Skip to main content

Intel

The Return of the Shadow Legacy

posted onMarch 14, 2001
by hitbsecnews

After 10 plus years of being underground the Shadow Legacy has step out
of the Shadows. Hidden in our secret and secure private Chat Servers and
messages servers. Where we work to help each other solve complex software
and hardware engineering problems. Filtering our work and advancements in
Network security, Apache, FreeBSD and countless other projects through
non discript Nics and aliases. Remaining in the darkness, free from the
chatter of the wantabes, Posers, and Feds. When our darker splinter and

Knight Rider's K.I.T.T. vs. Kimble's Megacar: FIGHT!

posted onFebruary 19, 2001
by hitbsecnews

The 80's was definitely where it was at for technology. From MacGyver's duct
tape, to the subject of this weeks Retrolooks feature, K.I.T.T. from Knight
Rider, let us take a look back at the wonder car of the 80's and compare it to
the technological genius of Kimble's Megacar.

Here's a clip:

Issue #14

posted onFebruary 14, 2001
by hitbsecnews

Wooo... we've certainly had our fair share of problems this past month. From Denial of Service attacks to routing problems, it goes without saying that I haven't been sleeping well. *grin*. But we've survived, and even managed to put in a couple of new features to the site as well... Top of the list would be the Who's Online Box as well as our redone AvantGO channel, so you can now pretty much get the headlines from our site from any wireless device, be it a Palm/WinCE machine or a WAP enabled handphone - we're right there in your face.

Down the sinkhole...

posted onFebruary 14, 2001
by hitbsecnews

Okay, before I even get started with this, I know what I have to say in here is probrably going to piss quite a fair number of poeple off, but I'm
going to say it anyway. What's this going to be about you ask? Well pretty much on how the Malaysian IT industry (and the tertiary education system) is
going down the crapper and there really isn't very much anyone is willing to do about it. Or should I say it appears that there isn't anyone who actually

ID Theft (part 2) - Who They Are

posted onFebruary 13, 2001
by hitbsecnews

Who are you?

I started this series awhile back and due to distractions have not been able to follow up on it. In the last article I pointed out just how vulnerable we are to identity theft. In this article we explore just what identity means. And in the next just how others go about assuming yours. (Standard disclaimer) This is not a how-to guide as anybody with brains can either figure it out themselves or pull the information off the net. Ok now off we go…

The scene has gone to hell

posted onFebruary 13, 2001
by hitbsecnews

It wasn't that long ago (about 7 years), that the scene was composed of a group of close friends. It was kept secret. To enter this world one had to personally know someone. It was close to impossible to simply stumble upon this hidden world. At that time most people didn't even know what warez or hacking was. There was no media hype, there were no publicized FBI raids ( except LoD). Only a group of people that loved computers so much that they wanted to know how everything worked.

Physics Utilizing Comp. Tech. or Comp. Tech. Utilizing Physics? (part 3)

posted onFebruary 13, 2001
by hitbsecnews

After the first two part of the series and before I go into the details of the minimum physics you might need to know to understand the title of this article, I’d decided in this part to give you a list of subjects in physics that you should know to really understand the physics of this topic or anything else that’s involved. (See STATISTICAL PHYSICS AU NATUREL)


A look at Warez

posted onFebruary 13, 2001
by hitbsecnews

|This article is composed of some warez texts found on the net.|

1)What's warez
2)History
3)Warez sites
4)Warez people
4)Conclusion