Posts

Showing posts from May, 2011

Onno W. Purbo A.K.A Kang Onno (Hacker White)

Onno Widodo Purbo ( born in Bandung August 17, 1962 , age 45 years ) is a character ( later better known as an expert in the field ) information technology from Indonesia . He began his academic education at ITB majoring in Electrical Engineering in 1981 . Six years later he graduated with honors the best graduates , and then continue their studies to Canada with a scholarship from the PAU - ME. RT / RW - Net is one of the many ideas put forward . He is also active in writing in the field of information technology media , seminars , national and international conferences . Believe philosophy of copy left , a lot of his writing published for free on the internet . Freedom fighter 2.4 GHz , VOIP - People, and Wifi Antenna from cans .

The Java Tutorial Introduction

Image
The Java Tutorials are practical guides for programmers who want to use the Java programming language to create applications. They include hundreds of complete, working examples, and dozens of lessons. Groups of related lessons are organized into "trails". For the most accurate and up-to-date tutorials, please access the latest version from Oracle's official website for the Java SE Tutorials (Last Updated  03/17/2011 ), which can be found at:  http://download.oracle.com/javase/tutorial . The Java SE Tutorials primarily describe features in Java SE 6. For best results,  download JDK 6 . What's New Enjoy quizzes? Take a minute to answer this quiz about Java applets.  The Java Tutorials are continuously updated to keep up with changes to the Java Platform and to incorporate feedback from our readers. Included in recent releases: The  JLayer  component, introduced in Java SE 7, is explained in  How to Decorate Components with JLayer . As of Java SE 7 build 130, the

Sniffing

Sniffing is another technique to use internally. A sniffer or packet capture utility is able to capture any traffic  traveling  along the network segment to which it is connected. We normally set up sniffers throughout the organization to capture network traffic, hoping to identify valuable information such as user IDs and passwords. We use sniffing to passively capture data  being sent across the internal network. Laptops are usually the ideal platform since they are portable and easy to conceal. The system does not even need an IP address since it passively captures the traffic. The sniffing machine copies the data without modifying its contents and is difficult to detect even with sophisticated  intrusion detection software . There are programs, such as AntiSniff, that have some success in detecting sniffers. Switched Ethernet environments reduce the risk of packet capture. Since the sniffer is able to capture traffic only on its same network segment, a sniffer in a switched environ

The Hacker Manifesto

Image
Another one got caught today, it's all over the papers. "Teenager Arrested in Computer Crime Scandal", " Hacker  Arrested after Bank Tampering"... Damn kids. They're all alike. But did you, in your three-piece psychology and 1950's technobrain, ever take a look behind the eyes of the  hacker ? Did you ever wonder what made him tick, what forces shaped him, what may have molded him? I am a  hacker , enter my world... Mine is a world that begins with school... I'm smarter than most of the other kids, this crap they teach us bores me... Damn underachiever. They're all alike. I'm in junior high or high school. I've listened to teachers explain for the fifteenth time how to reduce a fraction. I understand it. "No, Ms. Smith, I didn't show my work. I did it in my head..." Damn kid. Probably copied it. They're all alike. I made a discovery today. I found a computer. Wait a second, this is cool. It does what I want it to