public marks

PUBLIC MARKS from xenomorph with tag hacking

23 August 2005

MC2 Security Wire

Computer and Network/Security Solution, hacking, operating systems, virus information and more!

COTSE

Church Of The Swimming Elephant

Blacksheep Security

Unix, Windows, Netware, Firewalls, WWW, Misc, IDS, Policy, Exploits, Links Resources, Administration FAQ's

.::x Hacktivist Collective x::.

We seek to defend digital rights and freedom of speech on the internet by providing a platform where hackers and activists can network to share information about social justice struggles and organize to form projects. We work to foster open and decentralized publishing systems such as peer to peer file sharing systems, independent media, etc. We also encourage hackers to keep updated of current events as well as get involved in the political process to defend digital rights and expose corruption in political and economic systems. Join us to start creative yet legal implementations of technology that artistically put pressure on the powers that be for progressive change that helps build our vision of a free internet and a free society.

ILLMOB

Hacking, Tools, and some other shit.

22 August 2005

United Net Frontier

United Net Frontier The process stock of significant international environmental initiatives.

20 August 2005

IANA Port Numbers

PORT NUMBERS (last updated 18 August 2005) The port numbers are divided into three ranges: the Well Known Ports, the Registered Ports, and the Dynamic and/or Private Ports. The Well Known Ports are those from 0 through 1023. The Registered Ports are those from 1024 through 49151 The Dynamic and/or Private Ports are those from 49152 through 65535

:: [ Dachb0den Research Labs ] ::

"It's a cardboard universe... and if you lean too hard against it, you fall through." - Philip K. Dick toorcon . hack(sd) . bsd-airtools . invisiblenet . sql++ ]

The Hacker\'s Choice :: THC

Welcome to the official THC web site. THC is an acronym for 'The Hacker's Choice' and a group of international experts involved in network and system security. THC was founded in 1995 in Germany, has published over 60 software releases and technical papers and currently is among the top ten security groups worldwide.

19 August 2005

Rexploit

by 6 others
Welcome to remote-exploit.org. We are just a group of people that like to experiment with computers. We hope that we can provide some information back to the public and support the ongoing process of learning.

13 August 2005

sinred | Remote Administration Community

sinred Remote Administration Community

Progenic

by 2 others
- Top 100 underground computer technology websites Downloads: Security, Audio, Video, Image, Developer, Phone, Network, System Games, And More...

Gray-World Team

Soon her eye fell on a little glass box that was lying under the table: she opened it, and found in it a very small cake, on which the words "EAT ME" were beautifully marked in currants. "Well, I'll eat it," said Alice, "and if it makes me grow larger, I can reach the key; and if it makes me grow smaller, I can creep under the door: so either way I'll get into the garden, and I don't care which happens!" Lewis Carroll "Alice In Wonderland"

11 August 2005

Government Security

by 1 other
Network security articles and hacking prevention resources for the government and general public. Covering all aspects of Computer Hacking, including tutorials and exploit downloads.

09 August 2005

Lock Picking Guides. Lockpick Library

The easiest to understand and most comprehensive set of lockpicking guides on the internet. You will learn lock picking secrets so effective that they have been restricted to locksmiths and those "in the know". The Lockpick Library contains over 50 quality guides covering almost every type of locking system commonly in use today and how to pick them.

Handbook of hardware pinouts, cables schemes and connectors layouts - full listing @ pinouts.ru

by 6 others
# Pinouts of computer hardware components, internal connectors, buses and input/output ports (i.e. PC Serial connector pinout or Apple Desktop Bus ). # Pinouts and brief information about some common computer hardware interfaces (such as RS232 interface, USB, ATA/IDE Internal connector). # Pinouts of audio/video connectors (i.e. S-Video connector or VGA connector pinout) Handbook of hardware pinouts, cables schemes and connectors layouts - full listing # Pinouts of cellular phones, consumer audio/video hardware and over devices (i.e. Nokia Pop port pinout) # Schemes of cables for computer peripherals and other devices # Layout and numbering scheme of common and device-specific connectors

Infosyssec

The most comprehensive computer and network security resource on the Internet for Information System Security Professionals

08 August 2005

hack a day

by 4 others
hack a day serves up a fresh hack each day, every day from around the web and a special how-to hack each week.

07 August 2005

Crewl Underground Madness (CUM)

CUM - Crewl Underground Madness: BlackHat Hacking, Phreaking, Coding