-
Notifications
You must be signed in to change notification settings - Fork 0
/
ArticleList.txt
905 lines (904 loc) · 28.1 KB
/
ArticleList.txt
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
Volume : Number
---------------
V31:N3
######
A Tale of Many Hackers
The Demoscene - Code, Graphics, and Music Hacking
Bugging a Room with an IP Phone
Hack the Track: Put Your Money Where Your 0wn Is!
Linux Pwned - Just Not By Me
Writing Buffer Overflows for Non-Programmers
Remailing with USPS
Forensic BioInformatics Hacks
Spam: Where Does It Come From?
Checkmate or How I Bypassed Your Security System
Installing Debian on a Macbook Pro without rEFInd or Virutal Machines
Film Review: Die Gstettensaga: A Call to Class Consciousness for Hackers
Xfinite Absurdity: True Confessions of a Former Comcast Tech Support Agent
Covert War-Driving with WiGLE
Quantum Computers for Code Breaking
InfoSec and the Electrical Grid: They Go Together Like Peas and Carrots
---------------
V32:N1
######
Nous Defions Tout
So, You Want to Be a Darknet Drug Lord....
Out of the Box Survival - A Guide to Powershell Basics
Brazil's Electronic Voting Booth
Evolution of a Hack
Bleeper - Downloading Full-Length Preview MP3s from bleep.com
The Enterprise, the Subverted PKI Trust Relationship, and You
WYSE Moves
Office Talk or Social Engineering?
Archiving ComiXology
McAfee Family Protection - Epic Fail!
Abusing the Past
Hacking the HandLink Gateway
Ohio Prison IT Security from the Inside
Hacking For Knowledge
Linux Containers for Event Training
Are Smart Meters the End-All?
---------------
V32:N2
######
Old and New Together
I Tapped That... Tapping a Nationwide Telecommunications Network
Use Your 3D-Capable TV to View 3D Stills of Your Own Making
A Phone Story
Chiron and Me: Hacking Astronomy
Nigrum Libro Interceptis
Library Security
Decoding a Carrier Pigeon
Attitude Adjustment: How to Keep Your Job
Out of the Box Survival, Part Two
Coding as a Foundational Skill
A Plea for Simplicity
Ransomware: Still Active and Looking for Victims/Volunteers
Fiction: Hacking the Naked Princess 0xD-0xE
---------------
V32:N3
######
The Hacker Image
A Primer on Home Automation (and How Easy It Can Be)
Dangerous Clouds
Unexpected Denial Of Service
A Convenient Method for Cloud Storage with Preserved Privacy
Ashley Madison Military Sites
The Technology at QPDC
Open Source Repository Abuse
My Voice Is My Key
Fun with Billing Forms nd International Debit Cards
Going Nuclear - A Tale of Revenge
Malware Attacks - Leave Those [Banks] Alone
Mr. Robot - A Ray of Light in a Very Dark World
Cruising the Wideband Spectrum
The Dawn of the Crypto Age
Account Hack: Anyone Can Be aa Victim
Fiction: The Stars Are Tomorrow
---------------
V32:N4
######
The New Normal
The Best Way to Share a Tresure Map
USBkill - A Program for the Very Paranoid Computer User
Circumventing Chrome and Firefox's Third Party Cookie Block
TELECOM INFORMER
Pushing the Limits
Romeo Tango Oscar
Yull Encryption
A Brief Cryptanalysis of Yull
HACKER PERSPECTIVE
How to Get Free Gogo In-Flight Internet Access
Accessing Admin Priveleges: A Quest Through One of Mac's Backdoors
Perspectives on Cyber Security
The Splotchgtae Saga
Hackerspcaes: A Definition
You Gotta Leran From This, Kid
The Limits of Open Source Hardware
Rewriting History
The Herculean Task of Making a Documentary on the History of Computer Hacking
Fiction: Hacking the Naked Princess 0xF
---------------
V33:N1
######
The Powers That Want to Be
Scraping for Cache, or It's Not Priacy If You Left It Out in the Open
Hacking Using Parse Database Injection
Hardware Hacking - Protecting Dev' Board I/O by Hacking an Alarm Panel
My President Twitter Bot Experiment
Defense Against the Black Arts of Forensics
A Plaan 9 Primer
Chesslin
Exploiting HTML - Maaking Your Browser a Vegetable
Exif Location Recon with Python
Eleventh Graders and Nuclear Bombs
Which Do We Prefer: Neanderthals or Hackers?
One Little Pig
Password and Mobility Security: Something Needs to Be Done
Another Solution to the USBKill..py Problem
Software Vaalidation
Reconaissnce at Spa World
My Local Weather Observaations
Fiction: The Bee in Van Pelt Park
---------------
V33:N2
######
Politics Comes Calling
Pre-Surveillanace of Law Enforcement Using Targeted Advertising
Abandoned Routers: Forgotten, But Not Gone
Card Transactions Explained
To Hack an Uber
Hacking Malaaysian Routers
Nigrum Libro Interceptis: Secundae
$35 Hacking Machine
Accidentally Logging In As Admin
Gaming Ingress
Learning Hacking via MinecraftEdu
Typing Fractions in Emails and Text Files
Surfing the Web Safely and Anonymously with Whonix
How I Socially Engineered a Job
Why We Need Privacy Rights
Free Windows
The Top Ten Reasons Why Hackers Should Get a Ham Radio License
Fiction: Hacking the Naked Princess 0x10-0x11
---------------
V33:N3
######
Promises
Haacking for Knowledge
MOV Before You JMP
It's Secuirty, Stupid
Freedom of Thought
TELECOM INFORMER
A Capative Portal Puzzle at Sea
Spyware Techniques
Building DIY Community Mesh Networks
Musical Monstrosities
HACKER PERSPECTIVE
The PirateBox
How To Google Bomb Someone
LETTERS
Verizon's HOPE Scam
The Easiest Wya to Break Into a Bank
Hacking Amazon E-Books with Spy Style
A Parallel President on Twitter
---------------
V33:N4
######
Dark Bubbles
Rescuing Fake Memory Devices
Having Fun with In-Store Chromecaast
The Coca-Cola Blacklist
Bypassing Privileges with Oracle Database Express Edition
Using Discord Servers to HTTP Flood
Successful Network Attacks - Phase One
Spying AAcross Borders in the Age of Email
InfoSec at Its Worst, OPSEC at Its Best
Can Security Be Built into Pure Data?
mcquery.js - a Web Scraper for Disc Golf Players
KBChat - Private, Encrypted Chaat via KBFS
2600 Leaaak Department
Memory Lane
Rotten Apples: OS X 101
Automatic Contest Winning via Selenium
The One About Tht File Server
Fiction: Hacking the Naked Princess 0x12
---------------
V34:N1
######
A Price for Truth
New U.K. Surveillance Laws - Time to Get Serious About Security
Voices in the Sky: Satellite Communication Methods
Lockbox PIN Code Generator
A Lock with the Key Next to It
Hacking Free Wi-Fi on Delta Flights
Telephones from Space
Longing for the Past
Getting Inspired as a Student
Google Auto-Fill Suggestions, Politics, and Magic
The Inner Circle... Part One
HAACKER PERSPECTIVE
Software Cracking with dotPeek
Ignore your .env - Browsing Environment Files on GitHub
Obfuscating Torrent Traaffic
Successful Network Attacks - Phase Two
White House Phone Numbers
How to Improve Zone Protection in Burglary Alarms
Validating Software Validation
Thoughts on Phoenix Project II
Those Cocaa Cola Freestyle Machines in Crew Mode
321 Studios Revisited
---------------
V34:N2
######
The Power of the Press
The Censorship Resistant Internet: How to Run a Tor Hidden Service
Converting the Voter Database and Facebook into a Google for Criminals
Hactivism to End Human Trafficking anad Modern Day Slavery
How Rogue One Taught Me Not to Be a Bad Guy
A Declaraation of Independence for Cyberspace
Demonsaw: Bypassing Anonymity Utilizing Social Engineering
Creating an Automated Open Wi-Fi Traaffic Capturing Tool for Under $20
0x8bc4 Before you 0xffe0
My Perspective
OPTingOUT
Analog vs. Digital Living: Real Solutions to Absolute Anonymity and Privacy
Building a Better Screen Locker for GNU/Linux
VR Trumpers
Successful Network Attacks - Phase Three
Advice from the Socially Engineered
Internet Thoughs
Fiction: Hacking the Naked Princess 0x13
---------------
V34:N3
######
EDITORIAL
Bypass Your ISP's DNS and Run A Private OpenNIC Server
PHP Backdoors
Inseparable: The Intersectionality of Hacking and Politics
Enhancing SQL Injection With Stored Procedures
How to Get Nearly Free Traavel from Scotrail
(learn LISP))
Reverse Engineering Electronic Letter and Number Toys
How to Hack Your Wy to a Guilt-Free Political Ideology
The Problem with IT Certifications and the Devaluation of Technology
A Little Brother's ManifestoA Test Harness for Fuzzing Font Parsing Engines in Web Browsers
Confessions of a (for Now Not So Successful) Bug Bounty Hunter
To Care or Not to Care
Scrape Textbooks, Save Money
googlecomp.py: The Complete Google Autocomplete Script
Obfuscating Biopolitics: AA Theoreticala Primer for Cyborgs and Others
Debt Journey
Successful Network Attacks - Phase Four
Splatter
---------------
V34:N4
######
Credit Denial
Using dnscat2 for Encrypted C&C over DNS
Educating Friends and Family About Online Security
Creaating Strong and Easy to Remember Passwords
Don't You Have a Smart Watch Yet?
Whata Hpapens When WHOIS Data Is Made Public
Deauthing the Neighbors, or Ring Theory
Nightmare on E Street (Modem and Me Against the World)
Quantum Computers and Bitcoin
I Want to Be aa Hacker....
Conventionalist Theory of Reference in Comparison to Programming Laanguage
Down and Out in a Land of Script Kiddies
Dispelling a Breach Rumor
The Russiaan Hacking Diatribe, and Why It Is Complete Agitprop Nonsense
Successful Network Attacks - Phase Five
Fiction: Hacking the Naked Princess 0x14
---------------
V35:N1
######
Embracing Empowerment
The Secrecy and Security of the Special Counsel
What Programming Language Should I Learn? Why Not All of Them?
Breaking Standards?
How to Run an I2P Hidden Service
Bitcoin or Bit Con? One Newbie's Adventures in Cryptoland
The Case of the Murderous AI
In Defense of the Net
A Review of CopperheadOS
SSH Keys and Challenges in Enterprise Environments
Unlocking the Secret of Keys
Hacking our Attitudes (The Key to Being a Better Attitude Trumper)
Historic Hacking
CITIZEN ENGINEER
Bluetooth Hacking 101
Hidden ISPs
Extrapolating Phone Numbers Using Facebook and Paypal
The Free Flow of Information
---------------
V35:N2
######
Celebrate the Difference
A N00b's Guide to the Dark Web
The IPv6 Delusion
How to Be a Guitar Hero, IRL
Even Restraunts Need InfoSec
Serial Number Cracking For Fun and Profit
Automating a Police State
Brute Forcing a Car Door with Math
Hack(ed), the Earth
A Hacker Adventure in Urban Exploration
Beyond the Scare-Mongering
CITIZEN ENGINEER
Re-Purposing Old Technology and Ideas for Fun and Emotional Profit
Hacking: Quick nad Easy
Thoughts on CryptoCurrency
Fiction: Hacking the Naked Princess 0x15
---------------
V35:N3
######
Injustice for All
Digital Sanctuary Cities
Removing eBook DRM without OCR or GUIs
A Carrier Pigeon Revisited
The Evolution of Ran$omware
Hackers to the Rescue! (Maybe)
Book Review: The Art of Invisibility
GDPR - Active Empowerment vs. Passive Consumerism
A Characteristic Study of IoT Botnets: Understanding the Design and Behavior
Ms. Reality Winner is an American Dissident
More Ways to View Hacking
Totalitarian Control: How We Used PowerShell to Manipulate User Behavior
What Do Lawyers and Hackers Have in Common?
No Country for Incarcerated Hackers
Bypassing Email Anti-Spam Filters
Hacker History: MDT or "The Mass Depopulation Trio"
Testing Your l337 h4x0r skillz Safely and Legally
Gone Phishin'
---------------
V35:N4
######
Taking Back Ownership
1979 Plus 40 Years
AV1: One Giant Leap for Video-Kind
YITM
Social Engineering from Prison
A Brief Tunneling Tutorial
Quantum Computers and Privacy
Hacking the School System
A Reading of the AI Hype Meter
Thumbcache.db Primer
Sorting It All Out: The Long Lost Bastard Children of the United States Postal Service
Configuration Negligence: Who is Responsible?
Facts About Honesty/Integrity Tests and Interviews
Book Review: Surveillance Valley: The Secret Military History of the Internet
Book Review: Ten Arguements for Deleting Your Social Media Accounts Right Now
Modem and Me: The Loose Ends
A Fork() in the Road
Making an Informed Business Decision Using Public Financial Records
To the Unknown Hacker
Hacking in a Slow Job Market
Fiction: Hacking the Naked Princess 0x16
---------------
V36:N1
######
Preserving the Future
Reverse Engineering Android Apps
Android Smartphone Secret Codes: Revealed
How to Make Your eBooks Inheritable
Web Scraping Scripts
Performing a MacGyver to Call Anyplace Home
Blast Accusations for Cybersecurity Intel
Be a Good BitTorrent Citizen
A Guide to ALKEMI
Second-Generation Quantum Computers
In-Browser Cryptojacking: An Old Threat in a New Guise
So You Want to Be a Coder
CITIZEN ENGINEER
Lights Out! Guerilla Radio
Why You Should Always Give out Your Telephone Number with the Area Code
We Just Called Them Dialers
Book Review: Weapons of Math Destruction
---------------
V36:N2
######
Convictions
Porting IoT Malware to Windows
There Is No Magic in the Clouds
Dank Kush or Fleet Vehicles?
How to Defeat Intelligence Tests
Connecting to the Internet for Free Using Iodine
Book Review: Broad Band: The Untold Story of the Women Who Made the Internet
We Will Rock You
The Hacker Mindset or How We Can Move the World
Let's Just Call It BitCon
The Madness Debate(or How I Got Locked out of My Computer)
Mechanical Keyboards
The Multiple Persona Theory of Digital Secrecy
Mini Mate - Rescuing Hardware from the Graveyard
CITIZEN ENGINEER
Get Those Digits
Potential VPN Attacks
Working for an ISP
Fiction: Hacking the Naked Princess 0x17
---------------
V36:N3
######
Our Audacity
Fully Homomorphic Encryption and Privacy
Who Is Watching Us?
The Mysteries of the Hidden Internet
Breaking DirecTV's DVR Authentication
Machine Rhapsody in 2099
Introduction to Computer Viruses, Example in Windows Powershell
All You Need is... Air
Twitter the Enemy
Student Privacy by Practice - Not by Policy
Online Thrift Stores Have Your Data
Active Defenses for Industrial Espionage
The Infocalypse
Book Review: The Big Nine: Tech Titans and Their Thinking Machines
Book Review: A People's History of Computing in the United States
CITIZEN ENGINEER
The Case Against Certified Ethical Hacking
Thoughts on Account Enumeration
Arduino-Based Burglary Zone Input Tester
"Information is Neutral" and Other Social Myths
---------------
V36:N4
######
From the Ashes
Industrial Control with Modbus
Ideas Behind Site Reliablility Engineering
Cyberspelunking
Steganographic Filesystem
Death of a Scene
Body Key-Logging
Rehabilitation Center - (Attacker's) Mission Complete
How to Get Free Wi-Fi Anywhere
What is Hacking?
Maximizing Privacy in a Digital World
Do-It-Yourself Cloudflare on a Budget
Book Review: Artificial Intelligence: A Very Short Introduction
Reflections on Hackers
Pass the Cookie and Pivot to the Clouds
Fiction: Hacking the Naked Princess 0x18
Student Privacy by Practice - Not by Policy (fixing our mistake)
---------------
V37:N1
######
The New Social Disease
Cracking Your Neighbor's Wi-Fi for $180
Hax0rz? Sniffing My Critical Infrastructure? It's More Likely Than You Think!
Null-Routing Facebook: Using Small Tech to Fight Big Tech
Hackerspace School
Learning Programming Through Hacking AOL
Has Your Password Been Pwned?
Antique Malware Can Still Bite You
Thoughts From a Newcomer
Why Is the DoD on My APN?
Finding Email Addresses
More Advanced Processors, Greater Privacy Intrusions
Printers: The Overlooked Security Concerns
The USPS Informed Delivery Service as a Phishing Data Source
Yahoo Groups and the Legacy of Internet Content
The Freephones of Whidbey Telecom
Point of Sale Shenanigans: Authorized Unauthorized Transactions
Electric Barons
Would You Like Some Pancakes With That Breach?
An Introduction to Chaff - an Anti-Forensics Method
---------------
V37:N2
######
Adaptation
Skimming Credit Card and ACH Payment Details from Tigerpaw Software Clients
The Pipe Dream of Sensible School Internet Policy
Windows Subsystem for Linux. A n00b5 Toy?
Towards a Secure Telephone Network
Ghost an Operating System for Privacy
Trackign Wi-Fi Devices with Python and GPS
Industrial Control Systems and Cybersecurity
Bad ISP OpSec
Anonymous Temporary Storage and Retrieval
How to Become a Hacker in 24 Hours
Thinking in AI
Fun with Text to Speech
Hacker Email
Cerebral Spill
OhNoDaddy: GoDaddy Compromised
Book Review: The History of the Future
ARTIFICIAL INTERRUPTION
The Rse of the Machines - Learning to Detect DGAs
Responsible Disclosure of a Malware Infiltration Attempt
Fiction: Hacking the Naked Princess 0x19
---------------
V37:N3
######
The Blame Game
Smile, You're On Camera
Cyber-Pandemic: The World in Ruins
Understanding Election Security Through the Lens of the Hierarchy of Voter Needs
HOPE 2020 Fulfilled - Debrief Overview
Hackign Rotary Dials
QR Chaos
Knowing What To Search For
Clean Rooms and Reverse Engineering
Searching Government Quiz Sites for Hidden Answers
Taking Control of Your Devices
The NSRL For Hackers
Make Viri Great Again
ARTIFICIAL INTERRUPTION
What's Old Is New Again - We Are Still Jackpotting ATMs
Facebook's Efforts Against Ad Blocking
Red Light Robin Hood
The Elements of a Raven Matrix
---------------
V37:N4
######
Errors in Freedom
The TikTok Spyware Conspiracy
Hacking Digital Signage Screens
How To Write Malware in PowerShell - Tips and Tricks
Beyond the Breach: An In-Depth Look into the Cyberinsurance Industry
Right To Be Forgotten - Network and Home
What Three Words, and Your 2600 Meeting
The Brazilian Phone System Revisited
Hacking the Game Rules
Book Review: If Then: How the Simulmatics Corporation Invented the Future
Hosting Under Duress
How One "S" Can Make a Difference
COVID-19: A Tale of Two Mindsets
Normalizing SASsy Data Using Log Transformations
ARITIFICIAL INTERRUPTION
Work From Home Through P2P Network
Chromebook as a Web Hacking Platform
Thinking in AI - Can AI Wake Up?
Thoughts on Bitcoin
---------------
V38:N1
######
Forward Thinking
Anonymity, Privacy, and Reality
What Hacking My County's Election Worker Portal Taught Me
Ham Radio, SMS, and the ISS
Randomize Your Exit Node
Logging Discord Tokens
Trojan Detection and Avoidance
5G Hotspots and Tinc
Book Review: We Have Been Harmonzied: Life in China's Surveillance State
A Layman's Intro to Quantum Computers
Inside Job: Exploiting Alarm Systems and the People Who Monitor Them
Why Are We Still Having This Conversation? Embedded Systems Still Not Secure
How Does NSA's XKEYSCORE Project Work?
A Proposal for the Elimination of Passwords
Life Lessons Can Help You Sneak Into a Crowded Conference
AI In Dating Simulations Games
ARTIFICIAL INTERRUPTION
Hacking HP's OfficeJet 6310
The Net As Seen in China
Picture This
Why I Am a Hacker: Hacking In the Era of COVID-19
---------------
V38:N2
######
What is Truth?
More Privacy and Better Security Through Email Diversification
Three Fundamental Questions
Fluc Google's FLoC
Municipalities Pwned at Greater Rates!
The Demise of Network Security
Who's Training Whom?
Hacking Motion Capture Software and Hardware
How to Read 2600 Magazine
Verified Badges for Everyone?
Gone Fishin'
Vulnerabilities in Deep Artificial Neural Networks
The Telegraph Regulations and Email
Facebook and the FBI
When 5G Technology and Disinformation Collide
How to Hack the American Mailz
"Post-Quantum Cryptography" Is Not Going to Work
Book Review: RESET: Reclaiming the Internet for Civil Society
Book Review: Rabbits
ARTIFICIAL INTERRUPTION
How To Create Your Own Privacy-Enabled Sunglasses
A File Format to Aid in Security Vulnerability Disclosure
"Hello fellow sentient being,"
An Atavistic Freak Out, Episode One
---------------
V38:N3
######
Amplification Gone Wrong
Wherever You Go, There You Are
Using "DeepChecksum" to Ensure the Integrity of Backups
I Thought the Cyberpunk Dystopia Would Be a Hacker Paradise
Where Have All the Tor Sites Gone?
The FBI Communications Breach of 2010: Applications and Perspectives
Book Review: Press Reset: Ruin and Recovery in the Video Game Industry
The Phreak's Guide to Identifying North American Phone Switches, Part One
Empty Houses
The Art of the Troll
Exploring Old MS Paint Formats
Keyspace Iterator in AWK
Hacking NYC MTA Kiosks
What's With This Username Stuff, Anywho?
The Matrix Is Real: How to Hack Humans for Fun and Profit
ARTICICIAL INTERRUPTION
Why TikTok Activism Made Actual Hacktivisim Harder
Reply to: "Normalizing SASsy Data Using Log Transformations"
Thoughts on "Verified Badges for Everyone?"
The Lost Art of Windows 9x Pranking
An Atavisitic Freak Out, Episode Two
---------------
V38:N4
######
The Hacker Curse
L-Band: Frequencies and Equipment You Need to Know About
In the Trenches: Working as a Security Analyst
How to Hack a Router Device Like NSA Employeees
Bitcoin: The Major Difference
Privacy Matters
Inside the New World of Cryptocurrency Phishing
Firewall Netcat
Hacking the Medical Industry
Putting Events on Twitter With the Help of Emojis
The Solution to the Technological Singularity
leet.c
Making Boring Work Great Again
Hacking Dark Souls II
Tenth Grade Social Engineering Project
When Onen Door Closes
Supply and Demand, Apollo 11, and GitHub
ARITICIAL INTERRUPTION
Hacking and Knowing - Some Thoughts on Masking Threshold
Book Review: I Have Nothing to Hide
Keeping Busy When Retired - It's Important
An Atavistic Freak Out, Episode Three
---------------
V39:N1
######
Renewed Hope
How to Create a Practical Burner Phone for the Average User
Exploring the BACnet Protocol for Fun and Profit
How to Use Gmail to Send Emails From an SMTP Server That You Do Not Own
FOIA as Weapon
Data Analysis as the Next Step
Web 3.0 is Bullshit
Book Review: Sandworm
Why You Need to Self-Host
Should I or Shouldn't I? Randsomeware Negotiation
Social Engineering Attacks Out of Control
Sleuthing Google Apps Part 1: Google Calendar
I Love Smart Working
The Phreak's Field Guide to Identifiying North American Phone Switches, Part Two
ARTIFICIAL INTERRUPTION
Has the CIA Cloud Service Become More Secure? Negative
The Author Does Not Exist
Harnessing Cryptocurrency Miners to Fight Climate Change
An Atavistic Freak Out, Episode Four
---------------
V39:N2
######
Social Media Is Neither
Phisphing in 2022
Plain Text in Plain Sight: Smaller Alternatives to the World Wide Web
Battle for Better Batteries
Command Line Unminifier
The Problem of Effective and Usable Strong Passwords
Hacking Traffic Lights
I'll Take Some Vigenere With My Caesar
Applications, Places, System: A Personal View of Linux
Dial-a-Word
End of the Dream
Why Exploiters Should Optimize Their Code
Hacking Into the Past
The Dark Side of DarkMatter: The Evil Hackers Behind Project Raven
I Don't Think I Was Supposed to See That
About Conversation, Thought, and Language
ARTIFICIAL INTERRUPTION
Brute-Forcing a Museum's Math Puzzle With Python
Hacking and Politics: Why Talking About Both Matters
An Atavistic Freak Out, Episode Five
---------------
######
V39:N3
The Rule of Law
The Internet of Problems
Keeping America Informed: An Introduction to Government Documents
Windows Installers
Hack Your Brain
Hacker Dilemmas
An Introduction Algorithm to Decoding an Enigma
Is It Time to Change Our Approach to Security?
Will You Let Your Car Drive Itself?
HACKER PERSPECTIVE
A Ripple Story
Hackers - What is Our Mission Statement?
How to Double-Spend a Bitcoin
Three Rules Against Tech Exposure and Dependency
Sneakers: 30 Years of a Cult Classic
Internet Landscape in Germany
ARITICIAL INTERRUPTION
What's Old is New Again: PDF Malware Part Deux
What Does "Impossible" Mean?
Freedom of Speech: Terms and Conditions
People vs. Corporations
An Atavistic Freak Out, Episode Six
---------------
V39:N4
######
Inconvenient Truths
You Can Use the Daark Web for Good
Degradation as DRM
We Love Trash
Friendly Fraud
Lets Party Like It's 1989
Current Bulletin Board Systems. How It's Done.
Intercepting Google CSE Resources
The Infosec Professional Song
HACKER PERSPECTIVE
YouTube Is Not A Safe Space
What Do You Mean You Don't Haave a Responsible Disclosure Program?
The Coolest Hcaker Multitool On the Market: The Flipper Zero
Cyber Security Frameworks
Music in Ones and Zeros: A Memory of Streaming Soundscapes
Cryptocurrency - Busted!
ARTIFICIAL INTERRUPTION
Tales for My Toddler
Raising Generation Orwell: A Guide to Teaching Kids the Human Rights of Privacy
scan.sh
The Search for Life at 300 Baud
Hey I Paid For This Cabin
An Atavistic Freaak Out, Final Episode
---------------
V40:N1
######
Progress of a Sort
Sleuthing Google Apps Part 2: The Google Application Suite
What About Tomorrow's Hackers?
Hacker Movies
A Post-Soviet Payphone Trick
TELECOM INFORMER
Organizing Music Files With SongRec and Shazam
What Is a Hacker?
Automated Vulnerability Scanners and a False Sense of Security
A COSMOORED Configuration Flaw
A Holistic Approach is Better
The Great Resignation: Faux Recruiters Social Engineering the **** Out of Applicants
HACKER PERSPECTIVE
Hacking The Lenovo 11e Chromebook
Known Plaintext Attacks Are Caesar-ous Business
American Shanzai, Part 1
LETTERS
EFFECTING DIGITAL FREEDOM
What is Futel?
The Power of Try
AI For Content Generation
Neuralink Thoughts
Quantum Computer Algorithms, Part 1: Quasi-Classical Methods
ARTIFICIAL INTERRUPTION
OpenAi's Chat-GPT3: A Manipulating PR Tool
Readme.exe
A Lifetime of Computing
HACKER HAPPENINGS
MARKETPLACE
MEETINGS
---------------
V40:N2
######
Artificial Nonsense
Programming of the Past
Science Fair and Congressional Farce
A Chain Addition Generator in AWK
Quantum Computer Algorithms, Part II: Amplitude Amplification
The Metaverse Is a Solution Looking for a Problem
Solipsism, AI, and the Future of Empathy
TELECOM INFORMER
Why I Am Not Panicked About Being Replaced by AI
Social Engineering: Quiet Nights Are Here Again
Hunting Apps for OSINT
Hacking the Hackers
Is There Anything Else I Can Assist You With?
HACKER PERSPECTIVE
Giving a Damn: Response to "A Holistic Approach is Better"
Book Review: The Future of National Intelligence
American Shanzai, Part 2
LETTERS
EFFECTING DIGITAL FREEDOM
Next Level AI: ChatGPT
Tomorrow's Challenges: Non-Fungible Tokens
ARTIFICIAL INTERRUPTION
A Tale of Insecurity
Microsoft, Stop Reading My Emails!
The Cybiko
Turing's Battle
HACKER HAPPENINGS
MARKETPLACE
MEETINGS
---------------
V40:N3
######
Memories to Come
Designing an OpenAI Powered IRC Chat Bot for Fun and Profit
Cute App, But I'll Use My Own
Saying Goodbye to an Old (GPFS) Friend
The Arrival of 2600 Digital Delivery
Why Aren't You Cracking Your Users' Passwords?
A Technology Life Story
Is AI More of a Tool or an Ethical Challenge?
Quantum Proof Encryption
But I Don't Want a Copilot
HACKER PERSPECTIVE
Diskless Malware
Hacking the Airwaves
Adventures in Zero Trust
American Shanzhai, Part 3
Go On a Journey
Morbid Curiosity in the Weaponized AI Era
See You on the C-Drive (A Series of Late 20th Century Fragments)
ARTIFICIAL INTERRUPTION
Is 2600 Still Relevant?
Learn Linux, People!
WasteTrackers and More
Turing's Battle
HACKER HAPPENINGS
MARKETPLACE
MEETINGS
---------------
V40:N4
######
The Road Behind
The Dark Side of DNA Data
The BoneBox
Artificial Intelligence and Creativity
Career and Gloating in Las Vegas
TELECOM INFORMER
Enhance Your Typing Experience With Mechanical Keyboards
Adventures in Lockpicking
Ooops; v97.129
Geo-Distributed Bug Bounty Hunting
Being a Hacker
Byte-Sized Justice: A Tale of Hacker Ethics and Copy Protection
A Quick Intro to Biohacking
HACKER PERSPECTIVE
Privacy: Protecting Your Personal Information Online
The AI Risk Nobody Seems to Mention
American Shanzhai, Part 4
LETTERS
EFFECTING DIGITAL FREEDOM
Quantum Computer Algorithms, Part III: DES Decryption
GPT Revolution: Reimagining Programming in the Era of AI
Snitched Out by Tech
I Fight for the Users
ARTIFICIAL INTERRUPTION
Platform Captialism Can't Surveil Absurdism (and Worse)
Alzheimer's and AR Tech
Book Review: Pegasus
Book Review: Fancy Bear Goes Phishing
HACKER HAPPENINGS
MARKETPLACE
MEETINGS
---------------
V41:N1
######
Ill Communication
"Trust Me, I'm a Professional." How to Social Engineer AI to Bypass Learned Ethics
A Brief Guide to Sci-Hub
Further Password Discourse - Fundamentals
The Elephant in the Room
Hacks, Leaks, and Revelations: The Art of Analyzing Hacked and Leaked Data
Listening to Your Computer
"HP Smart" - Or a Lie in Two Words
Overcoming Toyota USB Filesystem Limits
About DuckDuckGo's Sources
HACKER PERSPECTIVE
Host Identification With USB Devices
The Garden of Privacy
Unglorifie Look at Your Career in IT
Reflections on Wikileaks and Snowden
Is Quantum Mechanics a Pseudoscience?
I Killed Something Awful
Binary Attitudes Do Not Belong in an Analog World
GendBuntu, Free Software, and Microsoft in the French Government
AI Is Not the Problem - We Are
Lee Williams, Harassment Agent Episode 1
---------------
V41:N2
######
How the Mighty Have Fallen
Am I a Hacker?
A Response to a Call to Arms
Big Tech Is the New Soviet Untion
Cookie Monster
Autism: Of Unmapped Territories, Eugenic(ide)s, and Anti-vaxxers
Encoded Audio Capture The Flag
Payphone Extenders: The Access Numbers that Replaced Red Boxing - Part 1
HACKER PERSPECTIVE
AI Exploitation: A Mundane Economic Apocalypse
Hacking, Old School
Understanding MAC Addresses: Construction, Significance, and Spoofing Methods
Data Breaches and the Role of Stolen Credentials in 2023
A Declaration of Love to Amateur Radio
Quick Disk Overwrite Script
The Politics of Joyful Living - Minus Social Media and the Internet
I Sell Shoe Oil
Lee Williams, Harrassment Agent Episode 2
---------------
:
######