mar 8, 2005 - 68 comments

caller id spoof service

Covert Call allows you to alter the caller id that is sent to the phone you are calling. It can operate just like a calling card, all for the price of a normal long distance call. Caller-ID spoofing for 5¢ a minute, for all your prankster/paranoid/social engineering needs.
posted by crunchland on Feb 10, 2005 - 12 comments

Hacker or Lynx user?

Boing Boing says he's a Lynx user, but British Telecom declared him a hacker and that's what the BBC is carrying. There's no way to tell who's right yet, but I'd say the Bloggers are betting on Lynx user. Anyone got an update?
posted by krisjohn on Jan 27, 2005 - 30 comments

hacking coke machines

Hacking Coke machines, courtesy YouCSD.com
posted by BuddhaInABucket on Jan 23, 2005 - 32 comments

Google falters? Can't be!

GMail not-so-safe Mail. So apparentley GMail has a major exploit that's been discovered by an Israeli hacker. "Using a hex-encoded XSS link, the victim's cookie file can be stolen by a hacker, who can later use it to identify himself to Gmail as the original owner of an email account, regardless of whether or not the password is subsequently changed." And so the fun with GMail begins..
posted by mrplab on Oct 29, 2004 - 9 comments

Fire GL Mod

Do you have an ATI Radeon video card? If so, Adrian's Rojak Pot has a story up that shows you how to convert your Radeon based video card into a Fire GL card, with no physical modification through a process which modifies the video BIOS. The difference primarily between a normal Radeon video card and a Fire GL card is (drum roll.....) $120+ dollars, and enhancements designed for CAD and rendering programs. (entire list of certified programs that take advantage of Fire GL are in this PDF, including Adobe Premier) Video BIOS images are available here. Of course, modding your video card is certainly nothing new, as hacking ones BIOS can be an easy (if not somewhat dangerous) way to get more power from your investment. (Note: Although you can save a bad flash, the process is somewhat difficult. Attempt mod at your own risk.)
posted by Keyser Soze on Jun 17, 2004 - 34 comments

Colonel Angus Chicken!

News 14 in North Carolina had an online system where people could post school closings, etc that would scroll on the screen. The postings all got reviewed before they went live, but after they’d been reviewed/approved, the system was open for the original poster to go back and change the copy, so you could essentially submit something benign, then go back and monkey with it. Screen shots of the results.
posted by jonson on Mar 9, 2004 - 44 comments

All Your Braille Are Belong To Us

Three Blind Phreaks, See How They Scam ... The Badirs pulled off Mamet-worthy phone cons, employing cell phones, Braille-display computers, ace code-writing skills, and an uncanny ability to impersonate anyone from corporate suits to sex-starved females. On the phone, the brothers morph into verbal 007s, intimidating men, seducing women, and wheedling classified information from steely-voiced security personnel [...] An intense cat-and-mouse game developed: the Badirs on one side, with fraud investigator David Osmo and prosecutor Doron Porat on the other [...] his car's GPS system and email were repeatedly hacked. "There was a message waiting for him with his password in it," says Ramy, sounding quite pleased. "After that, he changed his password every hour before giving up on email altogether and using a typewriter."
posted by Blue Stone on Jan 30, 2004 - 7 comments

Get bent...

"Circuit bending is the electronic art of the implementation of the creative audio short-circuit. This renegade path of electrons represents a catalytic force capable of exploding new experimental musical forms forward at a velocity previously unknown. Anyone at all can do it; no prior knowledge of electronics is needed." - Reed Ghazala. More proselytizing from Ghazala, and a LiveJournal for up-to-the-minute advice, feedback and opinions.
posted by jon_kill on Jan 28, 2004 - 20 comments

BOO-YAA!

Yes, that Lincoln Center. So we've briefly noted the clever hack by way of which game engines, in this case, Halo's, can be used to make movies. The best-known of these is the bleakly humorous Red vs. Blue - which, if it isn't exactly this generation's "M*A*S*H" or "Catch-22," rather manages to capture something of the futility of postmodern warfare. Still: is this an opus you'd have pegged to premiere at New York City's vaunted high-culture mecca?
posted by adamgreenfield on Dec 19, 2003 - 12 comments

Spam

Spam: This Time It's Personal. Andy Markley was really looking forward to a work-free Labor Day weekend far away from his computer. But he made the mistake of checking his inbox before he left for his planned holiday.
posted by lola on Sep 30, 2003 - 32 comments

This is real, folks.

How to hack an election 1.12: Diebold tries to silence incriminating evidence : Diebold, maker of proven-to-be hackable voting systems, plays global whack-a-mole, in effort to scare ISP's into taking down websites with incriminating material. They used the DCMA to shut down BlackBoxVoting.org.

But the incriminating data just keeps popping back up on the Net, and Gun-and-Voting rights activist Jim March calls the bluff and challenges Diebold “Diebold: You are cordially invited to bite me. Bring it on. Make my day.". March has created a legal strategy/toolkit for voting rights activists who want to fight Diebold, a company which has knowingly - for 10 years - sold security-compromised voting technology, and whose CEO, an aggressive Republican fundraiser, has said he is "he is "committed to helping Ohio deliver its electoral votes to the president next year." In internal memos published by Scoop, Diebold's officials admit that their voting records database is (and has been for a long time) hackable ( [anyone can] "access the GEMS Access database and alter the Audit log without entering a password" ) but that this isn't necessarily a problem because "It has a lot to do with perception. Of course everyone knows perception is reality." For background to this story, see my summary of Mefi posts on the Voting Fraud story, from this thread. Diebold's funky voting systems are in the process of being "Certified", in Maryland and elsewhere, by SAIC, a company convicted of major frauds within the last decade and which has extensive ties to the Bush Administration, the CIA, and which "proudly lists DARPA in its annual report as one of its prime clients.", and owns Network Solutions, Inc. SAIC has not, it seems, noticed the GEMS database story (see main link). If Diebold systems win certification, we can expect an awful lot of This sort of thing. Computer security expert Dr. Rebecca Mercuri has some pointed analysis on the subject.

You can join the effort to demand truly secure voting systems at VerifiedVoting.Org by David L. Dill, a Professor of Computer Science at Stanford University. Go team.
posted by troutfishing on Sep 28, 2003 - 35 comments

1 4|v| t3h 1337 h4X0r!!!

It's Friday, and you don't want to work. You want to practice your hacking skillz instead.
posted by Melinika on Sep 26, 2003 - 35 comments

Christopher Andrew Phillips, hacker?

Christopher Andrew Phillips, the University of Texas at Austin student accused of "hacking" the school's computer system, has turned himself in. But reading about his method makes me wonder if this really is hacking and/or illegal...
posted by Big_B on Mar 14, 2003 - 13 comments

It's Justice Time!

Know what time it is, Kidz? It's U.S. Department of Justice Time!

On today's show, we'll learn why Hacking is REAL BAD, and give you a chance to find out if you are a good cybercitizen. Next, we'll meet Axel, the talking drug dog, and his friends the Bomb Dog Bunch! Then, we'll check in on the ATF, for some cool science fair ideas.

And finally, just for you kids with crooks or international terrorists for parents, here's a nifty PDF coloring book (Native American version also available).
posted by eatitlive on Feb 25, 2003 - 11 comments

Sometime in the past hour, explodingdog.com (no, I'm not linking to it) got its front page hacked. Now I can understand the motives behind hacking as cyber-terrorism (.pdf file), or to promote your political or social agenda, and I can't say that I totally disagree with hacktivism as a sort of civil disobedience. I also understand hacking as a way to show off your skills. But off all the sites out there, why would some stereotypical punk kids (or whomever) pick a great site like explodingdog to hack? Where's the challenge? So many hackers say they're out to free the Internet - then why attack a site that give away so much for free?
posted by anastasiav on Sep 28, 2002 - 22 comments

The FBI on hacking vs. The Russians

The FBI on hacking vs. The Russians That is crazy! 100 hundred years for hacking computers when there are people that actually hurt other people - maliciously...rapists, murderers, US politicians... "If Russian hackers can be convicted on evidence obtained by the Americans through hacking, it means the U.S. secret services may use further illegal means of obtaining information in Russia and in other countries," an FSB spokesman told Interfax on Thursday. Not only that, but the seriously...can this sort of thing just slide by?
posted by Kodel on Aug 17, 2002 - 2 comments

You must hack.

You must hack. It's your duty as an American. Godspeed, dear patriots.
posted by conquistador on Jul 31, 2002 - 7 comments

Man hijacks al-Qaida Web site.

Man hijacks al-Qaida Web site. He offers it to the FBI to use for intelligence gathering, but the FBI stumbles around for a week trying to find somebody with the technical abilities to take advantage of the site. By then, the site's militant Islamic visitors had discovered the ruse. Go figure.
posted by TBoneMcCool on Jul 30, 2002 - 24 comments

Princeton admissions officers broke into Yale's admissions system

Princeton admissions officers broke into Yale's admissions system using prospective students' birth dates and Social Security numbers. They "viewed Yale admissions decisions" of 11 students; Princeton's dean of admissions says "[i]t was really an innocent way for us to check out the security." The FBI is "assessing the information to see if there is a federal violation."
posted by realityblurred on Jul 25, 2002 - 27 comments

Congress is about to consider an entertainment industry proposal that would authorize copyright holders to disable PCs used for illicit file trading. "The measure would permit copyright holders to perform nearly unchecked electronic hacking if they have a "reasonable basis" to believe that piracy is taking place."
posted by mathowie on Jul 23, 2002 - 40 comments

Here's a simple example of a potentially interesting art project. Fill a Usenet post with words specifically chosen to create art based on Google's search word highlighting. Not sure if it's art or spam, but I am waiting for the first ASCII artist to step up to the plate and do something complex like the Mona Lisa.
posted by willnot on Jul 21, 2002 - 10 comments

This is some scary stuff. Life in prison for malicious hacking? We can't keep rapists and murderers away from society for very long but now hackers & crackers could be jailed for life? And on top of that the FBI can monitor internet packets without a warrant? If you enjoy your freedom from gov't surveillance, it looks like it's time to start using PGP.
posted by mathowie on Jul 16, 2002 - 21 comments

Berman's P2P Hacking bill (mentioned last week) has caught the notice of a few people, and it's worth noting their suspicions. Cory from boingboing wonders why there needs to be a law for something that is on the surface, not illegal. Declan McCullagh's request for comments about the bill netted a handful of scary responses. Berman's clearly in Hollywood's pocket, but how far will he go to get his legislation passed? And what will happen once P2P hacking is legally permitted for big studios?
posted by mathowie on Jul 2, 2002 - 10 comments

Page: 1 2 3 4 5 6