Tagged: Hacking

aircrack-ng wireless hacking

Wireless hacking – A new chapter from my book Linux, Programming and Hacking

Hello readers, currently I am putting the finishing touches on the second edition of my book Linux, Programming and Hacking. As such I will be posting a few sample chapters for review until release in late December. This chapter is on wireless hacking, specifically WPA/WPA2 and WPS. Enjoy and please do leave a comment below. Chapter 4 Wireless hacking How to hack Wi-Fi for free internet One of the basic tenants of hacking is to ensure no one can trace...

Jonny Lee Miller as Dade Murphy - Crash Override Hackers 20th Anniversary Edition Blu-Ray Review

Hackers 20th Anniversary Edition Blu-Ray Review

One of my favorite movie subgenres is about hacking. Movies such as WarGames, Sneakers and The Matrix are probably the reason why I am doing a PhD in Computer Science (besides the toiling work of writing about Science Fiction). Another movie that should be on that list is the 1995 movie Hackers by director Iain Softley. A week ago this cult-movie has finally got its 1080p blu-ray treatment it long needed. Now neither Angelina Jolie nor Jonny Lee Miller look as pixelated or...

Mr. Robot Preview. Rami Malek as Elliot.

Mr. Robot – New Hacking TV-show Preview

Mr. Robot Preview… Frequent visitors to this blog will know one of my interest is network security, or hacking. Sadly the topic if often misunderstood. Strictly speaking hacking means to learn. And you can learn about an information system to help protect it or if you are what is known as a black-hat hacker to crack it. Plenty of movies and TV-shows have attempted to depict hacking in a realistic way. Of the top of my head I would say...

Penetration testing A Hands-on introduction to hacking by Georgia Weidman Review!

Penetration testing A Hands-on introduction to hacking by Georgia Weidman Review!

As I have studied Computer Science I am naturally interested in Penetration Testing. No one wants to leave their computer or mobile devices unprotected, but I also wanted to know more on how such dark arts are performed. I don’t want to know that because I want break into some one’s computer but I would like to know just how the worlds IT infrastructure is vulnerable to people pressing keys on their keyboards a world away. As such I have a...