2600 Salt Lake City's journal picture

2600 Salt Lake City

followFollow
🤴
Administrator: hacker
🕒
Created 12 Apr 2019
📄
22 Articles

Believe it or not, there are Hackers in Utah

Raw Socket Access in Windows XP

hacker's profile picture
Published in 
 · 12 Apr 2019
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-= -= Raw Socket Access in Windows XP =- -= By Tierra =- -= tierra@phreaker.net =- -= http://www.2600slc.org =- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- First let me explain what raw socket access means. While performing attacks such as DDoS attacks, you would need to cover your IP address to not get traced and caught by spoofing your IP address, but IP spoofing requires root access on Unix systems, so that the attack software can open a "raw" network socket. Most applications use "cooked" socket...

A History of Cryptography

hacker's profile picture
Published in 
 · 12 Apr 2019
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-= -= A History of Cryptography =- -= By SigningiS =- -= signingis@signingis.com =- -= http://www.2600slc.org =- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Simple Ciphers Secrets are as old as language itself. In the effort to keep information secret, various methods have been used: codewords, secret meetings, messengers and ciphers. Ciphers ended up being the most widely used. The true meaning of codewords can be inferred from the context of the message. Meetings can be infiltrated. Messengers can...

Introduction to Fundamental Logic Circuits

hacker's profile picture
Published in 
 · 12 Apr 2019
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=- -= Introduction to Fundamental Logic Circuits =- -= By Serial =- -= serial@digitalgenocide.net =- -= http://www.2600slc.org =- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= In this talk I will answer the following question. What is a logic circuit? I will also give a brief introduction into how a logic circuit functions. Well, computer logic is defined as "The science of reasoning. In other words, it is the development of a reasonable or logical conclusion based on known information." (www.tp...

IPSec a Down and Dirty Introduction

hacker's profile picture
Published in 
 · 12 Apr 2019
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- -= IPSec a Down and Dirty Introduction =- -= By rudeboy =- -= rudeboy@xmission.com =- -= http://www.2600slc.org =- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- What IPSec is IPSec is a protocol established by the IETF (Internet Engineering Task Force) to enable secure communications between two or more hosts via IP. It can provide access control (establish communication based on policy i.e. server refusal to communicate with a client who cannot speak IPSec), data origin authentication (can I believe this person says who ...

Mac OSX: An Introduction

hacker's profile picture
Published in 
 · 12 Apr 2019
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-= -= Mac OSX: An Introduction =- -= By ProtomanX =- -= proto@geeksyndicate.net =- -= http://www.2600slc.org =- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- MAC OSX Before I begin to explain the actual functions of OSX, I'll run down the history of Macintosh OSX. On March 24th, 2001, the world was introduced to a Mach based BSD UNIX OS with a pretty Graphical User Interface (GUI), called Aqua. The combination of the mach kernel BSD and the classic apple, "Aqua" GUI, made one of the most powerful oper...

DSniff: Use and Abuse

hacker's profile picture
Published in 
 · 12 Apr 2019
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-= -= DSniff: Use and Abuse =- -= By Oshu =- -= unixsecured@yahoo.com =- -= http://www.2600slc.org =- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- � Words from the Past Arpa Network Working Group Bob Metcalfe (PARC-MAXC) Request for Comments: 602 Dec 1973 "The Stockings Were Hung by the Chimney with Care" The ARPA Computer Network is susceptible to security violations for at least the three following reasons: (1) Individual sites, used to physical limitations on machine access, have not yet taken suf...

Linux Transparent Firewall (Bridge Firewall, Layer 2)

hacker's profile picture
Published in 
 · 12 Apr 2019
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-= -= Linux Transparent Firewall (Bridge Firewall, Layer 2) =- -= By Mutilator =- -= muti@hektik.org =- -= http://www.2600slc.org =- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- http://bridge.sourceforge.net/docs/Firewalling%20for%20Free.pdf Download bridge-utils package Download kernel source 2.4.18 and extract (/usr/src/) or use Redhat kernel RPM's w/ patched code. Download netfilter (latest version that will work with 2.4.18) Download bridge/iptables kernel patc...

Tweaking OSX for Speed

hacker's profile picture
Published in 
 · 12 Apr 2019
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=- -= Tweaking OSX for Speed =- -= By Manic Velocity =- -= manicvelocity@geeksyndicate.net =- -= http://www.2600slc.org =- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= Mac OSX is considered the world's most advanced operating system. And in my opinion it is. It's Unix core makes it practically uncrashable and the GUI really nice to look at. But with all due respect, OSX is a tad slow. Compared to OS9, windows take a a bit longer to open, applications take a little while to load up, and Internet...

Pirate Radio

hacker's profile picture
Published in 
 · 12 Apr 2019
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=- -= Pirate Radio =- -= By Manic Velocity =- -= manicvelocity@geeksyndicate.net =- -= http://www.2600slc.org =- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= What is Pirate Radio? ------------------------------- Pirate radio is simply broadcasting on an AM or FM band without a liscence. Pirates broadcast either because they want to become radio personalities, or they don't find commercial radio all that interesting. Clandestine, or "Guerilla" radio stations are pirate radio stations that are po...

Footprinting And The Basics Of Hacking

hacker's profile picture
Published in 
 · 12 Apr 2019
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-= -= Footprinting And The Basics Of Hacking =- -= By Manic Velocity =- -= manicvelocity@geeksyndicate.net =- -= http://www.2600slc.org =- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- � What Is Footprinting? Footprinting is the first and most convenient way that hackers use to gather information about computer systems and the companies they belong to. The purpose of footprinting to learn as much as you can about a system, it's remote access capabilities, its ports and services, and the aspects of its...
loading
Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT