Wikipedia’s definition of SOPA

The Stop Online Piracy Act (SOPA), also known as H.R. 3261, is a bill that was introduced in the United States House of Representatives on October 26, 2011, by Representative Lamar Smith (R-TX) and a bipartisan group of 12 initial co-sponsors. The bill expands the ability of U.S. law enforcement and copyright holders to fight online trafficking in copyrighted intellectual […]

Jan 18th, Internet Blackout

So, nothing better to wake up in the middle of the night and see some major sites are taking action to try to get widespread interest in understanding and protesting against SOPA. Basically so far, Reddit has confirmed that it will be shutting down for 12hours and the only thing […]

Trojan Horses and RATs

Trojan Horse and RATs So you want to know what’s all this talk about Horsies and disgusting Rats in the computer world, well it’s very simple and is a vital piece of 90% of Black Hat Hackers. Now in defense of myself and reputation, I’ll also say that while its […]

Connections (Direct vs Reverse)

Connections So as we know now, Hackers would give you a program that is secretly hiding their RAT, and can control your computer from afar without you even knowing it. The question now though remains “How do they actually connect?” In the simplest way possible, you must understand that a […]

Crypting || Bypass AntiViruses

So, now you’re this Black Hat hacker, running around with your RAT spreading on the internet acting like some Facebook program, but you notice you have one issue. You chose a popular RAT, your Trojan Horse method was so thought out that even the Greeks would have been impressed, but […]

What is a Hacker

What is a Hacker What is a Hacker? What do they do? What composes of their magical wizardry on a computer? These are all common questions people new to computers have when they first are introduced. It doesn’t take very long of being on the internet to hear about a […]

Tools of a Hacker

Tools of a Hacker While I like to believe that I know a pretty decent amount about hacking, enough to make a collaboration website to discuss computer security, I will not claim that I know everything. My work will more or less lean towards a Black Hat’s toolbox and skillset […]

What is a Phreaker

Phreakers Phreakers are, in the simplest way to break it down, “phone freaks” people who when they hack they “hack” telecommunication systems. It could be argued that the historical beginning of the average day hacker stemmed from the work of Phreakers, since at the time anything that was networked happened […]

Social Engineering

Social Engineering What is it?Have you even hear about it? Have you been exposed to it? Whether you like it or not, you know exactly what this is, you know all about this, and not only have you been exposed to this, you’ve even participated in this. Social Engineering is […]

QueryLoader2 for WP

In learning WordPress Plugins, I decided to take on the task of trying to convert QueryLoader2 into a WordPress Plugin for the ease of just Installing and Go. QueryLoader2 was created to preload images with a nice Loading Bar instead of the overplayed Spinning Image or “Loading” text. Approval has been granted […]