Yahoo! Messenger ywcvwr.dll ActiveX exploit (2 of 2).
98088f51e62097884c49e736e422c4f5c0b5058d8f57b05060594c5d3d493493
Yahoo! Messenger ywcvwr.dll ActiveX exploit (1 of 2).
443ffbbc2ba527081aae4f2f524d25918752f49cd588a0b12f3f27c535e19c49
Resolver.c finds DNS names of given IP addresses using gethostbyaddr. Tested on Linux.
f875eb7ab996896cb1465284dab1af31ee82e5c20a6c36ceb52d432cbf20155c
This is an article on wireless hacking which deals with WLAN's and Frames.
1c6b3556f9e4aad925ffe6ebc7b2655c5f8833ea9632d1c9c03cea6e5e216bfd
Wireless Scanning / Wardriving / Warchalking - A paper defining how an intruder would identify a suitable open network to launch their attack. It depicts what common methods are used and how to protect against such attacks.
20663ca82283ad1b02d1d80c6f0a723d921fa0e8b6172332e8bc51e0150081a6
Lastlog log editor.
602feed9a779a7106619a527ad02835fd6bddabf4eb46d84ef3a54902c3ff825
This tutorial was written to show Unix users how to create a simple Unix LogFile editor.
d4ad19517e0180b17fd80c7d62561eae9a764b3d79eb2c17e3b94b0d1d1dd2f5