Hacks/Cracks

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Hacks/Cracks News

The Cheese worm: A welcome helper?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Dubbed the Cheese worm, the program is basically a self-spreading patch. It enters servers that have already have been compromised by a previous bit of malicious code--the 3-month-old 1i0n worm--and closes the back door behind it, adding security to . . .

Geeks get their hack together

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Guerrilla geeks of the world unite! Whether it's Vietnamese student techies taking on the state, South Koreans trying to rewrite Japanese history, antiglobalization protesters pinching presidential credit cards or the latest Web wars between American and Chinese zealots, hackers are getting . . .

Linux is a soft touch for hackers

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Poor configuration of Linux servers by inexperienced administrators is making the open source operating system a far easier target for hackers than Windows 2000. Windows is generally regarded as less secure than Linux but Chris Klaus, founder and chief technology officer at Internet Security Systems (ISS), warns that the open source system is increasingly being targeted.. . .

Hacker group launches anti-MPAA Web site

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Responding to the movie industry's efforts to ban controversial DVD-cracking software, a group called the South Bend Hacker's Club has launched a Web site that offers free downloads of the encryption-breaking code. The site, located at , includes vitriolic criticisms of the Motion Picture Association of America (MPAA) and allows visitors to download as many as 20 variants of the DVD-cracking software. "I would definitely consider computer code as an art, and art is definitely protected by the First Amendment," site operator Keith Kimmel said. Kimmel's company, Synergy Global Networks, oversees the South Bend Hacker's Club and owns the fuckmpaa.com Internet address. The link for this article located at ComputerUser is no longer available.  

Hackers for hire

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

One such hazard is the ever-mushrooming market in "hackers for hire". In essence these are the IT equivalent of the Dogs of War, mercenaries with IT skills. Internet adverts for these are growing and the 'services' that they offer are wide ranging enough to cause every security manager to loose sleep.. . .

The mixture of hacker and activist is a myth

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Hacktivism is a bastardization of the words hack and activism. In truth, it's neither. Rather, it has become a cheapjack pseudo-politically hip moniker for the activities of apolitical teenage miscreants devoid of talent, creativity and passion. The recent blast of media . . .

Hackers v. Hollywood, the Sequel

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Music industry lawyers plan to tell a federal appeals court that a DVD-descrambling program is primarily useful to hackers and should be outlawed. On Tuesday, the Second Circuit Court of Appeals will hear oral arguments in this high-profile lawsuit, which has . . .

Rebels with a cause

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Cryptography is one of many topics covered at the annual network security conference known as Rubi Con, where hackers - yes, those kids who try to break through security into computer systems - and security professionals give presentations, and learn from . . .

Cyberwar with China: Self-fulfilling Prophecy

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A recent Wired News article warns the cyber-going public of an impending "week-long all-out crack attack on American websites and networks" by Chinese hackers during the first week of May. The logic? May 1st is "May Day" celebrated in China, May 4th is "Youth Day" in China (all those Chinese script kiddies will be feeling wholly patriotic) and May 7th is the anniversary of the US "accidental" bombing of the Chinese Embassy in Belgrade.. . .

Delinquent hackers aim at law reform

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Demonized by the media as "cyber juvenile delinquents"wreaking havoc on the Internet, hackers view themselves as neither young nor intent on havoc. They are crusading to bring public attention to two areas of needed law reform: the quality and safety of software.. . .

SDMI cracks revealed

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The academic cracker crew led by Princeton University Computer Science Professor Edward Felten, which answered the HackSDMI public challenge of last September with 'unqualified' results, has received veiled threats of criminal prosecution under the Digital Millennium Copyright Act (DMCA) from the SDMI Foundation in hopes that the team will be cowed into withholding what it's learned from an upcoming computer science conference.. . .

Tool suggests rise of new breed of hacker

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Well, thanks to lax security by vendors and network administrators, not to mention an underground network of devious and talented souls churning out user-friendly cracking tools, it's never been easier. The latest such tool to hit the Internet is called SMBRelay, . . .

Back to school to learn to hack

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

How do you predict the actions of a criminal? Get into his or her head, work out what makes them tick and learn the techniques they have at their disposal. Many solutions providers are launching security practices to . . .

£35,000 for hackers to crack Web server

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A live hacking competition that begins tomorrow in London is intended to publicise the UK's lackadaisical attitude to security. Computer hackers from around the world are being invited to break into a locked-down Web server for £35,000, in a competition launched for to publicise Britain's largest security conference, Infosec. . . .

'Sandboxing' Technology Can Stifle Hackers

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Forget the popular myth of the teen hacker. An older, more sophisticated hacker is out there, spreading malicious code disguised as files and standard Internet apps into corporate networks. IT managers can take every precaution-blocking inappropriate and suspicious websites, rejecting Visual . . .