#hacking

https://yewtu.be/watch?v=1RipwqJG50c

Watch Samy most recent talk on Browser Manipulation https://www.youtube.com/watch?v=K1T_m...​

In this talk I'll introduce radio hacking, and take it a few levels into hacking real world devices like wirelessly controlled gates, garages, and cars. Many vehicles are now controlled from mobile devices over GSM and the web, while even more can be unlocked and ignitions started from wireless keyfobs over RF. All of these are subject to attack with low-cost tools (such as RTL-SDR, GNU Radio, HackRF, Arduino, and even a Mattel toy).

We'll investigate how these features work, and of course, how they can be exploited. I'll be going from start to finish on new tools and vulnerabilities in this area, such as key-space reduction attacks on fixed-codes, advanced "code grabbers" using RF attacks on encrypted and rolling codes, exploiting mobile devices and poor SSL implementations, and how to protect yourself against such issues.

By the end of this talk you’ll understand not only how vehicles and the wirelessly-controlled physical access protecting them can be exploited and secured, but also learn about various tools for hardware, car and RF research, as well as how to use and build your own inexpensive devices for such investigation!

Samy Kamkar
Samy Kamkar is an independent security researcher, best known for creating The MySpace worm, one of the fastest spreading viruses of all time. His open source software and research highlights the insecurities and privacy implications in every day technologies, from the Evercookie which produces virtually immutable respawning cookies, SkyJack, the drone that wirelessly hijacks other drones, and KeySweeper, a wireless keyboard sniffer camouflaged as a USB wall charger. He continues to release new tools and hardware, for examples most recently the ProxyGambit, OpenSesame and ComboBreaker tools.
-

Managed by the official OWASP Media Project https://www.owasp.org/index.php/OWASP...​

4 days, 19 hours ago

In this video, we have shown how Windows XP SP3 could be hacked by exploiting a vulnerability in Sysax 5.53 SSH Server. Also we have shown how after hacking, we can see live stream of victims computer.

6 days, 4 hours ago

Let this be a warning!

Whenever they say, 'it is secure', it isn't.

Any algorithm can be hacked, and in the end, most big companies are part of the Illuminati system.

The only good password is in your head, contains letters, digits and special characters, and is more than 40 characters long.

The phone is listening to you, filming you and tracking you via location sensors. It knows where you are by the strength of signal of the nearest 3 cell towers.

The phone keyboard is a transmitter of information back through your provider to whoever the manufacturer is.
Whatever you type is in memory on your phone, on the clipboard, in RAM.

Most chat programs, streaming video and sound programs, can be hacked into, to gain access to your phone (computer). You have to have open ports for them to work. For example, telnet is port 23. SSH is port 22.

Your phone's mac address, uniquely identifies you, along with parameters of your phone. This is called fingerprinting. It is a good idea to, at least, try to change your mac address.

If a hacker knows your mac address, they can get into your wifi, impersonate you, and have total access to any private info you haven't encrypted.

Sharing programs, remote control and impersonation protocols in Windows, Linux and Apple, should be banned.

Rooting a linux phone is good if you want to change a few things, but make sure you change it back to unrooted asap. Superuser privileges given to a hacker could mean you lose millions (if you have millions), and you will not even know they are in your phone, looking at you, and listening to you, reading your mail, searching your passwords.

If you want to know more, type metasploit into Youtube. The information to hack anything is there, and nobody does anything to address the flaws. Google wants to know everything about you. Facebook has your profile, with a nice picture of you. The government knows where you are by location sensors.

Emergency services can listen in to your phone even if it does not have a sim in it. That is why you can call 911 without any credit. Try it (no sim).

Everybody should have a firewall allowing source/destination inbound on port 53 for dns, port 67:68 in source/destination inbound for dhcp, inbound port 80 destination for http (browser), inbound port 443 destination for https (the secure lock symbol) for when you do your banking.

Most routers these days, have a firewall you can program.

Outbound ports you should block include netbios 137:139, smb port 445, to name a few. Google 'wikipedia internet ports', and the methods for programming your own router.

Just remember, these f.....s are not on your side. The politicians are selected (not elected); do whatever the Illuminati want, and the police do what the politicians say because it's easier to co-operate with big evil and pay their monthly mortgage.

Most morality is hypocrisy in the name of control of the sheeple.

If you act like sheep, the Illuminati will treat you like sheep.

My channel :-
https://www.bitchute.com/channel/S554gbQKpUpI/

1 week ago

One day in May 2017, computers all around the world suddenly shut down. A malware called WannaCry asks for a ransom. The epidemic suddenly stops, because a young, British researcher finds a killswitch, by accident.

An exclusive Tomorrow Unlocked documentary. #hackerhunterseries​

1 week, 4 days ago

In this video, we have shown how windows XP SP2 could be hacked by exploiting a vulnerability in Quick TFTP Server Pro 2.1. Post hacking scenarios like accessing the processes of hacked computer and closing them is also shown.

2 weeks, 1 day ago

He is the most famous hacker of the world - and at CeBIT Global Conferences 2015 he performs a hack live on center stage: Kevin Mitnick.

https://invidious.zee.li/watch?v=NtzZBTjKngw

1 month ago

Don't do this in public... information purposes only.

1 month ago

Don't do this in public... information purposes only.

1 month ago

In this video, we have shown how windows XP SP3 could be hacked by exploiting a buffer overflow present in Ultra VNC 1.0.2. To download the vulnerable app, please click here.
https://www.exploit-db.com/apps/d22cf28dda2896149e57542f8b7f015b-UltraVNC-102-Setup.exe

1 month, 1 week ago

We have long heard the excuses, now for the adults in the room to talk

1 month, 1 week ago

Thanks to Harry Vox for this clip

1 month, 3 weeks ago

Hackers are using smart devices for swatting attacks. THis warning comes from the FBI.

If you like the video and want see more please support me at the following

PayPal.Me/DParnass
https://www.subscribestar.com/dparnass

Dash XrpipDwUuDVZ9jpXpLr2styfg4ySD35npA
Bitcoin 1LFa2518e2UCVbwEbXXzwfDZSq55Y4whPQ
Etherium 0xF745aD461eEBf4bD5854669979744a1671b49eDc

You can find me on the following platforms

Minds.com:https://www.minds.com/dparnass
Gab.ai:https://gab.ai/dparnass
Bitchute: https://www.bitchute.com/channel/W0vNUf2HTXBP/
Parler: https://parler.com/profile/Dparnass318050363914/posts
Rumble: https://rumble.com/register/Renegade1971/

#Swatting #Hacking #Cybercrime

1 month, 4 weeks ago

This presentation will highlight some of the most exciting and shocking methods by which my team and I routinely let ourselves in on physical jobs.

Many organizations are accustomed to being scared at the results of their network scans and digital penetration tests, but seldom do these tests yield outright "surprise" across an entire enterprise. Some servers are unpatched, some software is vulnerable, and networks are often not properly segmented. No huge shocks there. As head of a Physical Penetration team, however, my deliverable day tends to be quite different. With faces agog, executives routinely watch me describe (or show video) of their doors and cabinets popping open in seconds.

Presenter: Deviant Ollam - https://enterthecore.net/
Event: Wild West Hackin' Fest 2017

Special thanks to Wild West Hackin' Fest for letting us share their talks.

1 month, 4 weeks ago

A man named Vitor Vilela has made it a mission of his to speed up old Super Nintendo games! Early SNES games rely on the internal console hardware which is underpowered compared to the SEGA Genesis or the Turbo Grafx. Nintendo remedied this with later releases by adding chip sets into the game boards to help with processing, ram, and memory. Great games like Contra 3 were not able to take advantage of this...until now. Vitor has been creating rom patches for SNES games that experience slow down from the consoles early years. Some have even taken up to 70 hours. We salute you Vitor!

Buy FUgameCrue Merch!!
https://fugamecrue.bigcartel.com

If you want to become a Patron so we can raise more hell
https://www.patreon.com/FUgameCrue

Donate Directly (PayPal)
[email protected]

Check us out on social media!
https://www.facebook.com/FUgameCrue/
Instagram @FUgameCrue @bubbytoed
Twitter @FUgameCrue

Join the FUgameCrue discord chat!
https://discord.gg/yEnSyEv

Our Skateboarding Channel
https://www.youtube.com/fucrue69

Shane's Personal Channel
https://www.youtube.com/bubbysworld

Shane's Gameplay Channel
https://www.youtube.com/channel/UC_7CmDIPBrcxLO_5hJJfYHA

Cameron's Personal Channel
https://www.youtube.com/channel/UCWolLDRwBnw0NE8bqvBZ1Kg

Intro and end slate music by David Seibert
https://soundcloud.com/seibertaudio

Channel Art By Ethan Riley
https://www.instagram.com/ethan_p_riley/

2 months ago

Ticket master has been fined $10 Million for hacking a rival company in order to bring it to its knees.

If you like the video and want see more please support me at the following

PayPal.Me/DParnass
https://www.subscribestar.com/dparnass

Dash XrpipDwUuDVZ9jpXpLr2styfg4ySD35npA
Bitcoin 1LFa2518e2UCVbwEbXXzwfDZSq55Y4whPQ
Etherium 0xF745aD461eEBf4bD5854669979744a1671b49eDc

You can find me on the following platforms

Minds.com:https://www.minds.com/dparnass
Gab.ai:https://gab.ai/dparnass
Bitchute: https://www.bitchute.com/channel/W0vNUf2HTXBP/
Parler: https://parler.com/profile/Dparnass318050363914/posts
Rumble: https://rumble.com/register/Renegade1971/

#Ticketmaster #CyberEspionage #Cybercrime #Hacking

2 months ago

After playing a Breach/Quickhack build in CP2077 for a while, I felt like trying my hand at creating a hacking sequence inspired by the in-game graphical overlay effects. This is just an exercise in video editing, but feel free to copy and use as you see fit, should you see fit.

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License
https://creativecommons.org/licenses/by-sa/4.0/

Music: "Unplugged from the Matrix" by Karl Casey @ White Bat Audio
https://whitebataudio.com/downloads/unplugged-from-the-matrix

2 months, 1 week ago

In this quick video, I will be going over a popular method used to compromise computers.

-READ ABOUT IT-
https://dizzie.org/how-to/hack-networks/2019/01/18/how-to-hijack-a-session/

-DOWNLOADS-
https://dizzie.org/downloads/hacking/

-FORUM-
https://dizzieforums.com

-LIKE THE VIDEOS?-

OFFICIAL WEBSITE: http://dizzie.org
DISCORD: https://discordapp.com/invite/dKw8AZH
GAB: https://gab.com/chasedizzie
MEWE: https://mewe.com/i/chasedizzie
VERO: https://vero.co/cdizzie

*DISCLAIMER* THIS VIDEO AS WITH ALL MY CONTENT IS INTENDED FOR EDUCATIONAL PURPOSES ONLY. THESE VIDEOS ARE MEANT TO MAKE THE PUBLIC AWARE OF THE NEED FOR INTERNET PRIVACY AND TECHNOLOGICAL SECURITY. THEY ARE IN NO WAY INTENDED FOR ILLEGAL PURPOSES OR TO INFLUENCE SUCH ACTS. ALL ILLEGAL ACTS PERFORMED USING THESE TOOLS WILL RECEIVE NO SUPPORT FROM ME OR ANY AFFILIATES AND WILL BE PURSUED TO THE FULLEST EXTENT OF THE LAW.

2 months, 1 week ago

In this quick video, I will be discussing two popular methods used to compromise the safety of someone's router and network.

-DOWNLOADS-
https://dizzie.org/downloads/hacking/

-READ ABOUT IT-
https://dizzie.org/how-to/hack-networks/2019/01/18/how-to-hack-home-routers/

-FORUM-
https://dizzieforums.com

-LIKE THE VIDEOS?-

OFFICIAL WEBSITE: http://dizzie.org
DISCORD: https://discordapp.com/invite/dKw8AZH
GAB: https://gab.com/chasedizzie
MEWE: https://mewe.com/i/chasedizzie
VERO: https://vero.co/cdizzie

*DISCLAIMER* THIS VIDEO AS WITH ALL MY CONTENT IS INTENDED FOR EDUCATIONAL PURPOSES ONLY. THESE VIDEOS ARE MEANT TO MAKE THE PUBLIC AWARE OF THE NEED FOR INTERNET PRIVACY AND TECHNOLOGICAL SECURITY. THEY ARE IN NO WAY INTENDED FOR ILLEGAL PURPOSES OR TO INFLUENCE SUCH ACTS. ALL ILLEGAL ACTS PERFORMED USING THESE TOOLS WILL RECEIVE NO SUPPORT FROM ME OR ANY AFFILIATES AND WILL BE PURSUED TO THE FULLEST EXTENT OF THE LAW.

2 months, 1 week ago

In this video, we have shown how you can hack windows 7 SP1 using DiskBoss Version 7.5.12. Also post hacking scenarios like taking screenshot and deletion of event logs from target system are also shown

2 months, 1 week ago

HmiWugMDeeU
We want to build a kernel and a root file system for a QEMU emulated board, where to run interesting binaries of our IoT device, but our device has a very old kernel, libraries, and packages. This means that we need to run an old Buildroot version or other old tools, that will not run on our current Linux desktop, but they will run on old Linux distributions.

To overcome this problem, in a simple and fast way, without the burden and overhead of a virtualization environment, we will introduce Docker, which can be configured to run older tools, transparently, on our modern Linux distribution.

This episode is about how to use Docker to build the emulation environment, using old tools, like old versions of Buildroot, that don't run on modern Linux distributions. We have to use a container environment, like Docker, or a more complex virtualization environment to solve this issue.

This argument, is not strictly related to hacking, but it is a very important tool, needed to move forward with the Buildroot installation, configuration, and generation of the kernel and the root file system for our QEMU based emulation environment.

Docker is a very useful tool that can be used in many different situations, it is a light and efficient tool, to package everything is needed to run complex tools in a well-defined environment; we can include an entire Linux distribution in a Docker image. It can be particularly useful in the embedded space where, often, there is the need to rebuild some software on devices that are on the field for many years and a very old toolchain is required.

It is an easy to use tool, but it is important to know some basic concepts that we will explore.

### Useful Links

Docker container and scripts used in the video: https://github.com/digiampietro/hacki...

The files to build and run the Docker container shown on this episode: https://github.com/digiampietro/hacki...

Comparison of libc implementations for Linux: http://www.etalabs.net/compare_libcs....

uClibc a C library for developing embedded Linux systems: https://www.uclibc.org/

Docker, it can package an application and its dependencies in a virtual container that can run on any Linux server: https://www.docker.com/

Docker Hub, where to find and share Docker containers: https://hub.docker.com/

Channel's Author: https://www.makemehack.com/2020/02/a-...

Channel's Web Site:

The sample router (Gemtek WVRTM-127ACN) on techinfodepot: http://en.techinfodepot.shoutwiki.com...

The sample router (Gemtek WVRTM-127ACN) reverse-engineered on GitHub, includes scripts to dump the EEPROM to a text file and to convert it back to binary file: https://github.com/digiampietro/hacki...

QEMU, the Quick EMUlator: https://www.qemu.org/

Buildroot, a simple, efficient and easy-to-use tool to generate embedded Linux systems through cross-compilation: https://buildroot.org/

2 months, 1 week ago

https://youtube.com/watch?v=Ai8J3FG8kys

If you have successfully extracted the root file system from the firmware file of your device, and if you want to understand what your device does after booting, and if there is an easy way to log in as root, this is the video for you!

We will talk about analyzing startup scripts of an IoT device to understand what the device does, if there is any possibility to login as root and to identify some interesting binary executables to reverse engineer to hack the device.

We assume that our device has a Linux or Unix like operating system, this is true for the overwhelming majority of devices; when some examples are needed we will analyze the startup scripts of our sample Gemtek Router (link below). We will start from the beginning that means from the boot of the operating system:

- we will look at what type of "init" process we have;

- we will analyze the init configuration file and related startup scripts;

- we will identify the most interesting binaries that manage our device;

- we will identify the login process;

- we will look if there is the possibility to access the device as root;

- we will use common Linux commands to do this analysis:

- a text editor;

- the "grep" command, to search inside a file or multiple files;

- the "find" command, to list files that interest us;

- the "xargs" command, often piped after the output of the "find" command and coupled to the "grep" command;

- the "strings" command, to display strings embedded in binary or executable files.

### Links with additional Information

Channel's Author: https://www.makemehack.com/2020/02/a-...

Channel's Web Site:

The sample router (Gemtek WVRTM-127ACN) on techinfodepot: http://en.techinfodepot.shoutwiki.com...

The sample router (Gemtek WVRTM-127ACN) reverse-engineered on GitHub, includes scripts to dump the EEPROM to a text file and to convert it back to binary file: https://github.com/digiampietro/hacki...

Hashcat, Advanced Password Recovery: https://hashcat.net/hashcat/

How to find and connect to the UART interface: https://youtu.be/6_Q663YkyXE

2 months, 1 week ago

oY-MxtJLEos
If you are struggling to get the firmware out of your device, this is the video for you!

In this video I will explain the possible ways we can use to to get the firmware of our IoT device.

I will do a practical example, of one of these possible ways. I will connect the PC to the UART of our sample device, I will analyze the boot log, I will access the command line interface of the boot loader, and I will dump the firmware, exploiting the dump command available in the boot loader. I will use a couple of scripts, do dump the entire EEPROM in an hexadecimal ASCII text file, and, then, to convert back this file in binary form to get the exact image of the EEPROM.

********* Links with additional Information

Channel's Author: https://www.makemehack.com/2020/02/a-...

Channel's Web Site:

The sample router (Gemtek WVRTM-127ACN) on techinfodepot: http://en.techinfodepot.shoutwiki.com...

The sample router (Gemtek WVRTM-127ACN) reverse engineered on GitHub, includes scripts to dump the EEPROM to a text file and to convert it back to binary file: https://github.com/digiampietro/hacki...

TTL Serial Adapter (affiliate link): https://amzn.to/2vvzCYB

PuTTY, the terminal emulator: https://www.putty.org/

Wireshark, Ethernet analyzer: https://www.wireshark.org/

Curl, command line tool for transferring data with URLs: https://curl.haxx.se/

Wget, retrieving files with URLs: https://www.gnu.org/software/wget/

Mitmproxy, a free and open source interactive HTTPS proxy: https://mitmproxy.org/

Bus Pirate: http://dangerousprototypes.com/docs/B...

OpenOcd, On Chip Debugger: http://openocd.org/

U-Boot, The Universal Boot Loader: https://www.denx.de/wiki/U-Boot

Buildroot, a simple, efficient and easy-to-use tool to generate embedded Linux systems through cross-compilation: https://buildroot.org/

Binwalk, a fast, easy to use tool for analyzing, reverse engineering, and extracting firmware images: https://github.com/ReFirmLabs/binwalk

SOIC8 SOP8 Flash Chip IC Test Clips Socket Adpter BIOS/24/25/93/95 Programmer (affiliate link): https://amzn.to/39A9JFd

2 months, 2 weeks ago

_FSM_10JXsM
In this video I will introduce the JTAG interface, an interface that you can find on almost all of your IoT devices like routers, webcams, electronic toys, TV remotes and so on.
I will explain why this interface can be so useful in hardware hacking and how to find its position and pin-out using simple techniques like, for example, using a multi-meter or a cheap Jtagulator board. And when the pin-out is known, but the JTAG interface is not working, I will explain the reasons why this can happen and what to do to solve the issue.

*** What is the JTAG interface

JTAG is an industry standard, usually implemented in complex integrated circuits; this standard was issued for the first time in 1990, with the purpose to simplify the testing of PCB after manufacture.

It allowed controllability and observability of each bit of internal memory of each integrated circuit and allowed to check the integrity of each single trace connecting different integrated circuits in the PCB.

It allows reading and writing the flash memory content and, with later improvement to the standard, it can be used as a mean to do in-circuit debugging that means being able to run a debugger on the real firmware running on the real hardware.

*** Why JTAG interface is important in Hardware Hacking

- it allows to read and write the content of the EEPROM, so it can be used to dump the entire EEPROM content. It can also be used to restore the original firmware in case of bricking the device during our firmware modification trials.

- it allows to break into the boot cycle and use the JTAG interface as a mean to do "in circuit debugging" this means using a debugger with the real firmware on the real hardware

*** How to find the JTAG interface

To find the position of the JTAG interface we follow "the easiest path first" principle, this means that first of all we search on Internet to see if someone else has already done the job for us and has already found where is located the JTAG interface in our device.

We can start looking at the board searching for pins labeled with the names of the JTAG interface like TCK, TDI, TDO and TMS.

If we are not lucky in searching on Internet or in looking at labels on our board, finding the position of the JTAG interface it's not easy; one of the reasons is that there are no standardised connectors and pin-out; anyway there are few popular pin-outs, some of these pin-outs are available on the jtagtest website, link below.

If we don't find any JTAG pin label on our board, we start searching for pin headers arranged in a single row of 5 or 6 pins or in a double row of 10, 12, 14, or 20 pins.

When we have found the pin candidates we can use a multi-meter to find the possible pin-out because finding GND and VCC is easy, usually TMS and TDI have a pull-up resistor, TRST usually can have a pull up or a pull down resistor and TDO should be an high impedance input.

Once we have identified GND, VCC and taken pin resistance and voltage measurements we can compare what we have found with popular pin-out in the jtagtest website and, if we are lucky, we can identify the JTAG pinout using a simple multi-meter.

If we know the System On a Chip and if we have his data sheet we can locate the JTAG pins on the chip and then follow PCB traces to identify the connector, but this is usually very difficult for two possible reasons:

- often the System On a Chip is a SMD with pins below the package and it is impossible to identify them on the Printed Circuit Board

- when the System On a Chip has a package that shows his pin and is easy to identify the JTAG pins, it can be difficult to follow the traces on a multi-layer board and today, almost all boards are multi-layer.

The best and easy solution, once we have identified potential JTAG pin candidates, is to use Jtagulator, it has a lot of headers that we can attach to potential JTAG pin candidates, it can run some automatic scanning logic and identify the JTAG pinout.
-------------------------------
Links with additional Information

Channel’s Author: https://www.makemehack.com/2020/02/a-...
Channel’s Web Site:
The sample router (Gemtek WVRTM-127ACN) on techinfodepot: http://en.techinfodepot.shoutwiki.com...
The sample router (Gemtek WVRTM-127ACN) reverse engineered on GitHub: https://github.com/digiampietro/hacki...
The JTagulator website: http://www.grandideastudio.com/jtagul...
TTL Serial Adapter (affiliate link): https://amzn.to/2vvzCYB
PuTTY, the terminal emulator: https://www.putty.org/
Bus Pirate: http://dangerousprototypes.com/docs/B...
Bus Bluster: http://dangerousprototypes.com/docs/B...
J-Link Debug Probes: https://www.segger.com/products/debug...
OpenOCD: http://openocd.org/
Website with popular JTAG pinout: http://www.jtagtest.com/pinouts/
Previous episode #02: https://youtu.be/6_Q663YkyXE

2 months, 2 weeks ago

6_Q663YkyXE

This is the second episode of the Hardware Hacking Tutorial series.

This series is to share information on how to do hardware hacking and how to do reverse engineering. The series is useful both for beginners and experts.

In this episode we will talk about how the find tue UART interface on an IoT device; we will take an home router (Gemtek WVRTM-127ACN) and show how to find the UART interface using simple tools like a multi-meter and using more advanced tools like a JTagulator board.

UART stands for Universal Asynchronous Receiver-Transmitter, it is the serial interface of the device where to attach the serial console. It is essential, in hardware hacking, to find the UART interface because it allows you to see what is printed on the serial console during the boot cycle, and It allows to see what type of bootloader your device is using and his version, what Operating System you have and his version, what kind of CPU and other peripherals you have, the amount of RAM and EEPROM; often you can get information on how the EEPROM is partitioned and a lot of other information, including information during the firmware upgrade cycle.

Often it is also possible to interact with the serial console, interacting with the bootlader, getting the login prompt and, sometimes, being able to logon locally on the system.

In the device we are interested in, usually the serial or UART interface is included, because it is used during the development phase and for testing purposes, but it is hidden inside the motherboard.

We will discuss, and show on video, various techniques to find the position and the pin-out of the UART interface including using a simple multi-meter.

We will show, also, how to connect a PC, running a terminal emulator software (we use PuTTY), to the UART of the IoT device using a TTL serial adapter.

2 months, 2 weeks ago

Messy formatting because this is the only way I could preserve the html links since youtube truncates them when you copy from the description.
Source: https://yewtu.be/watch?v=LSQf3iuluYo

This is the first episode of the Hardware Hacking Tutorial series.<br><br>This series is to share information on how to do hardware hacking and how to do reverse engineering. The series is useful both for beginners and experts.<br><br>Hardware Hacking will be described with practical hacking activities on real devices following a process based on:<br><br>1. Information gathering of hardware and software<br><br>2. Building an emulation environment where to run interesting binaries and reverse engineer them, if needed<br><br>3. Analyzing how the device works<br><br>4. Hack the device and modify its firmware<br><br>In this first episode we will talk about how to identify the device, the manufacturer and the Original Design Manufacturer and how to identify the integrated circuits inside the device using some tips to read part numbers when they seems unreadable.<br><br>--------------------------------<br>Links with additional Information:<br><br>Channel's Author: <a href="https://www.makemehack.com/2020/02/a-short-introduction-of-myself.html">https://www.makemehack.com/2020/02/a-...</a><br>Channel's Web Site: <br><br>The sample router (Gemtek WVRTM-127ACN) on techinfodepot: <a href="http://en.techinfodepot.shoutwiki.com/wiki/Gemtek_WVRTM-127ACN">http://en.techinfodepot.shoutwiki.com...</a><br><br>The sample router (Gemtek WVRTM-127ACN) reverse engineered on GitHub: <a href="https://github.com/digiampietro/hacking-gemtek">https://github.com/digiampietro/hacki...</a><br><br>The OpenWRT Project: <a href="https://openwrt.org/">https://openwrt.org/</a><br><br>Introduction to reverse engineering, Mike Anderson, Embedded Linux Conference 2018, includes how to open hardened devices:<br>slides: <a href="https://elinux.org/images/c/c5/IntroductionToReverseEngineering_Anderson.pdf">https://elinux.org/images/c/c5/Introd...</a><br>video</a><br>video: <a href="/watch?v=7v7UaMsgg_c">https://www.youtube.com/watch?v=7v7Ua...</a><br><br>Chinese search engine: <a href="https://www.baidu.com">https://www.baidu.com</a><br><br>System On a Chip Mediatek MT7621AT datasheet: <a href="http://www.t-firefly.com/download/FireWRT/hardware/MT7621.pdf">http://www.t-firefly.com/download/Fir...</a><br><br>RAM 128Mb Winbond W971GG6SB datasheet: <a href="https://media.digikey.com/pdf/Data%20Sheets/Winbond%20PDFs/W971GG6SB.pdf">https://media.digikey.com/pdf/Data%20...</a><br><br>74HC164 datasheet: <a href="https://assets.nexperia.com/documents/data-sheet/74HC_HCT164.pdf">https://assets.nexperia.com/documents...</a><br><br>NAND Flash Memory F59L1G81LA datasheet: <a href="https://www.esmt.com.tw/upload/pdf/ESMT/datasheets/F59L1G81LA%282Y%29.pdf">https://www.esmt.com.tw/upload/pdf/ES...</a>

2 months, 2 weeks ago

The SolarWinds hack just came to light and the Legacy Media is already jumped on pushing the Russia, Russia, Russia narrative. There hasn’t been enough time to determine who the perpetrators were at this point, but they are trying to lay it at the feet of Russians.

In this video we take a look at Reuters doing their part in blaming Russia for the hack before we know who did it.

Where you can find me:

BitChute: https://www.bitchute.com/channel/constitutionalist-libertarian/

LBRY: https://lbry.tv/@ConstitutionalistLibertarian

D.Tube: https://d.tube/c-libertarian

YouTube: https://www.youtube.com/channel/UCm_LWSIC6aGyIqe4KXq4vNg

Parler: https://parler.com/profile/ConstitutionalistLibertarian/

Gab.ai: https://gab.ai/ConstitutionalLibertarian

Minds: https://www.minds.com/ConstitutionalistLibertarian

Facebook: https://www.facebook.com/constitutionalist.libertarian.18

Twitter: Banned (Formerly @ConsLibertarian)

2 months, 2 weeks ago

Since March of 2020 the United States government's computer networks have been under attack with the latest hack seeming to show the hackers got into the networks that control our nuclear stockpile. This happened while our intelligence agencies were more worried about going after President Trump than protecting our country.

Links: https://americanmilitarynews.com/2020/12/report-us-nuclear-weapons-agency-hit-by-massive-hacking-campaign/

https://www.voanews.com/usa/cybersecurity-firm-fireeye-says-was-hacked-nation-state

2 months, 2 weeks ago

News that a nation state compromise of SolarWinds Orion monitoring software has been uncovered and publicised on 13 Dec 2020. Fingers have been pointed at Russians APT29 (Cozy Bear group).
This supplier chain compromise will have certainly caught out US and UK Government agency's, as well as many Fortune 500 companies.

Sources:
https://www.solarwindsmsp.com/solarwinds-orion-security-advisory
https://www.fireeye.com/blog/threat-research/2020/12/evasive-attacker-leverages-solarwinds-supply-chain-compromises-with-sunburst-backdoor.html
https://www.telegraph.co.uk/technology/2020/12/14/qa-can-done-stop-solarwinds-hack/
https://cyber.dhs.gov/ed/21-01/
https://msrc-blog.microsoft.com/2020/12/13/customer-guidance-on-recent-nation-state-cyber-attacks/

Like my channel? Please help support it:
Patreon: https://www.patreon.com/quidsup
Paypal: https://www.paypal.me/quidsup

Follow me on Social Media
Twitter: https://twitter.com/quidsup
MeWe: https://mewe.com/i/quidsup
Minds: https://minds.com/quidsup

2 months, 3 weeks ago

fHb0eovGRVE
Very interesting. This guy really knows his stuff. https://mitmproxy.org/

2 months, 3 weeks ago

At the DEF CON hacking conference, hackers were invited to try their hand at infiltrating the technology we rely on every election, including voting machines and a mock elections office. CNNTech's Laurie Segall reports.

Tags: News & Politics;xp;2016;voting;election systems;cybersecurity;trump;cyber;2020;hackers;hack;election;hacking;windows;dominion;def con;CNN Business;CNNMoney;vote;CNNB;elections;clinton;News;
Source: https://www.youtube.com/watch?v=HA2DWMHgLnc
Uploader: http://www.youtube.com/user/CNNMoney (CNN Business)
Upload Date: August 11 2017

2 months, 3 weeks ago

💥💥💥White Hat Hackers💥💥💥

Patrick Byrne spricht mit Chanel Rion vom Sender OAN über seine White Hat Hacking Brigade!

Ich habe ein Team von Hackern und Cyber-Detektiven und andere Leute mit besonderen Fähigkeiten finanziert. Wir arbeiten seit August daran. Eine Nebengeschichte, die eines Tages weiterverfolgt werden sollte, ist, dass das DHS im August und September vor all dem gewarnt wurde.
----------------------------
Tägliche politische und Geoengineering-Nachrichten:
https://vk.com/chembuster

Meine Kanäle:
https://www.bitchute.com/channel/chembuster/
https://vimeo.com/chembuster

2 months, 4 weeks ago

Hi gh guys!!! here I hack the 'Zoom' meetings trick in more depth. Also the 2A issue and the only reason WE the PEOPLE check our gov'ment here. Enjoy!!!
Semper Fi
Real Neo
TheDebtAssassins
MAsonTRIX

#notsees

3 months ago

The film the voting machine corporations don't want you to see. HACKING DEMOCRACY follows investigator/grandmother, Bev Harris, and her citizen-activists as they set out to uncover how America counts its votes. Proving the votes can be stolen without a trace culminates in a duel between the Diebold corporation's voting machines and a computer hacker - with America's democracy at stake.

3 months ago

Finnish hacker and election expert Harri Hursti investigates election-related hacks, uncovering just how unprotected voting systems really are.

3 months ago

Learn more at https://www.symantec.com/solutions/election-security

To demonstrate how vulnerable some of our digital election infrastructure really is, we bought two voting machines from an online auction site for less than $200. They were last used in State and Federal elections in 2012 and 2013. What vulnerabilities will we find?

Elections are under assault across the globe, as we continually see in the news. Well-resourced malicious cyber actors have tampered with our elections, whether it’s hacking voting machines or waging information warfare through social media.

Tags: Science & Technology;teardown;voting machine;voter fraud;midterm elections;midterms 2018;hack a voting machine;diebold;senate;congress;hack the vote;are elections safe;
Source: https://www.youtube.com/watch?v=wmoxE1sJc1c
Uploader: http://www.youtube.com/user/symantec (Symantec)
Upload Date: October 03 2018

3 months, 1 week ago

https://www.youtube.com/watch?v=juvgEU9NCxU

Learn how to see what occurs in the back end of a form, when you hit a button; what the form does, what codes does it use and how you may be able to add this functionality to your projects. Reverse engineering forms is the learning process in which I analyze the action of a form and how to mimic and clone its request and response.

3 months, 1 week ago

As the media continues to ignore claims of election fraud, one millionaire has set out to prove their cover-up in support of the truth. One America’s Chanel Rion has more.

3 months, 1 week ago

Did Wernher von Braun oversee the creation of the internet? Why did the father of the internet claim to have 30,000 words a minute. Bio-hacking? Are we reading the Edda the Bible right? Text formatting.

Join my free telegram channel for notifications of when I'm going live so you can join in and ask your fasting related questions.
https://t.me/joinchat/AAAAAFdxBOJk57W_E-7iqQ

Instant Download PDF - Fasting Part 1 from zero to 48hrs.
https://gumroad.com/l/fast48

Fasting kit
https://kit.co/BryanFeste/snake-juice-diet-fasting

Peak English formatted speed reading training wheels reading kit
https://kit.co/BryanFeste/speed-reading-kit

Live streams and 3 day old archive.
https://dlive.tv/lvl99light

4 months ago

Original Upload date: 2018-05-25 10:05:09.000
Never harass or contact anyone in any video I make. Just because someone is being silly doesn't mean they aren't a human being.

Sources;
1 https://www.theguardian.com/technology/2014/jan/22/your-password-is-easy-to-crack
2 https://www.cnet.com/news/two-factor-authentication-what-you-need-to-know-faq/\n3 https://passwordsgenerator.net/
4 http://www.hackingarticles.in/hack-gmail-and-facebook-of-remote-pc-using-dns-spoofing-and-set-toolkit/
5 http://eltoma-it.com/2016/09/29/dns-spoofing-how-to-prevent-an-attack/
6 https://www.cnet.com/news/rsa-cyberattack-could-put-customers-at-risk/
7 https://blog.centrify.com/2fa-mfa-difference/
8 https://en.wikipedia.org/wiki/Multi-factor_authentication
9 https://arstechnica.com/information-technology/2011/06/rsa-finally-comes-clean-securid-is-compromised/
10 https://security.stackexchange.com/questions/47901/how-does-authys-2fa-work-if-it-doesnt-connect-to-the-server
11 https://security.stackexchange.com/questions/41939/two-step-vs-two-factor-authentication-is-there-a-difference
12 https://www.cnet.com/how-to/why-you-are-at-risk-if-you-use-sms-for-two-step-verification/
13 https://lifehacker.com/the-difference-between-two-factor-and-two-step-authenti-1787159870
14 https://www.youtube.com/watch?v=caVEiitI2vg
15 https://medium.com/internet-creators-guild/getting-hacked-as-an-internet-creator-982d03637e86
16 https://www.csoonline.com/article/2124681/social-engineering/what-is-social-engineering.html
17 https://xkcd.com/936/

4 months, 3 weeks ago

Bowser gets arrested for hacking the Nintendo switch by the FBI!

Source-
https://www.eurogamer.net/articles/2020-10-03-its-game-over-for-nintendo-switch-hacker-gary-bowser
https://www.justice.gov/usao-wdwa/pr/two-members-notorious-videogame-piracy-group-team-xecuter-custody

#Switch
#Bowser
#Hacking

Stalk Me On Tweeter:
https://twitter.com/ZeoTGT

Stalk Me On Parler:
https://parler.com/profile/ZeoGaming

Stalk The Discord:
https://discord.gg/KE63Fqk

Stalk Me On BitChute:
https://www.bitchute.com/channel/dPG6nSGMOGxL/

Stalk Me On YouTube:
https://www.youtube.com/c/zeogamingtgt

Find Me On Twitch:
https://www.twitch.tv/zeogamingtgt

Stalk Me On FaceBook:
https://www.facebook.com/ZeoGamingTGT

Stalk Me On Instagram:
https://www.instagram.com/zeo_gaming_tgt/

Got News You Want Me To Cover?
Email Me At [email protected]

----------------------------------------------------------------------------------------------------------------------------------------------------------
Intro Music By HeatleyBros:
https://youtu.be/C-ImO_e62-w
----------------------------------------------------------------------------------------------------------------------------------------------------------

Please Note, all the Pictures and Video Images that I use do not belong to me. I own no rights to the images found on Google, or recorded from said Video Games. All content is property of its content creator. Please support the companies that produce these Video games, Pictures, and Musical Segments.

All footage taken falls under ''fair use'' of the Digital Millennium
Copyright Act (1998). Therefore, no breach of privacy or copyright
has been committed. Freedom of speech is the ability to speak without censorship or limitation.

4 months, 3 weeks ago

Find out what/who your cell phone is contacting secretly by running a MITM (Man in the middle) attack on yourself. I demonstrate MITM attack and talk about measures of protection/signs to identify one happening to you

5 months, 2 weeks ago

An educational resource intended to briefly explain the technical details and plausibility of a particularly contentious scene in the Aincrad arc of Sword Art Online, from a cyber security professional's perspective. I hope that it can be of some use to other fans of the series.

Twitter: https://twitter.com/VirtualAxiom
Black Lotus Familia Discord: http://discord.gg/8ZWpjrZ
Twitch: https://twitch.tv/virtualaxiom

5 months, 2 weeks ago

The 2004 U.S. Presidential election was awash with allegations of election fraud concerning Diebold electronic voting machines. This Emmy-nominated documentary uncovers incendiary evidence of secrecy, votes in the trash, hackable software and election officials rigging the Presidential recount. Ultimately, it proved that votes can be stolen without a trace—with America's democracy at stake....Will it happen again in 2020?

Originally aired: 2 Nov 2006
Source: hackingdemocracy.com
JOIN Rambaldi's Eye on Telegram: https://t.me/RambaldisEye

6 months ago

Watch until the end of this Omegle video as you can find me hacking some TikTok girls & teaching them a lesson to NEVER go on Omegle again 😜
💕 Donate & Get Perks: http://patreon.com/PervertPete
🌭 Subscribe: http://bit.ly/SubToPervertPete
🎥 Pervert Pete Archive: http://bit.ly/PervertPeteArchive
😂 Latest Video: http://bit.ly/PPLatestVideo
📘 Facebook: http://Facebook.com/OmeglePete
🤳 Instagram: http://Instagram.com/omegle_pete
🦚 Twitter: http://Twitter.com/SookieSquad

If you want to find Pete on Omegle, be sure to follow him on Facebook, Instagram or Twitter!

💘 Don't forget to LIKE, COMMENT & SUBSCRIBE! 💘

💘 CLICK THE BELL & TURN NOTIFICATIONS ON! 💘

I LOVE YOU ALL and always feel free to contact me on Twitter or Facebook! #ParodyPervert #Comedians #WtfVideos ;)

📽️ Are You A YouTuber? Grow Your Channel FOR FREE: https://www.tubebuddy.com/PervertPete

🛍️ Shop Pervert Pete Brands: http://www.amazon.com/shop/pervertpete

6 months, 2 weeks ago

Offline hacking, talk on physical penetration testing. How to secure your building and what can be done on the inside.
"This is not a presentation where I talk about how I would get in or the things I might be able to do. This is a talk where I am already in and I show you pictures from actual engagements that I have been on. They say one picture is worth a thousand words I show you how one picture cost a company a million dollars and maybe even a few lives. In a community where we focus so much on the offensive I also make sure with every attack I highlight. I spend time discussing what would have stopped me. We need to know the problems but we need more talks providing solutions and that is what I hope people will get from this. I show the dangers of Social engineering and how even an employee with no SE experience can be an eBay James Bond which can cause total financial ruin to a company. These Security threats are real. So are these stories!" - Jayson E. Street

6 months, 3 weeks ago

At 3:41pm we will get our revenge on the government agencies that are spying on us without our consent!

6 months, 3 weeks ago

Link: http://goo.gl/08NVyB
Have your ever wanted to get someone's IP address but just couldn't figure out how? Well it couldn't be easier with Grabify!
Grabify is packed with tons of features, such as multiple domains, automatic URL shortening, link notes to keep track of your targets, and so much more, the best part, it's all free!

Typical reasons for acquiring someone's IP address?
-Geolocation (Identifying where the target is located)
-Data collection
-Marketing
-IP banning
-Police reporting/Investigations
-'Bad guys' can even DDoS/DoS an IP address, thus taking the owner of the IP offline

7 months ago

This has the translator cut out. Weev in 2016 describing how to hack for profit by taking advantage of the hypersensitive pussies outrage mob on twitter. He also briefly talks about manipulating politics in America for profit.

7 months ago

"No immediate practical significance."

8 months ago

In The Realm of the Hackers is a 2003 Australian documentary directed by Kevin Anderson about the prominent hacker community, centered in Melbourne, Australia in the late 1980s. Centered around two Melbourne teenage computer hackers known as Electron and Phoenix who stole a restricted computer security list called 'Zardoz' and used it to break into some of the world's most classified and supposedly secure computer systems.

If you are searching for my videos but don't like BitChute's search function then click here https://themediagiant.weebly.com

8 months, 3 weeks ago

Through eight episodes, director Jason Scott covers the 25 year history of the Dial-Up Bulletin Board System, a modem-connected computer system that let others connect to a computer over a phone line and leave messages and trade files. Containing 200 interviews, episodes mostly consist of elaborate montages of dozens of people composing a narrative.

BAUD is an introduction to the start of the BBS.
SYSOPS AND USERS is a montage of stories and thoughts on running BBSes.
MAKE IT PAY covers the BBS Industry.
FIDONET covers the amateur network of computers called Fidonet.
ARTSCENE covers the ANSI art scene of the 1990s.
HPAC covers Hacking and Phreaking BBSes.
COMPRESSION discusses the ARC-ZIP battle of 1988.
NO CARRIER discusses the "end" of the dial-up BBS.

The BBS (bulletin board system) scene of the 80s and 90s was a magical time. Long before the Internet escaped from the lab, connected the planet and redefined what it meant to use a computer there was a brave and pioneering band of computer users who spent their time, money and sanity setting up their home computers and phone lines to welcome anyone who called.

In the Summer of 2001, Jason Scott, a computer historian (owner textfiles.com) wondered if anyone had made a film about these BBSes. They hadn't, so he decided he would.

Four years, thousands of miles of travelling, and over 200 interviews later, "BBS: The Documentary", a mini-series of 8 episodes about the history of the BBS, was made available in 2005. Spanning 3 DVDs and totalling five and a half hours, this documentary is actually eight documentaries about different aspects of this important story in the annals of computer history.

Also has some great electronic music.

OFFICIAL SITE: http://www.bbsdocumentary.com
CREATOR: Jason Scott (http://www.textfiles.com)

9 months, 1 week ago

Through eight episodes, director Jason Scott covers the 25 year history of the Dial-Up Bulletin Board System, a modem-connected computer system that let others connect to a computer over a phone line and leave messages and trade files. Containing 200 interviews, episodes mostly consist of elaborate montages of dozens of people composing a narrative.

BAUD is an introduction to the start of the BBS.
SYSOPS AND USERS is a montage of stories and thoughts on running BBSes.
MAKE IT PAY covers the BBS Industry.
FIDONET covers the amateur network of computers called Fidonet.
ARTSCENE covers the ANSI art scene of the 1990s.
HPAC covers Hacking and Phreaking BBSes.
COMPRESSION discusses the ARC-ZIP battle of 1988.
NO CARRIER discusses the "end" of the dial-up BBS.

The BBS (bulletin board system) scene of the 80s and 90s was a magical time. Long before the Internet escaped from the lab, connected the planet and redefined what it meant to use a computer there was a brave and pioneering band of computer users who spent their time, money and sanity setting up their home computers and phone lines to welcome anyone who called.

In the Summer of 2001, Jason Scott, a computer historian (owner textfiles.com) wondered if anyone had made a film about these BBSes. They hadn't, so he decided he would.

Four years, thousands of miles of travelling, and over 200 interviews later, "BBS: The Documentary", a mini-series of 8 episodes about the history of the BBS, was made available in 2005. Spanning 3 DVDs and totalling five and a half hours, this documentary is actually eight documentaries about different aspects of this important story in the annals of computer history.

Also has some great electronic music.

OFFICIAL SITE: http://www.bbsdocumentary.com
CREATOR: Jason Scott (http://www.textfiles.com)

9 months, 1 week ago

Through eight episodes, director Jason Scott covers the 25 year history of the Dial-Up Bulletin Board System, a modem-connected computer system that let others connect to a computer over a phone line and leave messages and trade files. Containing 200 interviews, episodes mostly consist of elaborate montages of dozens of people composing a narrative.

BAUD is an introduction to the start of the BBS.
SYSOPS AND USERS is a montage of stories and thoughts on running BBSes.
MAKE IT PAY covers the BBS Industry.
FIDONET covers the amateur network of computers called Fidonet.
ARTSCENE covers the ANSI art scene of the 1990s.
HPAC covers Hacking and Phreaking BBSes.
COMPRESSION discusses the ARC-ZIP battle of 1988.
NO CARRIER discusses the "end" of the dial-up BBS.

The BBS (bulletin board system) scene of the 80s and 90s was a magical time. Long before the Internet escaped from the lab, connected the planet and redefined what it meant to use a computer there was a brave and pioneering band of computer users who spent their time, money and sanity setting up their home computers and phone lines to welcome anyone who called.

In the Summer of 2001, Jason Scott, a computer historian (owner textfiles.com) wondered if anyone had made a film about these BBSes. They hadn't, so he decided he would.

Four years, thousands of miles of travelling, and over 200 interviews later, "BBS: The Documentary", a mini-series of 8 episodes about the history of the BBS, was made available in 2005. Spanning 3 DVDs and totalling five and a half hours, this documentary is actually eight documentaries about different aspects of this important story in the annals of computer history.

Also has some great electronic music.

OFFICIAL SITE: http://www.bbsdocumentary.com
CREATOR: Jason Scott (http://www.textfiles.com)

9 months, 1 week ago

Through eight episodes, director Jason Scott covers the 25 year history of the Dial-Up Bulletin Board System, a modem-connected computer system that let others connect to a computer over a phone line and leave messages and trade files. Containing 200 interviews, episodes mostly consist of elaborate montages of dozens of people composing a narrative.

BAUD is an introduction to the start of the BBS.
SYSOPS AND USERS is a montage of stories and thoughts on running BBSes.
FIDONET covers the amateur network of computers called Fidonet.
MAKE IT PAY covers the BBS Industry.
ARTSCENE covers the ANSI art scene of the 1990s.
HPAC covers Hacking and Phreaking BBSes.
COMPRESSION discusses the ARC-ZIP battle of 1988.
NO CARRIER discusses the "end" of the dial-up BBS.

The BBS (bulletin board system) scene of the 80s and 90s was a magical time. Long before the Internet escaped from the lab, connected the planet and redefined what it meant to use a computer there was a brave and pioneering band of computer users who spent their time, money and sanity setting up their home computers and phone lines to welcome anyone who called.

In the Summer of 2001, Jason Scott, a computer historian (owner textfiles.com) wondered if anyone had made a film about these BBSes. They hadn't, so he decided he would.

Four years, thousands of miles of travelling, and over 200 interviews later, "BBS: The Documentary", a mini-series of 8 episodes about the history of the BBS, was made available in 2005. Spanning 3 DVDs and totalling five and a half hours, this documentary is actually eight documentaries about different aspects of this important story in the annals of computer history.

Also has some great electronic music.

OFFICIAL SITE: http://www.bbsdocumentary.com
CREATOR: Jason Scott (http://www.textfiles.com)

9 months, 2 weeks ago

Through eight episodes, director Jason Scott covers the 25 year history of the Dial-Up Bulletin Board System, a modem-connected computer system that let others connect to a computer over a phone line and leave messages and trade files. Containing 200 interviews, episodes mostly consist of elaborate montages of dozens of people composing a narrative.

BAUD is an introduction to the start of the BBS.
SYSOPS AND USERS is a montage of stories and thoughts on running BBSes.
FIDONET covers the amateur network of computers called Fidonet.
MAKE IT PAY covers the BBS Industry.
ARTSCENE covers the ANSI art scene of the 1990s.
HPAC covers Hacking and Phreaking BBSes.
COMPRESSION discusses the ARC-ZIP battle of 1988.
NO CARRIER discusses the "end" of the dial-up BBS.

The BBS (bulletin board system) scene of the 80s and 90s was a magical time. Long before the Internet escaped from the lab, connected the planet and redefined what it meant to use a computer there was a brave and pioneering band of computer users who spent their time, money and sanity setting up their home computers and phone lines to welcome anyone who called.

In the Summer of 2001, Jason Scott, a computer historian (owner textfiles.com) wondered if anyone had made a film about these BBSes. They hadn't, so he decided he would.

Four years, thousands of miles of travelling, and over 200 interviews later, "BBS: The Documentary", a mini-series of 8 episodes about the history of the BBS, was made available in 2005. Spanning 3 DVDs and totalling five and a half hours, this documentary is actually eight documentaries about different aspects of this important story in the annals of computer history.

Also has some great electronic music.

OFFICIAL SITE: http://www.bbsdocumentary.com
CREATOR: Jason Scott (http://www.textfiles.com)

9 months, 2 weeks ago

Through eight episodes, director Jason Scott covers the 25 year history of the Dial-Up Bulletin Board System, a modem-connected computer system that let others connect to a computer over a phone line and leave messages and trade files. Containing 200 interviews, episodes mostly consist of elaborate montages of dozens of people composing a narrative.

BAUD is an introduction to the start of the BBS.
SYSOPS AND USERS is a montage of stories and thoughts on running BBSes.
FIDONET covers the amateur network of computers called Fidonet.
MAKE IT PAY covers the BBS Industry.
ARTSCENE covers the ANSI art scene of the 1990s.
HPAC covers Hacking and Phreaking BBSes.
COMPRESSION discusses the ARC-ZIP battle of 1988.
NO CARRIER discusses the "end" of the dial-up BBS.

The BBS (bulletin board system) scene of the 80s and 90s was a magical time. Long before the Internet escaped from the lab, connected the planet and redefined what it meant to use a computer there was a brave and pioneering band of computer users who spent their time, money and sanity setting up their home computers and phone lines to welcome anyone who called.

In the Summer of 2001, Jason Scott, a computer historian (owner textfiles.com) wondered if anyone had made a film about these BBSes. They hadn't, so he decided he would.

Four years, thousands of miles of travelling, and over 200 interviews later, "BBS: The Documentary", a mini-series of 8 episodes about the history of the BBS, was made available in 2005. Spanning 3 DVDs and totalling five and a half hours, this documentary is actually eight documentaries about different aspects of this important story in the annals of computer history.

Also has some great electronic music.

OFFICIAL SITE: http://www.bbsdocumentary.com
CREATOR: Jason Scott (http://www.textfiles.com)

9 months, 2 weeks ago

Ed Snowden's latest interview from Moscow.

10 months, 1 week ago
ShP

Apparently, someone has broken into our home, vehicle and a neighbor has linked directly to the Hydro meter.

Science is good.

10 months, 1 week ago

[Disobey 2020] Keynote, Friday - Mikko Hyppönen

How to survive the extinction event

Disobey: https://disobey.fi/
Follow us on twitter: https://twitter.com/disobey_fi

#hackers #precrime#iot

#disobey#hacking#nwo#5g

10 months, 2 weeks ago

Can you really play as Reptile in the first Mortal Kombat game on the Genesis along with other characters?

-------------------------------------------------------------------------------------------------------------
Where to Find Me

Deviant Art - http://videogamehunter.deviantart.com/

Twitter - https://twitter.com/vgh32

Facebook - https://www.facebook.com/thevideogamehunter/

Twitch - https://www.twitch.tv/videogamehunter

-------------------------------------------------------------------------------------------------------------
Music

Song - Vip
By- Mighty Rabbit Studios
Album - River City Girls

Song - Wrong Turn
By - Mighty Rabbit Studios
Album - River City Girls

Song - Hunt
By - Mighty Rabbit Studios
Album - River City Girls

10 months, 4 weeks ago

Hacking electrical systems to steal diamonds in strategy puzzle game Circuit Heist.

To download Circuit Heist (for Windows or Mac OS) check out itch.io - https://jemsmith.itch.io/circuit-heist

SUPPORT CRYPTIC HYBRID VIA...

PAYPAL DONATIONS

https://www.paypal.me/CrypticHybrid

EPIC GAMES STORE

When buying anything on the store please use this tag - CRYPTIC-HYBRID

HUMBLE BUNDLE

When buying something from Humble Bundle simply add "?partner=cryptichybrid" to the end of the page's URL press Enter and make your purchase. :)

Sign up for Humble Monthly
https://www.humblebundle.com/monthly?partner=cryptichybrid

FANATICAL

Buy games or bundles from Fanatical - https://www.fanatical.com?ref=cryptichybrid

BRAVE BROWSER

Download and check out the Brave Browser - https://brave.com/cry645

To keep up to date with ALL the Cryptic Hybrid things check out:
- FACEBOOK: https://www.facebook.com/cryptichybrid/
- TWITTER: https://twitter.com/CrypticHybrid
- MINDS: https://www.minds.com/CrypticHybrid

Also don't forget to SUBSCRIBE on
- YOUTUBE www.youtube.com/cryptichybrid
- BITCHUTE https://www.bitchute.com/channel/EubfxkwmwQmW/
- DTUBE https://d.tube/#!/c/cryptichybrid

11 months, 3 weeks ago

Exciting new malware being sent out.

1 year ago