Storm Botnet, which is made up of millions of PCs that have been taken over by hackers

Riffing on Yahoo's Supercomputing Deal

Wall Street Journal Blogs - New York,NY,USA
It's the Storm Botnet, which is made up of millions of PCs that have been taken over by hackers. The hackers can make these computers do whatever they want ...

Driving VMware
Redmondmag.com - CA,USA
Hackers figure out what sort of malware detection programs are running, and then disable them and go about their merry way of causing destruction. ...

Phishing is a form identity theft, whereby hackers pose as official companies

Be careful if you have Adwords

By Ivan
To all webmasters who have Google Adwords account(PPC). Rusty of Search Engine Roundtable reported phishing attacks coming through email to the Adword users:. Phishing is a form identity theft, whereby hackers pose as official companies ...
Search Engine Optimization and... - http://www.optimization.ca/Search-Engine-Marketing

Pakistani hackers

Analysis: Cyberattacks on Tibet groups

United Press International - USA
Hackers can take control of computers, or even whole servers, without the knowledge of their owners and use them to launch attacks. ...

NSA releases new version of Linux software
United Press International - USA
Like two years ago, last week's rage in Pakistan over reprints of cartoons and a forthcoming Dutch film that insult Islam's holy book once again entangles ...

Shaykh Yusuf al-Qaradawi: Portrait of a Leading Islamist Cleric

Shaykh Yusuf al-Qaradawi: Portrait of a Leading Islamist Cleric

Global Politician - Brooklyn,NY,USA
The Muslim Brothers turned the Tur detention camp, where they were being
held, into "a mosque for prayer, a university for learning, a society for
...
<http://globalpolitician.com/24328-islam>

ModChip

Modchip - Yaosm 3.0 Final

By Shorty
Jap.. Die FINAL ist endlich erschienen.. Ich haebe heute ingesammt 2 verbaut und der Test lief gut. Mit Gamecube und Wii spielen. Ich benutze generell nur PIC12F629 Quickstart 1. Reprogram chip with new hex. ...
Wiihack.de - http://wiihack.de/

Microsoft accuses Lick modchip-store-Sang
By admin
Since the first modchips appeared for the Xbox, was the waiting on the first large lawsuit. Until now closed Microsoft its legal muscle ball marriage has not let see. On self strangely see competitor Sony very fiercely acts against this ...
Microweb News - http://www.microweb.biz

Modchip - Wiikey Update auf dem Weg!
By Fabi
Forum member OzModChips has brought to light the first solid information about the new Wiikey update that is currently in the hands of resellers. The new firmware update called 1.9X and config disc 1.4, allows the original Smash Bros. ...
Wiihack.de - http://wiihack.de/




you press #90 or #09 they can access your 'SIM

Mobile Scheme

By Stanley David Yhuanje Shaiongu Jr(Stanley David Yhuanje Shaiongu Jr)
There is a fraud company using a device that once you press #90 or #09 they can access your 'SIM' card and make calls at your expense. Forward this message to as many friends as you can, to stop it. This information has been confirmed ...
What Stanley David Yhuanje Shaiongu... - http://pngsdavid.blogspot.com/

Juniper Networks Extends High-Performance Steel-Belted Radius ...
By info@juniper.net (juniper)
... as well as legacy technologies such as EAP-SIM for backward compatibility--on a single, unified platform. With its mobile IP key derivation and management functionality, the SBR Carrier AAA Server will also have the intelligence to ...
Juniper Networks RSS Feed - http://rss.juniper.net/rsrc/link

Oh my god - I need a mobile flash player
By admin
I've just read about all South Park videos released for free online watching at http://www.southparkstudios.com/clips/. That's terrific. Now I really need something to watch it on my Treo. My 15€ prepaid SIM card which I use for online ...
L\'Haut-Parleur - http://metaviewsoft.de/wordpress

Google Hacks

Over The Air: 48 hours of mobile development

Mobile Messaging - Boston,MA,USA
... by Nokia and Google, amongst others, Over The Air will be playing host to around 450 attendees across 48 hours of hands-on hacking and code-campery! ...


Can I get Vista's fonts for free on XP...Legally?
By Karl L. Gechlik(Karl L. Gechlik)
The guys over at Ghacks are awesome and obviously not just for Google hacks check out this gem... Today boys and girls we are going to learn how to get Vista's Clear Type fonts for FREE! Just like AtA likes it! ...
Ask The Admin - http://www.asktheadmin.com/

Everyone else is doing it, part whatever
By Pj Perez(Pj Perez)
or check out these Google Hacks. Note the pattern here: most of these states I have not "visited" so much as "driven through," either via Ryder truck or Greyhound bus. Hence the migratory, central block. Also, I ignore that the South ...
No Way Out - http://pjperez.livejournal.com/

Display tags in Google Search using Google Bookmarks
By maheshexp
I just tried to search How is my post on GMail hacks part1 & part 2 doing in the Google Search Engine. And I found an interesting stuff around the search result of my post. Google Search had listed tags. I wondered how it could index ...
My Mind Leaks - http://mymindleaks.com

Google Hacks 1.6
By admin
Google Hacks 1.6. (more…) Related posts. Zend Studio 5.5.1 (0); YoutubeGet 4.3 (0); Yahoo! Messenger Vista (0); Xara Menu Maker v1.1 (0); WYSIWYG Web Builder v5.0.3 (0)
Unlimited File Sharing - http://www.storecm.com

Over The Air: 48 hours of mobile development - Mobile Messaging
Over The Air: 48 hours of mobile development Mobile Messaging, MA - 16 minutes ago … by Nokia and Google, amongst others, Over The Air will be playing host to around 450 attendees across 48 hours of hands-on hacking and code-campery! ...
Hackersgate - Google Hacks - http://www.hackersgate.com/google-hacks

Protect computers through hacking

Learning to protect computers through hacking

San Francisco Chronicle - CA, USA
"Look at what (students) are able to do with Google in just a couple hours," said Andrew Whitaker, another instructor. "Now imagine a bunch of experts. ...
See all stories on this topic


The GOOGLE Code University, where anybody can be a student
By yolynne
The GOOGLE Code University, where anybody can be a student Living it up to its motto of&nbsp; "Do no Evil" , Google certainly is doing a magnificent work in its way of contributing to the society. Their CSR (Company's Social Response) ...
Heeding to God's Call in IT - http://yolynne.wordpress.com

Google Summer of Code: accepting student applications now
By bdelacretaz
See the timeline, now is the time for students to talk to us (mentors) and to prepare and submit applications. See the ASF's list of ideas (where you can find three ideas about Sling) or the list of participating organizations for more ...
bertrand's brain grep - http://grep.codeconsult.ch

Google Summer of Code 2008 - Student looking for Python Zope ZODB ...
Hi there: I would love to see if there is anyone looking for a student to mentor to do some hacking in fields such as Python Zope ZODB Grok etc., d.
Zope | Users - http://www.gossamer-threads.com/lists/zope/users/

Google Summer of Code 2008
By Robin Muilwijk
Google Summer of Code offers students a great opportunity to learn and contribute to Open Source projects. During my time as a Core member at the Joomla! project I've seen student projects end up being added to the Joomla! code base. ...
Spilling the Beans on Open Source - http://robink.nl


Hotspot Surfers Beware Sharks Patrol

WiFi Hotspot Surfers Beware: Sharks Patrol These Waters

TechNewsWorld - Sherman Oaks,CA,USA
Laptop users have become accustomed to the ability to connect to the
Internet from practically anywhere to reach e-mail, Web sites and music
download ...
<http://www.technewsworld.com/story/62283.html>
See all stories on this topic:
<http://news.google.com/news?hl=en&ncl=http://www.technewsworld.com/story/62283.html>


Encrypt your Windows Mobile smartphone and its memory cards

Remote support for Symbian smartphones

LetsGoMobile (press release) - Amsterdam,Gelderland,Netherlands
LogMeIn Rescue+Mobile is easy for both the technician and the device owner
to use Technicians can simultaneously support smartphones and computers
from a ...
<http://www.letsgomobile.org/en/3054/symbian-smartphones-support/>


SecuBox for Smartphone - save 30%

Mobile Gadget News - USA
Encrypt your Windows Mobile smartphone and its memory cards. Protect your
sensitive data with the strongest AES 256-bit encryption. ...
<http://www.mobilegadgetnews.com/index.php?showtopic=14857>

Self-Distribution

Selfdistribution, Withoutabox

Selfdistribution, Withoutabox. Rightsholders, you don't need to get
permission from the big studios anymore. Withoutabox is opening
channels to
support ...
<http://www.withoutabox.com/index.php?cmd=selfdistribution.index>


Spying on your Girlfriend

10 Ways to Use Skydeck (Like Spying on your Girlfriend)

Mashable - Los Angeles,CA,USA
... connected to your plaxo account, then you've got a rock solid way of updating a slew of contact information, directly from your mobile phone activity. ...
See all stories on this topic


10 Ways to Use Skydeck (Like Spying on your Girlfriend)
By Kristen Nicole
Skydeck offers the ability to export some of your data to an existing address book, so if that address book is in turn connected to your plaxo account, then you've got a rock solid way of updating a slew of contact information, ...
Geek Madness - http://geekmadness.net


'

Registered by fingerprint for total security. Here's the specs

Bicycle Rim Antenna

By Alan Parekh
"Several months ago I was walking home from the post office, nearing my place I saw it was "clean-up week", the curb dotted with various piles of junk people had put out to be disposed off by the council pickup. ...
<http://hackedgadgets.com/2008/03/26/bicycle-rim-antenna/>
Hacked Gadgets - DIY Tech Blog
<http://hackedgadgets.com>

USB Fingerprint Security Optical Mouse
By Fatgadget
Simple to use and up to ten fingerprint templates can be stored so the whole office can be registered by fingerprint for total security. Here's the specs. Mouse Sensor Sensitivity: 800DPI; Finger Sensor Sensitivity: 508DPI ...
<http://www.geeky-gadgets.com/?p=1272>
Geeky-Gadgets
<http://www.geeky-gadgets.com>

free mobile sim

Pssst - Want an unlocked phone?

International Herald Tribune - France
Unlock, hack, crack - the terms are numerous, the result is the same: a mobile phone that will work with any SIM card on any carrier's GSM network in any ...

The Cost Of A New LCD Screen Than A New Phone

By drivingdirections383
The author Antony Dayani writes for cheap sim free phones pathphones http://www.phatphones.com. This is a mobile phone website with emphasis on mobile phone repairs and phone parts, amongst other phone accessories. ...
driving directions - http://clarkcountygroup.com/drivingdirections383

hackers are blamed as potentially why the site went down


Sorry, Politics.ie is closed for maintanence… oops… I'm sure they ...
By WorldbyStorm
Meanwhile according to a slightly less than even tempered discussion on Indymedia http://www.indymedia.ie/article/86559 'hackers' are blamed as potentially why the site went down. I find that a bit unlikely, but then, who knows? ...
The Cedar Lounge Revolution - http://cedarlounge.wordpress.com


iPhone's upgrade has been hacked already



5. iPhone's upgrade has been hacked already
Comment | Forward to a friend

According to a report in Wired, the iPhone Dev Team, a group of hackers intent on unlocking the iPhone, have already unlocked the beta version of the iPhone 2.0 software upgrade that was due to launch this summer. An emulator version of the OS was embedded in the iPhone SDK released last week, but the team got a hold of the actual firmware, according to reports. The most recent hack will allow users to run any software and will reportedly keep phones unlocked despite future software updates from Apple.

For more on the latest hack:
- read this article from Wired


Three unshaven 21 year-old hackers


Investing in undervalued human capital: the Y Combinator model
By Michael Nielsen
Given a choice between investing that money in a 35-year old Harvard MBA's startup, and a team of three unshaven 21 year-old hackers, most venture partners will go for the Harvard MBA. Part of YC's insight is that in 2008 many ...
<http://michaelnielsen.org/blog/?p=341>

wild wild west for hackers when it came to the new BBC iPlayer


No More iPhone and iPod Touch Fun: BBC iPlayer Hack Neutralized By ...
Portable Planet - London,England,UK
It was the wild wild west for hackers when it came to the new BBC iPlayer
for iphone and iTouch until recently. The player's DRM software had been
in place ...
<http://www.portableplanet.co.uk/2008/03/13/no-more-iphone-and-ipod-touch-fun-bbc-iplayer-hack-neutralized-by-patch/>

hackers successfully attack the websites of Indian telecom regulator Trai

Official websites under attack

Economic Times - Gurgaon,Haryana,India
The last few months have seen hackers successfully attack the websites of telecom regulator Trai, Indian Railways, department of telecom, Air Cargo Customs, .

One Laptop Per Child will Produce many new hackers

OLPC runs Processing and Arduino

By Jonah Brucker-Cohen
Here's a cool port of Arduino and Processing software running on the famed One Laptop Per Child (OLPC). This will no doubt enable lots of new hackers to emerge from the laptop's growing user base. OLPC runs Processing and Arduino - Link ...
<http://blog.makezine.com/archive/2008/03/olpc_runs_processing_and.html?CMP=OTC-0D6B48984890>

hackers had targeted branches of the NBP operating in the industrial areas of Punjab


NBP suspends inter-bank ATM service after fraud
Pakistan Dawn - Karachi,Pakistan
The sources said the hackers had targeted branches of the NBP operating in the industrial areas of Punjab because ATMs of these branches are normally filled ..

researchers still weren't quite sure how the hackers were attacking the pages

Top 10: Spitzer falls, Bebo goes to AOL, Gates to DC

InfoWorld - San Francisco,CA,USA
By week's end, researchers still weren't quite sure how the hackers were
attacking the pages, but said they all seemed to use Microsoft's ASP
(Active Server ...
<http://www.infoworld.com/article/08/03/14/Top-10-Spitzer-falls-Bebo-goes-to-AOL-Gates-to-DC_1.html>

Hacker News Roundup


Matthias Ettrich: Linux Desktops

EFYTimes (press release) - New Delhi,India
It may sound unbelievable, but back then, many hackers thought something like Windows 95 could never be matched with Free Software. How wrong they were! ...
See all stories on this topic

Cyber laws and network security
Merinews - New Delhi,India
Hackers are exploiting security weaknesses exposed by the public's exploding use of the worldwide Internet for personal and business applications. ...
See all stories on this topic

Electronic records considered public in Oregon
kgw.com (subscription) - Portland,OR,USA
... storage — what kind of format, how to control access, outdated hardware and software, incompatible systems and the always lurking threat of hackers. ...

DATABANKS IS PROVED INADEQUATE by HACKERS


SECURITY IN CORPORATE DATABANKS IS PROVED INADEQUATE, BUT HACKERS ...
By Jack E. Dunning(Jack E. Dunning)
93 percent of the respondents were seriously concerned over their company's protection of data and network security. A large majority of IT professionals do seem to rate the safety of their databanks as a high priority, many indicating ...
<http://thedunningletter.blogspot.com/2008/03/security-in-corporate-databanks-is.html>


Indian hacking group called 'Indian Snakes'

IT: a profile of young star Yash Kadakia

Hindustan Times - India
By then, he had also come across an Indian hacking group called 'Indian Snakes' and befriended one of their members, who asked him to learn computer ...
See all stories on this topic

Apple had been left alone by hackers

Apple's Icarus Effect

BusinessWeek - USA
Anyone with a mild sense of history is keeping track. The main reason Apple had been left alone by hackers was not by virtue of any superior security ...
See all stories on this topic


Make Your Phone Untappable

How To Make Your Phone Untappable

Forbes - NY,USA
With VoIP, anyone can wiretap us: the Russian mafia, foreign governments, hackers, disgruntled former employees. Anyone. Historically, there's been an ...
See all stories on this topic



What according to you is the behavior of hackers?

IronPort's next-gen proxy

Express Computers - Bombay,India
What according to you is the behavior of hackers? How have they commercialized the scenario? The single point goes towards criminals who employ hackers and ...
See all stories on this topic

Hackers have managed to find a way to redirect surfers to rogue websites


McAfee slams Google 'abuse'
Web User - London,UK
Hackers have managed to find a way to redirect surfers to rogue websites that try to install malware on their PC using URLs that appear to come from Google, ...
See all stories on this topic


Computer on a Ring

World's Smallest Diamond Ring is For Computing, Not Your Fiancée

Gizmodo.com - USA
It might look kinda grey and boring, but the tiny ring in that image is a
world-beater: it measures just five microns across, and is only 300
nanometers ...
<http://gizmodo.com/368437/worlds-smallest-diamond-ring-is-for-computing-not-your-fiance>

Stolen Laptops are everywhere

Holes grow in Net safety

Rocky Mountain News - Denver,CO,USA
"The numbers of lost and stolen laptops are just staggering," he said.
"Thieves are not stupid. They are looking for these things. ...
<http://www.rockymountainnews.com/news/2008/mar/17/holes-grow-in-net-safety/>

Security labs Powered by Websense

Websense First to Discover and Protect Against New Microsoft Excel ...

CNNMoney.com - USA
Through its world-class team of researchers around the world, the Websense Security Labs gather threat intelligence with Websense ThreatSeeker threat ...



Chinese Hackers Flare up Americans

Cyber Tensions Flare Amongst US, Chinese Military

DailyTech - Chicago,IL,USA
Several of the hackers claimed knowledge of friends in the Chinese
underground hacking community who launched successful assaults on the
Pentagon. ...
<http://www.dailytech.com/Cyber+Tensions+Flare+Amongst+US+Chinese+Military/article11045.htm>


Indian hackers Rip through site after site

Hackers rip through government websites
domain-B - Khandala,Maharashtra,India
Hackers have cut through a number of government websites during the period January 2005 to February 2008, including one belonging to a defence related pay ...
See all stories on this topic

Knock Kock Packet Capture in process

Knock, Knock...Who's there? Port Knock!

NetworkWorld.com - Southborough,MA,USA
Furthermore, to prevent hackers from obtaining the knock sequence, through
packet capture and analysis, it can be frequently changed with pseudo
random ...
<http://www.networkworld.com/community/node/25907>
See all stories on this topic:
<http://news.google.com/news?hl=en&ncl=http://www.networkworld.com/community/node/25907>


Troubleshooting the Altiris Manageability Toolkit for vPro ...
By joelsmith
Modes 4 and 5 in 'Hello' Packet Mode disabled - This is common if the system is not immediately hooked up to the production network. All systems will fall into this state if they transmit the 'hello' packet for 24 hours. ...
<http://communities.intel.com/openport/blogs/proexpert/2008/03/11/troubleshooting-the-altiris-manageability-toolkit-for-vpro-technology-part-1-provisioning-client-systems>


Idea using FreeRadius with Timesten
By HunterX(HunterX)
Sending Access-Request of id 17 to 127.0.0.1 port 1812 User-Name = "easyuser" User-Password = "easypass" NAS-IP-Address = 192.168.1.10 NAS-Port = 1 rad_recv: Access-Accept packet from host 127.0.0.1 port 1812, id=17, length=20 ...
<http://surachart.blogspot.com/2008/03/idea-using-freeradius-with-timesten.html>
Surachart Opun
<http://surachart.blogspot.com/>

Packet Capture with Cisco PIX / ASA
By clamasters
and don't forget to delete your access list unless you want to use it later. This example was very basic but you could get pretty granular with the access list rules to only pickup the data that you absolutely need to troubleshoot an ...
<http://www.curtis-lamasters.com/index.php/2008/03/11/packet-capture-with-cisco-pix-asa/>


Chinese Women that have been hacked search Ask for how to tell their husbands

Chinese hackers: No site is safe They operate from a

By MP-Webmaster
In a dramatic about-face, Ask.com is abandoning its effort to outshine Internet search leader Google Inc. and will instead focus on a narrower market consisting of married women looking for help managing their lives. ...
Mietophoum Headlines - http://mietophoum.com/mpnews

Patch on Top of Patch from Microsoft

Microsoft patches a dozen bugs in Office

Computerworld - Framingham,MA,USA
The increase might have been caused by other hackers joining the fray, he
said. "Once an exploit is being used, it only takes time before someone
captures ...
<http://www.computerworld.com/action/article.do?command=viewArticleBasic&taxonomyName=windows&articleId=9067882&taxonomyId=125&intsrc=kc_top>

Google Android Hackers get ready

Open Networks, Open Platforms Seen As Mobile Industry's Future

InformationWeek - Manhasset,NY,USA
Google's Android operating system and VoIP applications like Skype will be major contributors, a panel of communications experts predicts. ...
See all stories on this topic

Google: Model citizen of community development?
CNET Blogs - Cupertino,CA,USA
It helps when Google launches a new platform, such as Android, because its communities will be the source of a great number of hackers who will enjoy ...
See all stories on this topic


IIJ to Add New Security Features to IIJ Secure Remote Access

IIJ to Add New Security Features to IIJ Secure Remote Access

CNNMoney.com (press release) - USA
IIJ Secure Remote Access enables customers to remotely access mail server
and other corporate servers inside the corporate firewall. ...
<http://money.cnn.com/news/newsfeeds/articles/primenewswire/137961.htm>
See all stories on this topic:
<http://news.google.com/news?hl=en&ncl=http://money.cnn.com/news/newsfeeds/articles/primenewswire/137961.htm>


WhiteHat Security: WhiteHat Security and F5 Team to Battle Attacks ...

WhiteHat Security: WhiteHat Security and F5 Team to Battle Attacks ...

Trading Markets (press release) - Los Angeles,CA,USA
F5's ASM provides proactive network and application-layer protection from
generalised and targeted attacks by understanding the user interaction with
the ...
<http://www.tradingmarkets.com/.site/news/Stock%20News/1183254/>

Hack it by connecting a Linux-based computer to a Firewire port

Microsoft Opened Up Virtualization For Vista Under Court Pressure

By Robin Wauters
HyperSpace embeds a Linux-based hypervisor in the computer's BIOS that allows the computer to run open-source software without booting Windows. A little more than two months after Phoenix filed its complaint, Microsoft gave in. ...
<http://virtualization.com/news/2008/03/11/microsoft-opened-up-virtualization-for-vista-under-court-pressure/>


Hack into a Windows PC without using password
By ppv
To use the tool, hackers must connect a Linux-based computer to a Firewire port on the target machine. The machine is then tricked into allowing the attacking computer to have read and write access to its memory. ...
<http://pinoypureview.wordpress.com/2008/03/11/hack-into-a-windows-pc-without-using-password/>
Pinoy PuReView
<http://pinoypureview.wordpress.com>


Scanner that Looks right through you

Latest information Security News Roundup

Do NOT pay L$ to upload slideshows... here's how...



Serendipity led to this discovery today... it might be a change in the way QuickTime works (as suggested by Eloise) or something else. It is *not* dependent on the very cool new Candidate viewer.
 
*Disclaimer:* if this idea has been around a while and I'm just out to lunch on the timing of sending it along, my apologies.

Ok... the FreeView script allows one to edit a "Bookmarks" card, onto which one could list in any number of (.mov) URLs and then scroll through them with the video controller.
 
As you know, the capability to scroll JPG's already exists (partly) in any of the low cost/highly useful whiteboards created by Eloise or AngryBeth. Dedric Mauriac has a scripted "web browser" that does it as well, which is nice as it's easy to set up and displays the URL as hovertext.
 
BUT... the added step (and cost) has been that one must take screen shot, then upload to SL at a cost of L$10 each. For one of my famous 112 slide presentations, it'd cost $L1,112 to upload (US $4.21), and a great deal of time wasted waiting for them.
 
Now, however, FreeView/QT seems to do this with JPG images as well. This means we can do this with NO uploads whatsoever (provided you have rights to change the media texture for a given parcel):

1) Save all slides in PowerPoint as JPG images (a nice folder is created on your computer with all the images in it). PPT does this all at once or slide by slide.

2) Upload those images to a web directory (ex: http://www.host.com/slides/)

3) If you want, use Excel's concatenate function to create a list of all slide locations (ex. Slide1 to Slide112). The syntax example is:
Slide1|http://www.host.com/slides/Slide1
 
*Note... I don't have '.JPG' at the tail end, but it doesn't matter.

4) Copy this list from Excel and paste onto the Bookmark card in the FreeView flatscreen tv object.
 
Example...
 
Slide 1 Title|http://www.host.com/slides/Slide1
Slide 2 Title|http://www.host.com/slides/Slide2
Slide 3 Title|http://www.host.com/slides/Slide3
 
* note the PIPE SYMBOL between the title and the URL (shift + backslash)

5) Using the video controller dialog box for the FreeView screen, one can scroll back & forth through bookmarks (slides). This allows you to view the "slide show" at NO cost!!
 
It's a bit slower than the other options because the UI for FreeView is a bit clunky... but it's free! The other very cool thing I've noticed is that the media texture on the screen does not seem to be slow to rez as I've seen other textures on prim.

The potential drawbacks:

a) On group owned land, the FreeView TV is set to group, so anyone (in the group) can scroll and change the screen. This is great if you have stand-alone tutorial slides, and not so great if you don't want people mucking about with your presentation as you give it. It's moot point if you own the land... and no others can view the controller. It's also a non-issue if the group is very small.

b) it does require your audience to know enough to set their preferences to automatically place media content. With noobs, this can take a bit to set up. At ISTE and other events, I've seen tutorial cards around that help with this.

This, I'm sure, represents a decrease in revenue for LL (shhh) - but it's great for those who have students who want to show off reports or pictures or whatever, but do not have scads of L$ lying about to upload.

I've tested the above on group land at the ICT Library on Info Island and it works perfectly.. it's on the rooftop garden.
 
 
You do *not* need the new candidate browser to make it work, but you will need to be in the ICT Wunderkind, Ltd. group (free to join) to use the controls. Leave the group when you're finished experimenting.

Good luck!!

- Ross

Some firms attempt to Research Exploits before Hackers do

Exploit research: Keeping tabs on the hacker underground

Search Security - Australia
Every day, exploits for between one and a dozen or more vulnerabilities are
published on Milw0rm, which freely distributes the code. ...
<http://searchsecurity.techtarget.com.au/tips/tip.asp?DocID=1300927>

Hackers use intiative instead of permanent roof on their head

The Homeless Hacker v. The New York Times

Wired News - USA
Because he has friends in those cities, Lamo could usually count on finding
a place to sleep that was both more secure and more pleasant than his usual
home ...
<http://www.wired.com/wired/archive/12.04/hacker.html>

Think Twice before you jokingly request in hacker prescence real or virtual

Maroon, the Ultra High Level Programming Language

By Matt
I joked on Hacker News that some Indian firm would claim to be able to
build it for $1200. I woke up this morning to two bids for $1000. So I
guess the problem now is what do I do? I mean, with this program I
could clearly take over the ...
<http://mattmaroon.com/?p=337>
Matt's Homepage
<http://mattmaroon.com>


Make that Eee PC really Speed up

Hacker ups Eee to 1.2GHz

bit-tech.net - UK
This bus speed is used by the new chip too, meaning that the 1.2GHz
processor used in the mod actually runs at 840MHz. It is, however, possible
to use a ...
<http://www.bit-tech.net/news/2008/02/27/hacker_ups_eee_to_1_2ghz/1>

EVGA 780i Chipset Cooling Mod
By Chris123NT
This does not hinder the cooling performance whatsoever, and this
proves that this product DOES fit on the 780i MCP (it does NOT fit on
the northbridge because of the second NF200 chip). So now that this is
mounted, how do we get the ...
<http://chris123nt.com/2008/02/27/evga-780i-chipset-cooling-mod/>
Chris123NT's Blog
<http://chris123nt.com>


The Wiimote has again proven to be a great resource for the creative hacker!

Wii Remote Window Curtain Control

By Alan Parekh
The Wiimote has again proven to be a great resource for the creative
hacker! If you are lucky enough to have some motorized blinds you might
want to have a look at this Wii Remote Window Curtain Control project.
Video after the jump. ...
<http://hackedgadgets.com/2008/02/29/wii-remote-window-curtain-control/>
Hacked Gadgets - DIY Tech Blog
<http://hackedgadgets.com>

The PreWeb Internet Hacker Stories

The No-Tech Hacker

Forbes - NY,USA
Surfing the pre-Web Internet, he browsed bulletin boards looking for
pirated copies of video games. To pay for the growing long distance bills
from his ...
<http://www.forbes.com/technology/2008/02/28/long-hacker-csc-tech-security-cx_ag_0229hacker.html>

Cool News plus Google Hacks


DragonFly BSD 1.12.0

tweakers.net - Amersfoort,Netherlands
Related libc_r hacks have been removed. Ownership check added when dumping core (security fix). Fix a possible weakness in the random number generator. ...
See all stories on this topic


Howto: Hack a web server using a Google Search
By Veign(Veign)
This kind of "Google hacking" is already well known: a hacker using the pseudonym Johnny has already published quite a collection of these "Google Hacks" or "Google Dorks" on his web site ihackstuff. What cDc has done is create an ...
Unhandled Perception - http://www.veign.com/blog/

Mine Fire in Centralia discussion
Forum: File Comments Posted By: SpiderX22 Post Time: 02-29-2008 at 11:16 PM.
Google Earth Hacks Forums - http://www.gearthhacks.com/forums

Friday Google Reader Data Dump (2)
By Münzenberg(subadei)
Wikinomics has a post on colloborative speed trap finding through mobile phones and Google maps. Whilst some are exploiting mobile phones, others are blowing the crap out of their networks. Via Mind Hacks is Psyblogs series on the "7 ...
Soob - http://soobdujour.blogspot.com/

No Tech Hacker

The No-Tech Hacker

Forbes - NY,USA
From there, CSC began to experiment with the physical security hacks it now uses today, and Long began developing a set of techniques he calls "Google ...
See all stories on this topic


Rene, the German wifi hacker hanging in Trivandrum

Freed.in and Delhi

By mikel
Freed.in is one of the core open source conferences in India. And after
a month riding the open source circuit, Freed was a mini-reunion of our
trip. Again we saw Rene, the German wifi hacker hanging in Trivandrum,
Nagarjuna from the ...
<http://brainoff.com/weblog/2008/03/01/1318>
Brain Off
<http://brainoff.com/weblog>

Open Source Show and Tell

I recently brought up the idea of having an open source get-together to let you, the hackers, run the show and talk about your projects. The small audience I brought it up to seemed enthusiastic for a meeting that would be less linden-centric.


I'd like to have a once-a-month get together for a show and tell about your projects. Hopefully this could be an outlet if you have a viewer project you want to show off, a non-SL open source project you want to show to an SLdev audience, or otherwise have some variety of judicious hack to show off. Whatever. I'm aiming for the vibe of a hacker meetup, except once a month and for only an hour or so. The real question is, what are you doing with open source?

Any suggestions?

So far I've heard:
* have it every week like an office hour
* make it once a quarter for half a day
* have a slot signup on the wiki
* have a freeform discussion / hangout

It's pretty open right now.

I'm leaning towards once a month with some kind of stage / front-of-the-classroom, and a place to chill and hack together. If you're someone with a project to show off, I *really* want to hear what *you* would like.

+ poppy
_

Google is said to be a hacker’s favorite weapon

How to Find 100000+ Web Proxies and the State of Internet Censorship

By chhapi
Google is said to be a hacker's favorite weapon. It is no different in this case. By using Boolean searches you can find TONS of new web-based proxies. Googlebot updates its list daily and it is constantly expanding. ...
Latest Games,Movies,Warez,Tricks - http://chhapi.wordpress.com


rks'

peer 2 peer on your iphone

iPhone's First Native P2P Torrent App is Up and Running

Gizmodo.com - USA
Core, an iPhone Hacker with mad hacking skills, has managed to port to the iPhone a functioning P2P client based on Transmission, which is a popular torrent ...



Warcraft WSG Hacks Exploit

Warcraft Flying Mounts WoW Hacks Cracks

WoW Hack Getting into Tram Aquarium

WoW Account Hack


joah wenn mann mal langeweile hat und noch die richtige menge alkohol im blut hat kann sowas passieren xD

How to Hack A World of Warcraft Account

HACKS and TRICKS in GOOGLE!


Go to google and search the following:

- Search music, vids software and everything else in google:
"intitle:index of" following by the name of the file (include the " in the search) eg. "intitle:index of" Fort Minor mp3

- Access LIVE Network Cameras:
inurl:"viewerframe?mode=refresh" (include the " in the search)

- Access network Printers and Print:
intext:"UAA (MSB)" Lexmark -ext:pdf

- Access more LIVE instant Network Cameras:
inurl:/view/index.shtml

Other things to search google, then click 'im feeling lucky'

google christmas
google elgoog(click the 3rd link)
google spanish
google chinese
google gothic
google 3d warehouse
google tm
google search
google black
google loco
google easter egg
google japanese
google yahoo

Easily HACK a combination LOCK


Some locks are harder to crack open than others. One of mine only worked once so if this happens to you try different cans. Also try moving the aluminum around and experiment with the size of the rectangle you cut out.

In this episode you will learn how to HACK a combination lock and you DON'T need any tools or knowledge about picking locks. It is easy, fun and something to show your friends.

I am NOT responsible for anything that happens, DO NOT use this to steal anything or open a lock which is not yours or you don't have permission to open. This is ONLY used for opening your OWN lock, if you have forgotten the code or just showing your friends.

HACKING a bike LOCK in 30 SECS!


how to HACK a bike lock in under 30 seconds. You DON'T need any tools or knowledge about picking locks. It is easy, fun and something to show your friends.

I am NOT responsible for anything that happens, DO NOT use this to steal any bikes! This is ONLY used for opening your OWN lock, if you have forgotten the code or just showing your friends.

Thanks for watching, Please rate and comment. Also please SUBSCRIBE So you know when the next episode is out, and when any of my other video tutorials, or entertaining videos are out.

How to Hack Any Garage Door



Version with more info on our website! http://www.householdhacker.com

Update: We know this is cause for much concern. Please note we have left some aspects out of the video for the protection of the people, such as how to specifically target a garage door. Our demonstration is a proof of concept of what could be done if not properly protected by a rolling encryption coded garage door opener. This is the most secure form of garage door opening technology and very difficult to crack without an extremely powerful computer.

Disclaimer: This and other videos produced by Household Hacker are controlled experiments performed by professionals and unless you are an expert should NOT be attempted at home if you don't know what you are doing!

Wii NES Emulator Mod

Wii controller and nunchuk hack.


I hacked my wii's controller and nunchuk. Gave them lights

Playing MP3 On Your Wii

Wii Hacks:Create Special Miis via Bluetooth


There is a function of the Mii Channel called Special Miis. This was intended for Nintendo to release special "celebrity" Miis that could not be copied, but only transferred to friends' consoles or controllers. However, using a Bluetooth adapter and a PC, you can make your own Special Miis, even make your own Mii special!

Wii Target Gift Card "Hack"


Played around with my gift card and made it flash to music and stuff.

Wii Hack exposed!!!!


Show that the best way to play import GC games on the wii is to get an import!!!

Wii Browser Shop "Hack"


This method uses nph-proxy (Perl). most code from official wii shop and php proxy version.

Console Hacking 2006 - Wii

Hacktivismo at the Chaos Communication Congress 2006


Cult of the Dead Cow in Berlin! The Hacktivismo presentation at the Chaos Communication Congress 2006, featuring MiB (Hacktivismo), Devolish (NSF) and elliot pank (NSF).

In The Realm Of The Hackers; Oz hacking scene late 80's


Part 2

Part 3

Part 4

Part 5

Part 6

Cyber Bullies & Hackers

Hackers Part seven

Eno7, Ayyıldız Team, Turkish Hackers, Cyber-Protest

Hackers III The Fall Down

What are Hackers?


White hat, gray hat, black hat: no, we're not talking about hat styles, but hackers. What are they, how do they differ, and are all of them super-evil?

Anonymous on FOX11

DOCUMENTAL: HACKERS: DEFCON


LA CONFERENCIA HACKER MAS GRANDE DEL MUNDO.

True Confessions of Hackers



This is a true documentary that took place at Def Con 9 in Las Vegas, 2001.

The people interviewed in this documentary used their ... all » computer hacker handles and did not reveal their true identities. They have volunteered to answer questions about the computer underground and the problems facing the entire computer industry.

first episode of the Net Cafe series



This is the very first episode of the Net Cafe series. It was shot on location at a cybercafe in San Francisco called CoffeeNet. It looks at the hacker culture and their influence on the early growth of the internet. Guests include Dan Farmer, author of SATAN and COPS; Elias Levi (aka Aleph 1), webmaster of underground.org and Bugtraq; also "Reid Fleming" and "White Knight" from Cult of the Dead Cow. Originally broadcast in 1996.

Hackers the Movie



A young boy is arrested by the US Secret Service for writing a computer virus and is banned from using a computer until his 18th birthday. Years later, he and his new-found friends discover a plot to unleash a dangerous computer virus, but they must use their computer skills to find the evidence while being pursued by the Secret Service and the evil computer genius behind the virus.