No information is available for this file.
f517b7f4c3c798b41e96c7c8a2cafb4a12de16bd2957c72daa51e25a366c7d8b
No information is available for this file.
0e776fb3de6f478f00ffaadc59b434486306a7564981a9c91740415d0d16fbb4
No information is available for this file.
79a1117dd79e1daad4a5e2393462bce741a312ae90eb6f0400c7e2649667c5c8
No information is available for this file.
34a8570640fbd3251364b56c30f8116a4f0a7ea488ade8c590b23f947ea255c8
No information is available for this file.
ea1e6c0f29272ad612bb5e3eca9561149699a5e005f8953c6e32e85bd6eed9b3
No information is available for this file.
7611d4ffda2c9d5e7fb19305c7efdda711c490195c1c922505f690322cb7b7a8
No information is available for this file.
dd2c373b02c22ee1905e1ce97747b485c9f7cdce0b925a1f83d73e1c73bb3296
No information is available for this file.
fd7e7d77e28b6337ff6c9e2dd43b2af11b12347bc3050c2cff047a8531a0dc9e
No information is available for this file.
f8d069fe04b63099c2b6238237632857ced17f30e99e6ac286d90d0827b9885a
No information is available for this file.
85df97239ad5e620d87039d6e7bd529079054dae49dc9f644f60355c80eb8e6f
No information is available for this file.
5b535df2d1e711e60b30553a0032079d171d788d75c94f2f83e55b97c0fa70ff
No information is available for this file.
3049587e09ffb568fe70e10a338c0e0d3ad9eb179d03306418b049ce62b5053c
Hacking Linux Loadable Kernel Modules - The definitive guide to hacking Linux Loadable Kernel Modules for hackers, virus coders and system administrators. Covers the Basics, hacking modules for Fun & Profit, Solutions (for admins), Some Better Ideas (for hackers), and plenty of source code, including: LKM Infection by Stealthf0rk/SVAT, Heroin - the classic one by Runar Jensen, LKM Hider / Socket Backdoor by plaguez, LKM TTY hijacking by halflife, AFHRM - the monitor tool by Michal Zalewski, CHROOT module trick by FLoW/HISPAHACK, Kernel Memory Patching by ?, Module insertion without native support by Silvio Cesare.
cc8a876f7f19cf157816233c862049c0d5c731613c07744f186efa834b1c1a7f
"The Loginataka" - Eric Raymond gets a hat trick today with this dialogue that reveals how you too can progress from the status of "newbie" to "guru".
6d47628e45c9e83e662f26e0b3acb19bde794a84f49e55ea30ee7ff5b5ce3d4c
No information is available for this file.
b080db9606815f060fa9eef0186c7a954e67b5509605d2e0289349c0b9c058fd
No information is available for this file.
ee0c13c28a2aca2201868fc8d9f8b8e4d5619fa85954923f726f7d2c012664c9
"Cloning MAC Addresses" Whitepaper - "At one time or another, you may find it useful to have two machines with the same physical network address. This is how it is done." In .pdf format.
9c0e7d6f37aff0b9a0e08d9c78734ce15d8792444e1a09b2287e376c9bb4588c
"Cyborg Seeks Community" - This article is just too cool. Wearable computing and living in virtual "augmented" reality 24/7. Steve Mann is out there! First published in Technology Review
859ce8e6179be274d46e61d2ed2d0453b98c4902d41a06dbb5493fc3f0bf171d
No information is available for this file.
3b9a3223445902ea0d77e0bc0c662c6f0b6f8bb7c07c9895fd2ec86508c6417c
How To Break Out of Restricted Shells and Menus, v2.3 - An excellent whitepaper detailing methods for breaking out of virtually any kind of restricted shell or menu you might come across.
0360f346bef57652d779fb01c3362de641f401dfd13d44fbab3f2c7c778c40b3
The Bloatware Debate - Very interesting dissection and reverse-engineering of a Microsoft product, with relevant points to fuel "the bloatware debate". This is what real "hacking" is all about.
c95eb8e5b1e7b3e5814394bf4acdad8ea6d37ddeaf343524eddbb6be56da25e4
No information is available for this file.
208b74aa6d511f7d2960619ea9086f372777a6de3eeef0949c8da978c59d8d12
No information is available for this file.
2f1363ebe8a13c938d066177a425f7bb55b1987c8f3287d654c3c9faf139a086
No information is available for this file.
f9078f223b7f4074cf2fe690119f78973d08d9386fe98264a85c2cc5ae795a2d
No information is available for this file.
a7148f616d257fb046eb5ca3687291d6a9ac39572103788330ff797339c5ebf1