Basic Hacking Tools
What's My IP: 3.214.184.124
Too often it seems so called experts on FOX and other infotainment network outlets stereotype hackers and sensationalize hacking, so my goal with this part of my site is to put the risks into prospective and show people a few simple tricks of the trade. First off a hacker is someone who plays with technology for enjoyment but the term has become synonymous with cracker, a person that performs an illegal act. So ya ask should ya be are worried about crackers? Well Id say if you use windows ya have a greater chance of being a target. To find out how secure or unsecure you are, perform an internet connection security analysis (of commonly probed ports). If ya want a computer without spyware and virus (or virii, as some would prefer) BS common with windows and just plain works get a Mac and hack proof it! BTW if ya have a question then read my Hacking FAQ's else try the graffiti wall to post a question or share a comment about stuff like hacking WiFi. PS if ya want to know the big secret of hacking, its RTFM! IP Calculator takes an IP address and netmask and calculates the resulting broadcast, network, Cisco wildcard mask, and host range. PHP Subnet Calculator - to install, just move PHP Subnet Calculator SubnetCalc.php into the webroot of a php capable webserver.
At Toorcon 2003 (Information Security Conference) a talk was given on utilities people in the know seem to find most useful. So FYI here a rough list of the top 20 hacking tools. FYI insecure.org has a list of top 75 Security Tools.
Internet Storm Center Status by DShield.org is an attempt to collect data about cracker activity from all over the internet. The data is cataloged and summarized, which enables trends to be discovered. The site also postes a Survival Time, which is the average time between attacks on various networks. HackerWatch - World Internet Traffic Map lets you report and share information that helps identify, combat, and prevent the spread of Internet threats and unwanted network traffic. Akamai monitors global Internet conditions around the clock. With this real-time data it is possible to identify the global regions with the greatest attack traffic, cities with the slowest Web connections (latency), and geographic areas with the most Web traffic (traffic density). A Proxy is an application that breaks the connection between sender and receiver, thus protecting your internet privacy (to some degree) while you are surfing. Enjoy the proxy gateway list(1) and list(2). If youre curious, try Test Page for Web Anonymzing Services to test the various proxies yourself. Note as of 11/19/2001 those suffering from corporate oppression and Muslims in Saudi Arabia, UAE, etc. looking for porn better have alternative plans, because Safeweb turns off free service. The University of Toronto's Internet Censorship Explorer permits anyone with a Web browser to test the limits of certain national and organizational Internet-blocking schemes. Users simply enter a target URL and a country into a search field on the Censorship Explorer's website. The software then scans the ports of available servers in that country, looking for open ones. If youre interested in anonymous surfing (i.e. the phaster proxy gateway), and wondering is someone watching your every move, then you may also know eMail is not private (it is like sending a postcard that leaves a trail). So here is a list of free eMail services, some of which include a measure of security. B.T.W. if you have any browser privacy issues, I have Netscape Navigator secrets and tips on how to secure Internet Explorer (concepts presented here apply to all browsers). Phaster computer security resources search includes: exploits/bugs, internet security tools, guides to ethical hacking, encryption, network security documentation, hacks, cracks, phreaking stuff, etc. Serials 2000 and serials & keys are clearinghouses of serial numbers for thousands of commercial and shareware programs that allows a user to check out disabled features of demo programs and reinstall software you may have misplaced the keys for like Windows 98, Windows ME, etc. Cyxla has gathered together a nice default password database of all mayor hardware and software manufacturers such as 3com, Celplex,Cajun ,Cisco, Lotus Domino, Shiva, Cisco, Avaya, microsoft, meridian, shiva, siemens. If youre a hacker or just curious, ya might want to check out CyberLaw an educational service focusing on legal issues concerning computer technology. CyberLex reports legal developments touching the computer industry and is distributed monthly throughout the United States. The Cyberlaw Encyclopedia is a large nexus on legal matters pertaining to cyberspace. Buzz words like Hacker are used by the media, politicians, corporations and government agencies for so called (dis)information warfare (IW). B.T.W. looking for info on: anthrax, Bin Laden, Bush, etc?
Many factors such as: your modem speed, phone line quality (unless you are connecting with an ISDN line or a cable modem), computer hardware (processor speed, cache, etc.), and web traffic jams affect how fast you connect to the internet and how fast web pages load on your computer. The following links will test your internet connection speed.
WiFi is an open-standard technology that enables wireless connectivity between laptops and local area networks and until reciently, wireless local area networks have been just another grass roots hobbyist technology. FYI a WiFi protocol analyzer can help you plan and secure your network even if you don't use WiFi... Since this Hacked page seems to have international appeal, try these computer-based translation systems (it might be good for a laugh or two).
Since you have read this far, do ya think terrorism will end when rm -fr /bin/laden/? You can use the graffiti wall to post your own opinion on that question or use it to share your own bytes of hacking knowledge with others. |
News & Weather | Search Engines | Stock Quotes | Chat & eMail | Travel Info Phone Directory & Road Maps | Encyclopedia | Hacking Tools | Shopping | Add URL | Home |