wiby  
Settings



"A File Format to Aid in Security Vulnerability Disclosure" by Colin Cogle

http://colincogle.name/blog/security-txt/

issue) of 2600: The Hacker Quarterly ( pp. 57-58). Please support the official release bybuying a paper or PDF copy of the magazine! Article re-published and updated May 19, 2022
When security vulnerabilities are discovered by researchers, proper reporting channels are often lacking. As a result, vulnerabilities may be left unreported.

Resources: Informal Trojan Detection Test # 1

http://www.spywarewarrior.com/uiuc/trojans/tr-tests.htm

also not an experienced hacker or cracker. (" Damnit, Jim, I'm just an English major! ") Although I have made every attempt to make these tests as useful and reliable as

cadence's weblog (personal blog)

https://cadence.moe/blog

the Mario Kart Wii hacker 2020-05-04 May the 4th 2020-05-03 Small preparations 2020-05-02 Relang 2020-05-01 Assignment continues 2020-04-30 End of April 2020-04-29 Java test scrip

Do you feel overwhelmed trying to stay up to date with the latest tech news?

https://unixdigest.com/articles/do-you-feel-overwhelmed-trying-to-stay-up-to-date-with-the-latest-tech-news.html

600 has been released. Hackers cracked foo website. This and that company has been hit by ransomware. X has increased by 33% while Y has decreased by 78%. Bla bla bla bla bla. Wow

That time I wrote malware and got caught | nicole@web

https://ntietz.com/blog/that-time-i-wrote-malware/

had open. Like any good hacker, I developed my malware in my parents' basement.And like any good hacker, I tested it on my friend first.Shoutout to Andrew for running something I

Stuff Michael Meeks is doing

https://apple-tree.life/~michael/blog/2011/

code pointers tohelp a hacker; more mail. Lunch. Out to N. and M.'s school /nativity play - lots of fun-sized singing: featuring N. theglockenspiel playing angel, and M. one of a

How to choose a browser for everyday use?

http://digdeeper.love/articles/browsers.xhtml

the normie, and not the hacker . That's why JS is enabled by default, and then there are all those measures attempted to contain it. It even gives up the FSF's favorite licensing

jwzrants

https://www.jwz.org/gruntle/

the unfrozen caveman hacker show 2003 books 2003 or, some stuff I read 2004 music 2003 or, some more stuff that didn't suck 2003 thai or, at home he's a tourist 2003 rock or, perh

UFies.org - Geek News, Links, & Technology On A Daily Basis

https://www.ufies.org/

this and posted on hacker news with a few links to archives that have been spidered over the years. I've added a link to the sidebar with this link for posterity. I have no idea a

Links

http://kaisernet.org/links.htm

HDDs and SSDs. Resource Hacker Resource Hacker can extract and replace icons and edit strings in Windows executables and DLLs. Inexperience Patcher Restores all possible Windows X

Sim's bookmarks

https://simbook.neocities.org/

web. Based Dig Deeper Hacker News Koshka's Kingdom Library of Chadnet Luke Smith LWN.net Mary Allison 's videos via Invidious Mental Outlaw 's videos on Odysee Richard Stallman's
My collection of based sites, useful tools and interesting reads on the web.

Linux Format

https://linuxformat.com/

Have you got the l33t hacker skills to take Tux’s hacking challenge? Get up to speed with the tools, techniques and distros you need to monitor and interrogate networks, spoof AI


Find more...