Hacking and Security Articles
All your devices can be hacked
Could someone hack your pacemaker? At TEDxMidAtlantic, Avi Rubin explains how hackers are compromising cars, smartphones and medical devices, and warns us about the dangers of an increasingly hack-able world.
More videos can be found at ted.com... continue reading
About SQL Injections with MS SQL Server
About SQL Injections
There are many articles about SQLis but I’m writing this with the aim of a Windows server and MS SQL server specifically. Most of this can be applied to other environments too.
Let’s suppose that you’ve found an SQL injection vulnerability on a page that has a GE... continue reading
Hiding files inside an image
Steganography & encryption
Due to the way different file types are read it is possible to have a single file that acts differently depending on how it is read. For example images are read from the header down whereas ZIP files are read from the footer up.
All image files should work, but some are more unpredicta... continue reading
Understanding Source Code
Hey everyone and welcome to this article on understanding source code. First, let me start by explaining that this article will not teach you to hack anything specifically, but it will give you the understanding you need to start to learn to hack.
Okay, first let me tell you a little a... continue reading
Introduction to IRC
What is IRC
Internet Relay Chat (IRC) is a protocol for real-time Internet text messaging (chat) or synchronous conferencing. It is mainly designed for group communication in discussion forums, called channels, but also allows one-to-one communication via private message. It is also posible to trans... continue reading