Fascinating article, perhaps real: “He Was a Hacker for the NSA and He Was Willing to Talk. I Was Willing to Listen.”

Fascinating article, perhaps real: “He Was a Hacker for the NSA and He Was Willing to Talk. I Was Willing to Listen.”

Mr. Robot has spawned or reinforced a dozen stereotypes about hacker-types. A lot of them are pretty unfortunate, like the association of hacking with mental illness. This article goes deep on a More »

[ Hacking 101 ] Why you should be using a proxy server (sometimes)

[ Hacking 101 ] Why you should be using a proxy server (sometimes)

One of the trickiest things about hacking is knowing what kind of anonymity tool to use, when. If what you are doing involves only the Internet (i.e. web pages and web sites), More »

Devices You Should Never Build, Oh No

Devices You Should Never Build, Oh No

From Hackaday comes this interesting article about the Internet of Things, which will inevitably lead to a few terrible ideas, what they call the “Internet of Wrongs.” What would you think of More »

[ Hacking 101 ] Being Anonymous: VPNs

[ Hacking 101 ] Being Anonymous: VPNs

Sometimes you can go about your business out in the open, on the Internet and everywhere. But sometimes you don’t want to be seen. It’s a good thing there are lots of More »

Security for Web Developers: 01

Security for Web Developers: 01

With Glenn Norman Get a basic understanding of how servers and security play a key role in the overall functioning of websites. This course will introduce you to the concepts of storing More »

 

Pete Herzog removed my name as contributor on every lesson on Hacker Highschool

Glenn Norman

Just amazing. Pete Herzong of ISECOM has removed my name from the list on contributors on every lesson of Hacker Highschool – even though I was a volunteer, contributor and eventually Project Manager over the course of six years and

Want to be a pro hacker? Check out this site…

http://www.cybersecurityeducation.org/

Hacking is ridiculously cool. Building your first laser rifle, for instance, is likely to give you a thrill you haven’t experienced before, particularly if you mis-use it. But don’t forget that there’s a practical side to this: Hackers are in

Encoding to and Decoding from Base64 Format

Glenn Norman

There’s a form of hiding data that isn’t exactly encryption; it’s just simple encoding into another format that most people won’t be able to read. FTP passwords, for example, are encoded in FileZilla using Base 64 format. You can get

Is hacking eventually going to be your job (you hope)? Know the job search aggregators.

Social Networking

Everyone here knows I invite contributor articles on several topics, including finding jobs and work. What Vanessa Fardi has to say below is useful on several levels. One, the service she reps is Nuevoo, a job search aggregator that’s pretty

Fascinating article, perhaps real: “He Was a Hacker for the NSA and He Was Willing to Talk. I Was Willing to Listen.”

Glenn Norman

Mr. Robot has spawned or reinforced a dozen stereotypes about hacker-types. A lot of them are pretty unfortunate, like the association of hacking with mental illness. This article goes deep on a reporter’s interviews with a post-CIA hacker willing to

[ Hacking 101 ] Why you should be using a proxy server (sometimes)

Glenn Norman

One of the trickiest things about hacking is knowing what kind of anonymity tool to use, when. If what you are doing involves only the Internet (i.e. web pages and web sites), the right anonymity tool is a proxy server.