[ Hacker Night School ] :: What’s Wrong With This Picture? /32 Subnets, for one thing…

Hacking in the dark

This is post 5 of 12 in the series “[ Hacker Night School ]” You need to traceroute a bad.horse. That’s right, right now, run: traceroute bad.horse or on Windows tracert bad.horse Watch a video of the output here: Now go to this article and read about what’s going on with this crazy response: https://lnkd.in/eSsGDxD …

Pete Herzog removed my name as contributor on every lesson on Hacker Highschool

Glenn Norman

Just amazing. Pete Herzong of ISECOM has removed my name from the list on contributors on every lesson of Hacker Highschool – even though I was a volunteer, contributor and eventually Project Manager over the course of six years and produced the first 11 lessons. Now that’s the way to treat a contributor to an …

Hacking to Live

Gosper's Glider Gun

Hackers are clever techies. The word “hacker” actually has nothing to do with crime: a brilliant engineer would hack out a smart solution to the problem at hand, and consider it a compliment to be called a hacker. There’s a whole culture built on this idea: see https://en.wikipedia.org/wiki/Hacker_culture. We are a community dedicated to learning and teaching. …