Skip to main content

Home/ VITTAlearning/ Group items tagged hack

Rss Feed Group items tagged

Roland Gesthuizen

Why We Hack: The Benefits of Disobedience - 0 views

  •  
    Sometimes disobedience is necessary and good when rules fail us, and it's at the core of why we hack. Hacking is a means of expressing dissatisfaction, confounding the mechanism, and ultimately doing better. Here's why it's so important.
Roland Gesthuizen

The Little White Box That Can Hack Your Network | Wired Enterprise | Wired.com - 0 views

  •  
    the Pwn Plug is pretty much the last thing you ever want to find on your network - unless you've hired somebody to put it there. It's a tiny computer that comes preloaded with an arsenal of hacking tools. It can be quickly plugged into any computer network and then used to access it remotely from afar.
Roland Gesthuizen

Exposed: hacking threat to our vital buildings - 0 views

  •  
    "You're in intensive care at a hospital when the lights go out and the heating turns up. Meanwhile, doctors trying to get you to an operating theatre have been trapped in elevators for almost an hour as hackers take control. Experts are warning that this fictitious scenario is all too plausible after two researchers discovered in Australia 653 computer-based building management systems attached to the public internet."
Roland Gesthuizen

The fly-by, Wi-Fi hacking machine - 0 views

  •  
    "Kitted out with a miniature Raspberry Pi computer for a heads-up display (HUD) integrated in an external helmet, two Mikrotik routers, wireless sniffing and attack tools, GPS and a netbook, the motorcycle is able to detect wireless access points and plot them on Google Maps."
Roland Gesthuizen

TinyURL-The Tiny Fear | Symantec Connect Community - 1 views

  • Although these dwarf URLs make it difficult to mouse over a link to see the exact destination, if you suspect that a TinyURL link you've received might be hiding a malicious URL, you can check it out without clicking the link.
  •  
    "The popularity of TinyURL provides fraudsters with a golden opportunity to exploit the service. Attackers can take advantage of the system to make phishing URLs less suspicious to anti-phishing detection, since the shortened form of the phishing URLs will be totally unrelated to the targeted brands/websites. In a phishing scenario, this service is problematic to the recipients of phishing emails because this makes it difficult to mouse over a link and see exactly where it's going."
Roland Gesthuizen

What A DDoS Attack Looks Like | Gizmodo Australia - 0 views

  • the DDoS attack force completely bombards the site with traffic at one specific chokepoint, leaving other legitimate requests to bounce away unfulfilled as the server struggles to keep its head above water. For some context
  •  
    "When hackers do cyber-battle, there isn't much to see. Maybe you'll wind up on a crashed website, but the real carnage is happening behind the scenes, perpetrated by a diffuse army of computers a world away. This is what it looks like."
Roland Gesthuizen

Free ride: students crack ticket algorithm - 0 views

  • other university students started looking at a public transport's ticketing system because they were fans of public transport and interested in how the data was encrypted. They were also interested in what protections were in place against malicious users creating fake tickets
  • they were already aware of the potential flaws, but it was a large and expensive operation to change the tickets
  • cryptography should be impossible to crack, even if a potential attacker or reverse engineer knows every detail about how it is implemented. This system on the other hand is relying completely on users not knowing how it is implemented, which may have been fine when it was introduced in the early '90s because much fewer people had access to the technology required to read the tickets, or computers fast enough to analyse the data
  •  
    "A team of university students in Sydney have cracked the secret algorithm used on Sydney's public transport tickets for buses, trains and ferries, which they say could allow them to print their own tickets. "
Roland Gesthuizen

Roland Gesthuizen - Google+ - It is late but am I excited, you bet I am! I ha... - 0 views

  •  
    It is late but am I excited, you bet I am! I have managed to get the Windows powered assessment and reporting software Accelerus that our school uses running on my OSX laptop. Check out the screenshot below. Was a bit tricky but Google was my friend as I tried out a couple of different ideas. The best guide I found was perhaps this one. It does require a knowledge of partitions and terminal commands but it worked a treat fo me. Along the way, I learned heaps and enjoyed the tinkering. I might have some fun and try to get Ubuntu Linux running again on this computer.
anonymous

10 Creative Uses of the New Facebook Profile [PICS] - 0 views

  •  
    "Facebook users are showing off some serious creativity by taking advantage of the new profile page photo layout."
Roland Gesthuizen

What is Traitorware? | Electronic Frontier Foundation - 1 views

  • Traitorware is sometimes included in products with less obviously malicious intent.
  • Don’t let these good intentions fool you—software that hides itself from you while it gives your personal data away to a third party is dangerous and dishonest.
  • traitorware: devices that act behind your back to betray your privacy.
  •  
    "Traitorware is not some science-fiction vision of the future. It is the present. .. We believe that your software and devices should not be a tool for gathering your personal data without your explicit consent. "
  •  
    Interesting IT issue related to the gathering and use of personal data.
Roland Gesthuizen

Report Cards Are In: So Did the iPad in the Classroom Make the Grade? | Hack Education - 1 views

  • tablets — the hardware, the apps, the digital textbooks — will get more student-friendly in coming years
  • the Penn State English department views this fall’s iPad experiment “a success,” and Selber says that department instructors are interested in more iPad implementations.
  •  
    Following the launch of the iPad last spring, many schools made headlines by announcing their plans to distribute the devices to teachers and students and to incorporate the iPad into coursework. Now that the fall term is over, several of those schools are reporting on what was, for many, the first full semester using iPads in the classroom. So does the iPad make the grade? If so, will it usher in a new wave of educational tablets as some analysts are predicting?
1 - 11 of 11
Showing 20 items per page